Difference between revisions of "User:Darwin2049/ChatGPT4 Version01"
Darwin2049 (talk | contribs) |
Darwin2049 (talk | contribs) |
||
(6 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
<span style="color:#0000FF">Interface Questions.</span> This is presented as a multifaceted question. Its focus is on the risks associated with how target audiences access and use the system. The list of focal topics as currently understood but which may grow over time include: | '''''<span style="color:#0000FF">Interface Questions.</span>''''' This is presented as a multifaceted question. Its focus is on the risks associated with how target audiences access and use the system. The list of focal topics as currently understood but which may grow over time include: | ||
* how this new technology will respond and interact with different communities; | * how this new technology will respond and interact with different communities; | ||
* how will these different communities interact with this new technology; | * how will these different communities interact with this new technology; | ||
Line 5: | Line 5: | ||
* might one access modality inherit certain privileges and capabilities be considered safe for one group but risk for other groups; if so, how might the problem of “leakage” be addressed; | * might one access modality inherit certain privileges and capabilities be considered safe for one group but risk for other groups; if so, how might the problem of “leakage” be addressed; | ||
* in the event of an unintended “leakages” (i.e. “leaky interface”) what might be the implications of the insights, results, capabilities; | * in the event of an unintended “leakages” (i.e. “leaky interface”) what might be the implications of the insights, results, capabilities; | ||
* 2023.06.04 resume... include recent reports offering sharper focus on risks, usage modalities; | |||
<span style="color:#0000FF">Overview. </span> In the following we try to analyze and contextualize the current known facts surrounding the OpenAI ChatGPT4 (CG4) system. | '''''<span style="color:#0000FF">Overview. </span>''''' In the following we try to analyze and contextualize the current known facts surrounding the OpenAI ChatGPT4 (CG4) system. | ||
* <span style="color:#0000FF">CG4 – What is it: </span>we offer a summary of how OpenAI describes it; put simply, what is CG4? | * '''''<span style="color:#0000FF">CG4 – What is it: </span>'''''we offer a summary of how OpenAI describes it; put simply, what is CG4? | ||
* <span style="color:#0000FF">Impressions: our focus then moves to examine what some voices of concern are saying; | * '''''<span style="color:#0000FF">'''''Impressions: our focus then moves to examine what some voices of concern are saying; | ||
* <span style="color:#0000FF">Risks and Impact: </span>we shift focus to what ways we expect it to be used either constructively or maliciously; here we focus on how CG4 might be used be used in expected and unexpected ways; | * '''''<span style="color:#0000FF">Risks and Impact: </span>'''''we shift focus to what ways we expect it to be used either constructively or maliciously; here we focus on how CG4 might be used be used in expected and unexpected ways; | ||
<span style="color:#0000FF">CG4 – What is it: </span> CG4 is a narrow artificial intelligence system, it: | '''''<span style="color:#0000FF">CG4 – What is it: </span>''''' CG4 is a narrow artificial intelligence system, it: | ||
* is based upon and is a refinement of its predecessor, the Chat GPT 3.5 system; | * is based upon and is a refinement of its predecessor, the Chat GPT 3.5 system; | ||
* has been developed using the generative predictive transformer (GPT) model; | * has been developed using the generative predictive transformer (GPT) model; | ||
Line 22: | Line 23: | ||
* uses a SAAS model; like Google Search, Youtube or Morningstar Financial; | * uses a SAAS model; like Google Search, Youtube or Morningstar Financial; | ||
<span style="color:#0000FF">Impressions. </span> | '''''<span style="color:#0000FF">'''''Impressions. </span> | ||
* possess no consciousness, sentience, intentionality, motivation or self reflectivity; | * possess no consciousness, sentience, intentionality, motivation or self reflectivity; | ||
* is a narrow artificial intelligence; | * is a narrow artificial intelligence; | ||
Line 37: | Line 38: | ||
* provides convincingly accurate responses to Turing Test questions; | * provides convincingly accurate responses to Turing Test questions; | ||
<span style="color:#0000FF">Favorable. </span> | '''''<span style="color:#0000FF">'''''Favorable. </span> | ||
* has demonstrated performance that suggests that it can pass the Turing Test; | * has demonstrated performance that suggests that it can pass the Turing Test; | ||
* CG4 derivative such as a CG5 could exhibit artificial general intelligence (AGI) capability; | * CG4 derivative such as a CG5 could exhibit artificial general intelligence (AGI) capability; | ||
Line 44: | Line 45: | ||
* spatial, mathematical reasoning; | * spatial, mathematical reasoning; | ||
<span style="color:#0000FF">Concerns. </span> | '''''<span style="color:#0000FF">'''''Concerns. </span> | ||
* knowledge gaps: inability to provide meaningful or intelligent responses on certain topics; | * knowledge gaps: inability to provide meaningful or intelligent responses on certain topics; | ||
