Video Game Imagines Humans Relying On Robots

In the 1950s, Isaac Asimov imagined a future in which sentient robots are built to serve and protect humans, but end up doing the opposite.

Almost seven decades later, artificial intelligence and robotics technologies have brought that scenario closer to the realms of possibility.

Detroit: Become Human, a narrative adventure from experimental studio Quantic Dreams is the latest work to imagine the consequences of relying on such super smart machines.

Set several years in the future, the game takes place in a world where androids have taken over most menial tasks and humans are figuring out what to do with all their leisure time.

The major manufacturer of Replicants, CyberLife, says its machines are safe and under control, and everyone is happy to trust them. But when a small group start to show human-like awareness, fear and resentment grow. Detroit: Become Human gives players control over several of these awakened droids as they form a kind of underground movement and start demanding some rights.

The idea for the game span out from a tech demo named Kara, produced by Quantic Dream in 2012. It showed a robot on a production line who gains sentience as she’s put together. The company’s creative director, David Cage, saw promise in the concept and inspired by the theories of futurist author and scientist Ray Kurzweil, started working on a full game around the idea of droids developing emotions.

In 2016, the company produced a trailer showing an AI cop named Connor attempting to pacify another android who has taken a young girl hostage. The trailer shows several outcomes, depending on player actions, but all emphasise the themes of sentience and emotion, and the potentially deadly friction between humans and robots.

For E3 2017, Quantic Dream revealed a new sequence from the game in which another android character named Marcus has joined a group of rogue robots who have formed a refuge known as Jericho.

They want humans to acknowledge them as equals, to stop exploiting androids as cheap labour, but they’re not sure how to get their message across. Marcus turns out to be a valuable ally: he has the ability to “convert” other androids, cutting them lose from CyberLife control and turning them into thinking beings, just by touching them – one of many subtle religious allusions that seem to litter the game.

The irony of human players taking control of android characters who are rebelling against human masters with ideas about control, subservience, reality and humanity, makes it worth waiting for.

Guardian

You Might Aslo Read:

Virtual Reality – Just Getting Started:

 

« The GDPR Effect On Brexit
Get Ready To Be Dazzled By The GDPR Professionals »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NTNU Center for Cyber & Information Security (NTNU CCIS)

NTNU Center for Cyber & Information Security (NTNU CCIS)

NTNU CCIS is a national centre for research, education, testing, training and competence development within the area of cyber and information security.

Herbert Smith Freehills

Herbert Smith Freehills

Herbert Smith Freehills is a leading professional services including data protection and privacy.

National Cybersecurity Hub - South Africa

National Cybersecurity Hub - South Africa

The mission of the National Cybersecurity Hub is to be the central point of collaboration for cybersecurity incidents in South Africa.

bluedog Security Monitoring

bluedog Security Monitoring

Sentinel from bluedog provides powerful and affordable internal network monitoring.

Asset Guardian Solutions (AGSL)

Asset Guardian Solutions (AGSL)

Asset Guardian are dedicated to protecting the integrity of process control systems software that is used to control operations and production processes.

Salient Law

Salient Law

Salient Law is a virtual law firm that specialises in advising providers and users of technology on contracts involving technology.

Eaton

Eaton

Eaton provides comprehensive cybersecurity services for operational technology (OT) to help keep your operations and personnel safe.

CertiPath

CertiPath

CertiPath create products and services that ensure the highest levels of validation for digital identities that attempt to access customers’ networks.

IDX

IDX

IDX is the leading consumer privacy platform built for agility in the digital age.

Aura

Aura

Aura is a mission driven technology company dedicated to creating a safer internet for everyone. We’re making comprehensive digital security that's simple to understand and easy to use.

Wazuh

Wazuh

Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance.

Altospam

Altospam

Altospam is a full service corporate email protection, integrating multiple security levels for your emails.

Supra ITS

Supra ITS

Supra ITS is a leading full-service technology partner offering IT Consulting, Cloud Services, 24x7 Managed IT & Cybersecurity Services, and IT Project Support.

Synersoft BLACKbox

Synersoft BLACKbox

Synersoft, the maker of path-breaking and disruptive technology for SMEs, now branded as BLACKbox, is an incubated and invested portfolio company of CIIE - IIM-Ahmedabad.

Lyvoc

Lyvoc

Lyvoc is a premier cybersecurity integration partner renowned for its expertise in supporting its clients to accelerate and secure their digital transformation.

Meta 1st

Meta 1st

Meta 1st are a progressive SAAS enterprise, dedicated to harnessing the power of AI to address the most critical vulnerabilities in the world of cybersecurity: the Human Layer.