The Limitations of AI

The US journalist Carl Bernstein, who was one of the Watergate reporters has warned that Artificial Intelligence (AI) is creating serious challenges for the future of journalism. And that this AI issue includes job losses, privacy concerns and the potential for misleading and fake information.

AI's engagement has created fears of job losses, privacy and the potential to circulate fake information. Bernstein said "truth is the bottom line for anything in your life."

Despite journalisms limitations, Bernstein emphasises the importance of truth in reporting and the press as an essential element in a community. Carl Bernstein and Bob Woodward were the reporters on the Watergate scandal and collapse of President Nixon’s Presidency in 1972.

In an interview with the BBC, Bernstein and Woodward also reflected on the fall of Nixon, the former presidency of Donald Trump and the state of the US and the world today. "We need to know what's real as opposed to what's false. The press is the essential element in a community of being able to attain that."  Bernstein said: Asked why anyone should become a reporter today, he said to find "the best obtainable version of the truth".

The Chat GPT programme, which uses AI, has become widely used in the past year and despite it being the early stages of AI, Bernstein said: "AI is a huge force we're going to have to grapple with in this world."

Discussing the limitations of AI, Woodward said: "I can call the Pentagon and say, 'I'd like to talk to the chairman of the Joint Chiefs, the top military man', and he's either going to talk or maybe not. AI can't do that."

Today, the fast rise in using AI has made people concerned for their jobs, privacy and the way it could lead to misleading information being circulated. Bernstein said: "We need to know what's real as opposed to what's false. The press is the essential element in a community of being able to attain that." He noted that people should want to become a reporter to find "the best obtainable version of the truth".

As AI becomes more prevalent in journalism, Bernstein and Woodward’s warnings about the challenges it poses are likely to become even more relevant.

While AI has the potential to improve the efficiency and accuracy of reporting, it also has the potential to undermine the essential role of the press in holding those in power accountable. As Bernstein has emphasised, the pursuit of truth must remain at the heart of journalism, regardless of technological advancements.

BBC:    Nordot:    BBC / Twitter:    BBC/Twitter:   Bollyinside:    Digg:   Emergent Mind:

You Might Also Read: 

Understanding Fake News:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Take Practical Measures To Avoid An Attack
A Decade Of ‘Bad Magic’ In Cyber Espionage »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Zivver

Zivver

Zivver is the effortless, secure email platform, powering the next generation of secure communications.

SecureBrain

SecureBrain

SecureBrain software and services help protect against Japanese-specific cybercrime and global internet security threats such as online fraud, phishing, drive-by downloads and malware attacks.

GuidePoint Security

GuidePoint Security

GuidePoint Security provide information security solutions that enable commercial and federal organizations to more successfully achieve their security and business goals.

MBL Technologies

MBL Technologies

MBL Technologies specializes in information assurance, enterprise security, privacy, and program/project management.

Quadron  Cybersecurity Services

Quadron Cybersecurity Services

Quadron Cybersecurity Services is a specialist in digital security, data and system protection.

YL Ventures

YL Ventures

YL Ventures funds and supports brilliant Israeli tech entrepreneurs from seed to lead.

Trusted CI

Trusted CI

Trusted CI, the NSF Cybersecurity Center of Excellence is comprised of cybersecurity experts who have spent decades working with science and engineering communities.

CentricalCyber

CentricalCyber

CentricalCyber is a cyber risk consultancy and NIST CSF specialist set up to help business leaders better understand and manage cyber risk.

Axis Security

Axis Security

Axis Security technologies transform open networks and vulnerable applications into fully protected resources that the business can trust.

MetaCert

MetaCert

MetaCert’s Zero Trust browser software reduces the risk of organizations being compromised with a phishing-led cyberattack by more than 98%.

Pillr

Pillr

Pillr is a cybersecurity operations platform capable of adapting to the demands of your business and team — and the global threat landscape.

Core to Cloud

Core to Cloud

Core to Cloud provide consultancy and technical support for the planning and implementation of sustainable security strategies.

AVEVA

AVEVA

AVEVA has a long history in providing Supervisory Control and Data Acquisition software for meeting complex and evolving automation requirements.

Exium

Exium

At Exium we’ve integrated networking and security in a cloud-delivered Zero Trust platform powered by 5G and open source.

Bell Canada

Bell Canada

Bell is the leading provider of network and communications services for Canadian businesses and the partner for delivering network, IoT, cloud, voice, collaboration and security solutions.

Straiker

Straiker

Straiker's AI-native security platform is designed to protect enterprise AI applications and autonomous agents from evolving threats through automated assessment and runtime guardrails.