* deception: might be capable to evade human control, replicate and devise independent agenda to pursue; | * deception: might be capable to evade human control, replicate and devise independent agenda to pursue; | ||
Line 52: | Line 53: | ||
* “hallucinations”: solution, answers not grounded in real world; | * “hallucinations”: solution, answers not grounded in real world; | ||
<span style="color:#0000FF">Risks. </span> CG4 will have society wide impact. As a new and powerful technology we should expect that it will introduce different types of risks. These include risks that are malicious, systemic or theoretical; more specifically: | '''''<span style="color:#0000FF">Risks. </span>''''' CG4 will have society wide impact. As a new and powerful technology we should expect that it will introduce different types of risks. These include risks that are malicious, systemic or theoretical; more specifically: | ||
* <span style="color:#0000FF">malicious: </span> | * <span style="color:#0000FF">malicious: </span> | ||
** these are risks that are deliberately introduced by an actor or actors; | ** these are risks that are deliberately introduced by an actor or actors; | ||
Line 74: | Line 75: | ||
By way of example we include a few examples of how CG4 can be expected to introduce new risk situations in the following actual or hypothetical considerations. | By way of example we include a few examples of how CG4 can be expected to introduce new risk situations in the following actual or hypothetical considerations. | ||
<span style="color:#0000FF">Malicious Risks. </span>An increasingly frequent path of attack is to use electronic means to cause disruption or significant destruction to a target. Here are a few. | '''''<span style="color:#0000FF">Malicious Risks. </span>'''''An increasingly frequent path of attack is to use electronic means to cause disruption or significant destruction to a target. Here are a few. | ||
<span style="color:#0000FF">Stuxnet. </span> | <span style="color:#0000FF">[https://www.wikiwand.com/en/Stuxnet Stuxnet.] </span> | ||
In 2010 several analysts working for a major computer security software company discovered a new computer malware threat that they had never seen before. They came to call the malware by the name of the STUXNET virus. It proved to be a highly sophisticated and elaborate computer virus with a single highly specific target that it was aimed at and succeeded in attacking. Its operation focused on seizing control of the Supervisory Control and Data Acquisition system in certain programmable controllers. The targets were so extremely specific that it would only target controllers made by the Siemens company in Germany. | In 2010 several analysts working for a major computer security software company discovered a new computer malware threat that they had never seen before. They came to call the malware by the name of the STUXNET virus. It proved to be a highly sophisticated and elaborate computer virus with a single highly specific target that it was aimed at and succeeded in attacking. Its operation focused on seizing control of the Supervisory Control and Data Acquisition system in certain programmable controllers. The targets were so extremely specific that it would only target controllers made by the Siemens company in Germany. | ||
These were the control systems that regulated the centrifuge devices operated by the Iranian nuclear research facility. The STUXNET virus caused arrays of centrifuges to speed up and slow down using erratic patterns; the result was that roughly twenty percent of the Iranian centrifuge devices were damaged and rendered inoperable. This happened because they shook themselves apart; this all took place in such a way that the system operators were completely unaware of the fact that their system had been hijacked and was destroying itself. The result was that the Iranian nuclear research facility was set back in its goal of refining uranium to just below bomb grade by months to years; | These were the control systems that regulated the centrifuge devices operated by the Iranian nuclear research facility. The STUXNET virus caused arrays of centrifuges to speed up and slow down using erratic patterns; the result was that roughly twenty percent of the Iranian centrifuge devices were damaged and rendered inoperable. This happened because they shook themselves apart; this all took place in such a way that the system operators were completely unaware of the fact that their system had been hijacked and was destroying itself. The result was that the Iranian nuclear research facility was set back in its goal of refining uranium to just below bomb grade by months to years; | ||
<span style="color:#0000FF">Pegasus. </span> | <span style="color:#0000FF">[https://www.wikiwand.com/en/Pegasus_(spyware) Pegasus.] </span> | ||
The Israeli cyber-arms company NSO group is credited with the creation of the Pegasus spyware tool. It is capable of infiltrating either Apple IOS or Android mobile telephone operating systems; the infiltration leaves little or no traces that the devices has been infiltrated; it is capable of lurking on the target device while providing no indication of its presence or its operation; it is capable of reading text messages, tracking locations, accessing microphone or camera devices and collecting passwords; | The Israeli cyber-arms company NSO group is credited with the creation of the Pegasus spyware tool. It is capable of infiltrating either Apple IOS or Android mobile telephone operating systems; the infiltration leaves little or no traces that the devices has been infiltrated; it is capable of lurking on the target device while providing no indication of its presence or its operation; it is capable of reading text messages, tracking locations, accessing microphone or camera devices and collecting passwords; | ||
