The Inevitable Rise Of Artificial Intelligence

A thousand tech industry names have publicly called for a six-month halt to training new AI systems to give the industry time to assess the risks.

AI seems to have reached an inflexion point where it is finally powerful enough to really capture the public imagination. Politicians are keen to capitalise on the potential of these systems to drive economic growth and the low carbon economy, and ordinary citizens are signing up to see what they can do with the technology.

However, as these systems get more powerful and widespread, the risks associated with them also become more significant. The Future of Life Institute issued its open letter calling for a halt because it is concerned that the risks are not yet understood and so cannot yet be properly controlled.

Can You Put The Genie Back In The Bottle?

We can bet that any moratorium would not be completely respected. Chinese and potentially even American innovators - who are the origin of the main advances in this area - would find it difficult to accept a long period of potential commercial disadvantage.

The developers do seem to be working hard to identify and address risks, but the conflicts of interests in ‘marking their own homework’ are clear.

The technical report accompanying GPT-4 addresses risks ranging from hallucinations (where the system provides inaccurate information), to the proliferation of weapons, to privacy and cybersecurity. However, the descriptions of the risks are limited, as is the information provided about how the system was developed. There is, for example, nothing about future energy requirements for AI and the potential impact of that on international climate change commitments.

How Much Do We Know About The Risks Of AI?

We know that the dataset used to train the system is likely to contain personal data that may not have been lawfully obtained as well as information that is the intellectual property of rights owners who have not provided permission. We know that people are only now starting to experiment with the ways the tools can be used - and without understanding that, it’s simply impossible to assess all the risks.

The debate reinforces the need for governments to take up the subject more quickly.

The EU is making progress on the AI Act, which aims to regulate the use of certain types of AI. However, there is no date for it to be transposed into national laws yet and other countries, including the UK, have no equivalent.

Laws like the AI Act provide ‘guard rails’ to help developers consider wider social and economic risks, but the problems envisaged by the signatories to the open letter go far beyond what can realistically be worked through in a six month development moratorium.

Regulators, politicians and think tanks need to consider what model of society we want to implement and how AI will be incorporated into that. The rise of AI is inevitable, but it requires systemic changes including retraining millions of adults and finding roles for those whose work opportunities are displaced by technology.

Camilla Winlo is Head of Data Privacy at Gemserv

Nicolas Cambolin Global Director of Data Intelligence at Talan

You Might Also Read: 

Leveraging Data Privacy For Artificial Intelligence:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

 

« Understanding The Incident Response Lifecycle
The Cybersecurity Threat To Railways »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Identillect Technologies

Identillect Technologies

Identillect Technologies provide a user-friendly secure email solution to protect critical information, with an emphasis on simplicity.

Salient CRGT

Salient CRGT

Salient CRGT is a leading provider of health, data analytics, cloud, agile software development, mobility, cyber security, and infrastructure solutions.

CryptoTec

CryptoTec

CryptoTec is a provider of security concepts and encryption solutions for secure communication between decentralized computerized systems.

Ravelin Technology

Ravelin Technology

Ravelin prevents chargebacks, fraud, and account takeover. Machine learning and human insight combine for highly accurate fraud detection and prevention.

Sternum

Sternum

Sternum provides reliable and effective endpoint security for any IoT device, using robust technology and seamless integration.

Nominet

Nominet

Nominet's cyber division offers network detection and response services to governments and enterprises worldwide.

VectorUSA

VectorUSA

VectorUSA is a premier technology solution provider. We design, build and maintain cybersecurity, data center, wireless and managed solutions – transforming business needs into technology solutions.

Revere Technologies

Revere Technologies

Revere Technologies is a pure-play cyber security solutions and services provider in Sub-Saharan Africa.

Quantexa

Quantexa

Quantexa automates millions of operational decisions, at scale, across multiple business units, including Anti-Money Laundering, Know-Your-Customer, Fraud, Credit Risk and Customer Intelligence.

Nitrokey

Nitrokey

Nitrokey is the world-leading company in open source security hardware. Nitrokey develops IT security hardware for data encryption, key management and user authentication.

Luxembourg House of Financial Technology (LHoFT)

Luxembourg House of Financial Technology (LHoFT)

Offering start-up incubation, co-working spaces including a soft-landing platform, the LHoFT connects and creates value for the entire Luxembourg FinTech ecosystem.

CyberCure

CyberCure

CyberCure provide specialised roles and services to manage your organisations cybersecurity requirements and professional advisory services in governance, risk and compliance.

XONA Systems

XONA Systems

XONA is The Zero Trust user access platform for the OT enterprise. Secure operational access to critical systems - from anywhere.

Ark Infotech

Ark Infotech

Ark Infotech is a provider of cloud management services, selective support services, and technology solutions.

Secure Domains

Secure Domains

Secure Domains is the first company in the GCC to offer cloud-based DNS firewall services and security through its flagship SaaS product, DNS Armor.

Instil Software

Instil Software

Instil helps technology brands transform, innovate and disrupt their markets with category-defining software products that challenge us to think, feel and act in new ways.