Machines With The Power To Kill

The next generation of autonomous weapons dubbed “killer robots” could cause mass atrocities or even start a war, a former Google Project Maven engineer has revealed.  

Laura Nolan left Google in in 2018 inprotest at being sent to work on Project Maven to improve US military drone tech. She said killer robots not controlled by humans should be prohibited by similar types of treaty banning chemical weapons and has now called for a ban of all AI killing machines not operated by humans.

Google will not renew a contract to do artificial intelligence work for the US Pentagon, company sources say. The decision follows strong opposition in the technology giant's workforce.  A number of Google employees resigned, including a software enginerr, Laura Nolan, who quit Google when she discovered the project she was working on was for the US military.

Project Maven involved using machine learning to distinguish people and objects in drone videos. They feared it was the first step towards using artificial intelligence for lethal purposes.

According to company sources, there would be no follow-up after the current contract expired next March, but a journalist for the technology news website Gizmodo says that Google had not cancelled Project Maven and did not appear to have ruled out future work with the military.

“The likelihood of a disaster is in proportion to how many of these machines will be in a particular area at once. What you are looking at are possible atrocities and unlawful killings even under laws of warfare, especially if hundreds or thousands of these machines are deployed..... There could be large-scale accidents because these things will start to behave in unexpected ways. Which is why any advanced weapons systems should be subject to meaningful human control, otherwise they have to be banned because they are far too unpredictable and dangerous.”

Unlike drones, which are controlled by military teams often thousands of miles away from where the flying weapon is being deployed, Nolan said killer robots have the potential to do “calamitous things that they were not originally programmed for”.

The contract is reported to be worth less than $10m (£7.5m) to Google but could potentially lead to more extensive cooperation with the Pentagon.

Project Maven involves using machine learning and engineering talent to distinguish people and objects in drone videos. In April up to 4,000 Google employees signed an open letter saying that by its involvement in the project the internet giant was putting users' trust at risk, as well as ignoring its "moral and ethical responsibility". 

Gizmodo:      Guardian:       BBC:       Expres:    

You Might Also Read: 

Distinguished AI Expert Is Concerned  About ‘Killer Robots’:

 

« On Demand Webinar: How to secure app pipelines in AWS
Cyber Attack On A Nuclear Power Plant »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Konfidas

Konfidas

Konfidas provide high-level cybersecurity consulting and professional tailored solutions to meet specific cybersecurity operational needs.

CLUSIL

CLUSIL

CLUSIL is an association for the information security industry in Luxembourg.

Retail & Hospitality Information Sharing & Analysis Center (RH-ISAC)

Retail & Hospitality Information Sharing & Analysis Center (RH-ISAC)

Retail & Hospitality ISAC operates as a central hub for sharing sector-specific cyber security information and intelligence.

IABG

IABG

Activities include consulting services in the development of software systems in the area of secure information and data communication.

e-Governance Academy (eGA)

e-Governance Academy (eGA)

eGA is a think tank and consultancy founded for the transfer of knowledge and best practice in e-governance, e-democracy and national cyber security.

Positive Technologies

Positive Technologies

Positive Technologies is a leading global provider of enterprise security solutions for vulnerability and compliance management, incident and threat analysis, and application protection.

PrimeKey

PrimeKey

PrimeKey provides organisations with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation.

Quadrant Information Security

Quadrant Information Security

Quadrant Information Security is a consulting firm committed to supporting organizations in all vertical markets and protecting their sensitive data.

Virgil Security

Virgil Security

Virgil Security provides easy-to-deploy and easy-to-use cryptographic software and services for use by developers and end-users.

US Secret Service

US Secret Service

The US Secret Service has a pivotal role in securing the nation’s critical infrastructures, specifically in the areas of cyber, banking and finance.

Cynamics

Cynamics

Cynamics is the only network monitoring solution built specifically for Smart City, Public Safety and Critical Infrastructure networks.

Stealth-ISS Group

Stealth-ISS Group

Stealth–ISS Group is your extended IT, cyber security, risk and compliance team, providing strategic guidance, engineering and audit services, along with technical remediation and security operations.

Trapp Technology

Trapp Technology

Trapp Technology combines the very best cloud, Internet, IT managed services, and IT consulting to provide a true all-in-one IT solution for small to mid-sized businesses.

Nigerian Communications Commission (NCC)

Nigerian Communications Commission (NCC)

NCC has established a CSIRT for the telecommunication industry to provide services and support for the prevention and management of potential cyber security related emergencies.

Catalogic Software

Catalogic Software

Catalogic helps clients backup, recover, manage, and protect their data across their enterprise and cloud environments with Smart Data Protection solutions.

Aegis Cyber Defense Systems

Aegis Cyber Defense Systems

AEGIS is a powerful cybersecurity tool that can help protect your devices and networks from cyber threats, and increase performance.