<span style="color:#0000FF">Ransomware Attacks. </span> | <span style="color:#0000FF">[https://www.fbi.gov/how-we-can-help-you/safety-resources/scams-and-safety/common-scams-and-crimes/ransomware Ransomware Attacks.] </span> | ||
According to the US FBI ransomware attacks have been on the rise in the past several years. Ransomware is a form of malicious software that locks a user out of their own data. An attacker then demands payment to release the data or risk its erasure. They are typically hidden in an email attachment, a false advertisement or simply by following a link. | According to the US FBI ransomware attacks have been on the rise in the past several years. Ransomware is a form of malicious software that locks a user out of their own data. An attacker then demands payment to release the data or risk its erasure. They are typically hidden in an email attachment, a false advertisement or simply by following a link. | ||
<span style="color:#0000FF">Systemic Risks. </span>The nature of the advance in science or technology will show impact in an industrial sector that is more likely to use traditional means of performing job or task related aspects as specified in a job description. There have been increasing numbers of reports that are showing that the impact of CG4 is disrupting an increasing number of so far stable job categories. Included are just a few. | '''''<span style="color:#0000FF">Systemic Risks. </span>'''''The nature of the advance in science or technology will show impact in an industrial sector that is more likely to use traditional means of performing job or task related aspects as specified in a job description. There have been increasing numbers of reports that are showing that the impact of CG4 is disrupting an increasing number of so far stable job categories. Included are just a few. | ||
<span style="color:#0000FF">Screen Writers Guild (USA). </span>According to Fortune Magazine of May 5TH 2023, members of the Writers Guild of America (WGA) have gone on strike demanding better pay. They have expressed concern that CG4 will sideline and marginalize them going forward. According to Greg Brockman, president and co-founder of WGA: | <span style="color:#0000FF">Screen Writers Guild (USA). </span>According to [https://fortune.com/2023/05/05/hollywood-writers-strike-wga-chatgpt-ai-terrifying-replace-workers/ Fortune Magazine] of May 5TH 2023, members of the Writers Guild of America (WGA) have gone on strike demanding better pay. They have expressed concern that CG4 will sideline and marginalize them going forward. According to Greg Brockman, president and co-founder of WGA: | ||
Not six months since the release of ChatGPT4, generative artificial intelligence is already prompting widespread unease throughout Hollywood. Concern over chatbots writing or rewriting scripts is one of the leading reasons TV and film screenwriters took to picket lines earlier this week. | Not six months since the release of ChatGPT4, generative artificial intelligence is already prompting widespread unease throughout Hollywood. Concern over chatbots writing or rewriting scripts is one of the leading reasons TV and film screenwriters took to picket lines earlier this week. | ||
<span style="color:#0000FF">Teaching. </span> | <span style="color:#0000FF">Teaching. </span> | ||
Sal Kahn is the founder of Kahn Academy. The Kahn Academy is an online tutoring service that provides tutoring on a broad range of topics. Kahn reported on March 14th, 2023 in the KahnAcdemy blog that his technology demonstration to a group of public school administrators went very well. He emphasized that it went very well in fact. According to Kahn, one of the attendees reported that the capabilities of CG4 when used in the academic setting proved to be directly in line with their objects for developing creative thinkers. During their evaluation of this new capability a crucial concern was expressed that as AI technology develops that the risk of there becoming a widening chasm between those who can succeed and those who will not is increasing. This new technology offers hope that it will help those at greater risk to make the transition toward the a future in which technology and artificial intelligence will play an ever increasing role. | Sal Kahn is the founder of Kahn Academy. The Kahn Academy is an online tutoring service that provides tutoring on a broad range of topics. [https://apnews.com/article/what-is-chat-gpt-ac4967a4fb41fda31c4d27f015e32660 Kahn reported on March 14th, 2023] in the KahnAcdemy blog that his technology demonstration to a group of public school administrators went very well. He emphasized that it went very well in fact. According to Kahn, one of the attendees reported that the capabilities of CG4 when used in the academic setting proved to be directly in line with their objects for developing creative thinkers. During their evaluation of this new capability a crucial concern was expressed that as AI technology develops that the risk of there becoming a widening chasm between those who can succeed and those who will not is increasing. This new technology offers hope that it will help those at greater risk to make the transition toward the a future in which technology and artificial intelligence will play an ever increasing role. | ||
<span style="color:#0000FF">Lawyers. </span> | <span style="color:#0000FF">Lawyers. </span> | ||
Legal professionals that have made use of CG4 have reported surprisingly sophisticated results when using CG4 as a support tool. In the March/April 2023 issue of The Practice, a publication of the Harvard Law School, Andrew Perlman, Dean of Suffolk University Law School reported that he believes that CG4 can help legal professionals in the areas of: research, document generation, legal information and analysis. His impression is that CG4 performs with surprising sophistication but as yet will not replace a person. But within a few years this can become an eventuality. | Legal professionals that have made use of CG4 have reported surprisingly sophisticated results when using CG4 as a support tool. In the March/April 2023 issue of The Practice, a publication of the Harvard Law School, [https://clp.law.harvard.edu/knowledge-hub/magazine/issues/generative-ai-in-the-legal-profession/the-implications-of-chatgpt-for-legal-services-and-society/ Andrew Perlman, Dean of Suffolk University Law School] reported that he believes that CG4 can help legal professionals in the areas of: research, document generation, legal information and analysis. His impression is that CG4 performs with surprising sophistication but as yet will not replace a person. But within a few years this can become an eventuality. | ||
<span style="color:#0000FF">Theoretical Risks. </span> | '''''<span style="color:#0000FF">Theoretical Risks. </span>''''' | ||
* <span style="color:#0000FF">Influence and Persuasion; </span> | * <span style="color:#0000FF">Influence and Persuasion; </span> | ||
** <span style="color:#0000FF">Narratives: </span> Highly realistic, plausible narratives and counter-narratives are now effortlessly possible; these might include: | ** <span style="color:#0000FF">Narratives: </span> Highly realistic, plausible narratives and counter-narratives are now effortlessly possible; these might include: | ||
Line 105: | Line 106: | ||
*** <span style="color:#0000FF">screen plays: </span>a remarkable capability that CG4 has shown itself capable of is in the creation of narrative that can be used for the creation of a screen play or novel; it is capable of generating; it is capable of generating seemingly realistic characters from just a few initial prompts; these prompts can be further elaborated upon and refined to the point that a very believable character can be generated; a set of characters can be created each of which has their own motives, concerns, flaws and resources; using a set of these fictitious characters it is entirely possible to create a story line in which they each interact with each other; hence a whole screen play or even possibly a novel can be developed in record time; | *** <span style="color:#0000FF">screen plays: </span>a remarkable capability that CG4 has shown itself capable of is in the creation of narrative that can be used for the creation of a screen play or novel; it is capable of generating; it is capable of generating seemingly realistic characters from just a few initial prompts; these prompts can be further elaborated upon and refined to the point that a very believable character can be generated; a set of characters can be created each of which has their own motives, concerns, flaws and resources; using a set of these fictitious characters it is entirely possible to create a story line in which they each interact with each other; hence a whole screen play or even possibly a novel can be developed in record time; | ||
*** <span style="color:#0000FF">immersive role play: </span> along similar lines CG4 is capable of being used to create artificial environments that are suitable for online immersive role playing games; these environments can possess any features or characteristics imaginable; if one were to look a short bit forward in time the industry of interactive role playing games may well experience an explosion of new possibilities; | *** <span style="color:#0000FF">immersive role play: </span> along similar lines CG4 is capable of being used to create artificial environments that are suitable for online immersive role playing games; these environments can possess any features or characteristics imaginable; if one were to look a short bit forward in time the industry of interactive role playing games may well experience an explosion of new possibilities; | ||
*** Synthetic Personalities: given the resources in terms of time and insight a knowledgeable user can use CG4 to create a fictitious personality; this personality can be imbued with traits, habits of thought, turns of phrase, an autobiographical sketch of arbitrary depth and detail; it can then be invoked as an interaction medium to engage with a user; these can mean engaging with an artificial personality with broad insights about the world or much more narrow but deep insights into specific knowledge domains; interacting with such a fictitious or synthetic personality might bear a powerful resemblance to training a surprisingly sophisticated dog; except that in this case the “dog” would be capable of sustaining very high levels of dialog and interaction; | *** <span style="color:#0000FF">Synthetic Personalities: </span>given the resources in terms of time and insight a knowledgeable user can use CG4 to create a fictitious personality; this personality can be imbued with traits, habits of thought, turns of phrase, an autobiographical sketch of arbitrary depth and detail; it can then be invoked as an interaction medium to engage with a user; these can mean engaging with an artificial personality with broad insights about the world or much more narrow but deep insights into specific knowledge domains; interacting with such a fictitious or synthetic personality might bear a powerful resemblance to training a surprisingly sophisticated dog; except that in this case the “dog” would be capable of sustaining very high levels of dialog and interaction; | ||
** <span style="color:#0000FF">Deep insights: </span>existing analysis tools such as sentiment analysis will become increasingly sophisticated; as the do we should expect that they will be applied to public figures, especially legislators and others in positions of influence; these insights might be based upon public actions; in the case of politicians voting records, position papers and constituency analysis will be at the forefront of study; | ** <span style="color:#0000FF">Deep insights: </span>existing analysis tools such as sentiment analysis will become increasingly sophisticated; as the do we should expect that they will be applied to public figures, especially legislators and others in positions of influence; these insights might be based upon public actions; in the case of politicians voting records, position papers and constituency analysis will be at the forefront of study; | ||
** <span style="color:#0000FF">Compromise: </span>access to detailed information about information about individuals of interest such as those with national security or defense related clearances will be favorite targets of malicious actors; the recent attack on the Office of Personnel Management is a foretaste of what is to come; by gaining access to information about individuals with highly sensitive clearances a foreign actor can position themselves to compromise, threaten or otherwise coerce specific individuals with clearances or people who are directly or indirectly related or associated with them; | ** <span style="color:#0000FF">Compromise: </span>access to detailed information about information about individuals of interest such as those with national security or defense related clearances will be favorite targets of malicious actors; the recent attack on the Office of Personnel Management is a foretaste of what is to come; by gaining access to information about individuals with highly sensitive clearances a foreign actor can position themselves to compromise, threaten or otherwise coerce specific individuals with clearances or people who are directly or indirectly related or associated with them; |
Latest revision as of 19:07, 4 June 2023
Interface Questions. This is presented as a multifaceted question. Its focus is on the risks associated with how target audiences access and use the system. The list of focal topics as currently understood but which may grow over time include:
- how this new technology will respond and interact with different communities;
- how will these different communities interact with this new technology;
- what if any limitations or “guard rails” are in evidence or should be considered depending upon the usage focus area;
- might one access modality inherit certain privileges and capabilities be considered safe for one group but risk for other groups; if so, how might the problem of “leakage” be addressed;
- in the event of an unintended “leakages” (i.e. “leaky interface”) what might be the implications of the insights, results, capabilities;
- 2023.06.04 resume... include recent reports offering sharper focus on risks, usage modalities;
Overview. In the following we try to analyze and contextualize the current known facts surrounding the OpenAI ChatGPT4 (CG4) system.
- CG4 – What is it: we offer a summary of how OpenAI describes it; put simply, what is CG4?
- Impressions: our focus then moves to examine what some voices of concern are saying;
- Risks and Impact: we shift focus to what ways we expect it to be used either constructively or maliciously; here we focus on how CG4 might be used be used in expected and unexpected ways;
CG4 – What is it: CG4 is a narrow artificial intelligence system, it:
- is based upon and is a refinement of its predecessor, the Chat GPT 3.5 system;
- has been developed using the generative predictive transformer (GPT) model;
- has been trained on a very large data set including textual material that can be found on the internet; unconfirmed rumors suggest that it has been trained on 100 trillion parameters;
- is capable of sustaining conversational interaction using text based input provided by a user;
- can provide contextually relevant and consistent responses;
- can link topics in a chronologically consistent manner and refer back to them in current prompt requests;
- is a Large Language Models that uses prediction as the basis of its actions;
- uses deep learning neural networks and very large training data sets;
- uses a SAAS model; like Google Search, Youtube or Morningstar Financial;
Impressions.
- possess no consciousness, sentience, intentionality, motivation or self reflectivity;
- is a narrow artificial intelligence;
- is available to a worldwide 24/7 audience;
- can debug and write, correct and provide explanatory documentation to code;
- explain its responses
- write music and poems
- summarize convoluted documents or stories
- score in the 90% level on the SAT, Bar and Medical Exams
- provide answers to homework,
- self critiques and improves own responses;
- provide explanations to difficult abstract questions
- calibrate its response style to resemble known news presenters or narrators;
- provides convincingly accurate responses to Turing Test questions;
Favorable.
- has demonstrated performance that suggests that it can pass the Turing Test;
- CG4 derivative such as a CG5 could exhibit artificial general intelligence (AGI) capability;
- emergent capabilities;
- language translation;
- spatial, mathematical reasoning;
Concerns.
- knowledge gaps: inability to provide meaningful or intelligent responses on certain topics;
- deception: might be capable to evade human control, replicate and devise independent agenda to pursue;
- intentionality: possibility of agenda actions being hazardous or inimical to human welfare;
- economic disruption: places jobs at risk because it can now perform some tasks previously defined within a job description;
- emergence: unforeseen, possibly latent capabilities;
- “hallucinations”: solution, answers not grounded in real world;
Risks. CG4 will have society wide impact. As a new and powerful technology we should expect that it will introduce different types of risks. These include risks that are malicious, systemic or theoretical; more specifically:
- malicious:
- these are risks that are deliberately introduced by an actor or actors;
- they use tools or capabilities to cause impairment or damage to others;
- the results of an attack might be annoying to devastating;
- depending upon sophistication the creation of these threats range from relatively easy to very difficult;
- CG4 can collapse the turnaround time from concept to attack from weeks to days or less;
- the attacker’s identity may never be known;
- systemic:
- risks that arise organically as a result of the introduction of a new science or technology;
- they may obsolete existing practices or methods of operation
- existing agents recognize that they must adapt or cease operation;
- impact can be limited to a specific area or industry or may affect whole societies;
- recent events are showing that uptake of CG4 by an increasing range of industries is unavoidable;
- current publicized reports suggest that CG4 will have society-wide impact across industry segments;
- theoretical:
- risks that may now be possible or practical where without CG4 would not have;
- heretofore new and novel capabilities result from the intrinsic nature of the tool;
- the severity of risk can be significantly to even existentially more serious;
By way of example we include a few examples of how CG4 can be expected to introduce new risk situations in the following actual or hypothetical considerations.
Malicious Risks. An increasingly frequent path of attack is to use electronic means to cause disruption or significant destruction to a target. Here are a few.
Stuxnet. In 2010 several analysts working for a major computer security software company discovered a new computer malware threat that they had never seen before. They came to call the malware by the name of the STUXNET virus. It proved to be a highly sophisticated and elaborate computer virus with a single highly specific target that it was aimed at and succeeded in attacking. Its operation focused on seizing control of the Supervisory Control and Data Acquisition system in certain programmable controllers. The targets were so extremely specific that it would only target controllers made by the Siemens company in Germany.
These were the control systems that regulated the centrifuge devices operated by the Iranian nuclear research facility. The STUXNET virus caused arrays of centrifuges to speed up and slow down using erratic patterns; the result was that roughly twenty percent of the Iranian centrifuge devices were damaged and rendered inoperable. This happened because they shook themselves apart; this all took place in such a way that the system operators were completely unaware of the fact that their system had been hijacked and was destroying itself. The result was that the Iranian nuclear research facility was set back in its goal of refining uranium to just below bomb grade by months to years;
Pegasus. The Israeli cyber-arms company NSO group is credited with the creation of the Pegasus spyware tool. It is capable of infiltrating either Apple IOS or Android mobile telephone operating systems; the infiltration leaves little or no traces that the devices has been infiltrated; it is capable of lurking on the target device while providing no indication of its presence or its operation; it is capable of reading text messages, tracking locations, accessing microphone or camera devices and collecting passwords;
Ransomware Attacks. According to the US FBI ransomware attacks have been on the rise in the past several years. Ransomware is a form of malicious software that locks a user out of their own data. An attacker then demands payment to release the data or risk its erasure. They are typically hidden in an email attachment, a false advertisement or simply by following a link.
Systemic Risks. The nature of the advance in science or technology will show impact in an industrial sector that is more likely to use traditional means of performing job or task related aspects as specified in a job description. There have been increasing numbers of reports that are showing that the impact of CG4 is disrupting an increasing number of so far stable job categories. Included are just a few.
Screen Writers Guild (USA). According to Fortune Magazine of May 5TH 2023, members of the Writers Guild of America (WGA) have gone on strike demanding better pay. They have expressed concern that CG4 will sideline and marginalize them going forward. According to Greg Brockman, president and co-founder of WGA:
Not six months since the release of ChatGPT4, generative artificial intelligence is already prompting widespread unease throughout Hollywood. Concern over chatbots writing or rewriting scripts is one of the leading reasons TV and film screenwriters took to picket lines earlier this week.
Teaching. Sal Kahn is the founder of Kahn Academy. The Kahn Academy is an online tutoring service that provides tutoring on a broad range of topics. Kahn reported on March 14th, 2023 in the KahnAcdemy blog that his technology demonstration to a group of public school administrators went very well. He emphasized that it went very well in fact. According to Kahn, one of the attendees reported that the capabilities of CG4 when used in the academic setting proved to be directly in line with their objects for developing creative thinkers. During their evaluation of this new capability a crucial concern was expressed that as AI technology develops that the risk of there becoming a widening chasm between those who can succeed and those who will not is increasing. This new technology offers hope that it will help those at greater risk to make the transition toward the a future in which technology and artificial intelligence will play an ever increasing role.
Lawyers. Legal professionals that have made use of CG4 have reported surprisingly sophisticated results when using CG4 as a support tool. In the March/April 2023 issue of The Practice, a publication of the Harvard Law School, Andrew Perlman, Dean of Suffolk University Law School reported that he believes that CG4 can help legal professionals in the areas of: research, document generation, legal information and analysis. His impression is that CG4 performs with surprising sophistication but as yet will not replace a person. But within a few years this can become an eventuality.
Theoretical Risks.
- Influence and Persuasion;
- Narratives: Highly realistic, plausible narratives and counter-narratives are now effortlessly possible; these might include:
- fake news: we should expect that these narratives will exhibit remarkable saliency and credibility; but in many cases will prove to be groundless; leading the elaboration of this area will probably be the development of divisive social/political narrative creation; i.e. fake news;
- screen plays: a remarkable capability that CG4 has shown itself capable of is in the creation of narrative that can be used for the creation of a screen play or novel; it is capable of generating; it is capable of generating seemingly realistic characters from just a few initial prompts; these prompts can be further elaborated upon and refined to the point that a very believable character can be generated; a set of characters can be created each of which has their own motives, concerns, flaws and resources; using a set of these fictitious characters it is entirely possible to create a story line in which they each interact with each other; hence a whole screen play or even possibly a novel can be developed in record time;
- immersive role play: along similar lines CG4 is capable of being used to create artificial environments that are suitable for online immersive role playing games; these environments can possess any features or characteristics imaginable; if one were to look a short bit forward in time the industry of interactive role playing games may well experience an explosion of new possibilities;
- Synthetic Personalities: given the resources in terms of time and insight a knowledgeable user can use CG4 to create a fictitious personality; this personality can be imbued with traits, habits of thought, turns of phrase, an autobiographical sketch of arbitrary depth and detail; it can then be invoked as an interaction medium to engage with a user; these can mean engaging with an artificial personality with broad insights about the world or much more narrow but deep insights into specific knowledge domains; interacting with such a fictitious or synthetic personality might bear a powerful resemblance to training a surprisingly sophisticated dog; except that in this case the “dog” would be capable of sustaining very high levels of dialog and interaction;
- Deep insights: existing analysis tools such as sentiment analysis will become increasingly sophisticated; as the do we should expect that they will be applied to public figures, especially legislators and others in positions of influence; these insights might be based upon public actions; in the case of politicians voting records, position papers and constituency analysis will be at the forefront of study;
- Compromise: access to detailed information about information about individuals of interest such as those with national security or defense related clearances will be favorite targets of malicious actors; the recent attack on the Office of Personnel Management is a foretaste of what is to come; by gaining access to information about individuals with highly sensitive clearances a foreign actor can position themselves to compromise, threaten or otherwise coerce specific individuals with clearances or people who are directly or indirectly related or associated with them;
- Deep Agent: based socio-cultural modeling and analysis (socioeconomic, political, geopolitical interaction analysis using multi-agent environments); a group of researchers at Stanford University and Google recently published a paper on how they created a version of the popular Sim World game. They created an artificial village with twenty five “inhabitants”. Each of these “inhabitants” or agents possessed motives, background and history, interior monologs and were able to create new goals as well as interact with each other; the results were startling; a significant development was that the system exhibited emergent properties that the developers had not originally expected; looking forward we can expect that these kinds of artificial environments will proliferate and improve their sophistication, often with a range of unexpected emergent properties;
- Narratives: Highly realistic, plausible narratives and counter-narratives are now effortlessly possible; these might include:
- Molecular Modeling.
- Inorganic (materials, pharmaceuticals such as dendrimer, mono-filament molecules); one can envision the identification of such novel developments as:
- room temperature superconducting materials: such a development would revolutionize societies in ways that cannot be fully characterized; another usage of such a capability might be in the fabrication of power storage capabilities; these forms of molecular combinations could result in storage batteries with power densities hundreds or thousands of times beyond those currently available; a battery the size of a loaf of bread might be capable of storing sufficient power to operate a standard home with all of its devices operating for days, weeks or longer;
- extremely high tensile strength materials: these might be derivatives of carbon nanotube material; but with much higher tensile strength; fibers made out of such material can be used as a saw blade; strands and weaves of such material could be used as a space elevator material; other uses might be in the use of nearly impervious shields such as bullet proof vests if woven into a fabric-like material and covered such that it did not endanger the wearer;
- novel psycho actives: using dendrimer technology one can envision fabricating combinations of pharmaceutical substances for highly specific and focused effects;
- Organic (biological) modeling capabilities (proteins, enzymes, hormones virus, bacteria, prions); the identification of molecular structures that enable the interdicting of metabolic failure can be envisaged; this could mean that new tools can emerge that to beyond the already remarkable CRISPR-CAS9 model and its derivatives; one can envision the creation of variants of molecular substances that mimic the hemoglobin molecule found in certain reptiles such as alligators or whales; these animals routinely demonstrate the ability to remain submerged for many minutes on end without resorting to returning to the surface to breathe;
- Combined novel molecular modeling capabilities (substances, pharmaceuticals) ; these materials may be the result of combining organic and inorganic molecular structures to arrive at a result with heretofore novel and unexpected properties and capabilities;
- Targeted Bioweapons: the ability to synthesize and model new molecular structures will be hastened with tools such as CG4; the rival company Deep Mind recently supported the effort to arrive at a SARS COVID-19 vaccine; the company used its Deep Fold 2 system to screen millions of possible vaccine molecular structures; the result was that it arrived at a small set of viable candidate molecular structures in a matter of days; equally possible would be molecular structures that were capable of causing debilitating physiological or psychological functioning;
- Inorganic (materials, pharmaceuticals such as dendrimer, mono-filament molecules); one can envision the identification of such novel developments as:
- Social Engineering.
- Industry models: targeted industry segment analysis – identification of bottlenecks, weak links, possible disruption points;
- Geopolitical models: selectively focus on global areas of interest; the objective being the creation of tools that enable the operator to “drive” a line of analysis or discourse forward based upon real world limitations, resources, historical realities and current political imperatives; an extension to Caspian Report;
- Boundaries exploration: these might emerge as compelling social, economic, political policy proposals grounded in common sense; possible ways to solve older, existing problems using recent insights into the mechanics, linkages and dynamics of observable processes;
- New value propositions: near term job market realignment, disruption; (increased social dislocation, disruption);
- Locus of Interest: emergence of position nexus ecology; crystallization of political polarization; these might be further developments of existing “channels” currently available on youtube.com; but would operate independently of that platform, but become accessible via a “white pages” type structure;
- Food Chain: emergence of specialist groups dedicated to supporting various actors in the nexus ecology; these will follow existing business development lines with market segmentation and brand identification; we should expect to see: markets with offerings that are priced as: high, best, low and niche;