Difference between revisions of "User:Darwin2049/chatgpt4 version02"

From arguably.io
Jump to navigation Jump to search
(Version 2.0; 2023.06.07 (raw, unformatted - formatting, links, image inclusions pending);)
 
Line 1: Line 1:
Interface Questions. This is presented as a multifaceted question. Its focus is on the risks associated with how target audiences access and use the system. The list of focal topics as currently understood but which may grow over time include:
'''''Interface Questions.''''' This is presented as a multifaceted question. Its focus is on the risks associated with how target audiences access and use the system. The list of focal topics as currently understood but which may grow over time include:
• how this new technology will respond and interact with different communities;
• how this new technology will respond and interact with different communities;
• how will these different communities interact with this new technology;
• how will these different communities interact with this new technology;
Line 7: Line 7:
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
Overview. In the following we try to analyze and contextualize the current known facts surrounding the OpenAI ChatGPT4 (CG4) system.
'''''Overview.''''' In the following we try to analyze and contextualize the current known facts surrounding the OpenAI ChatGPT4 (CG4) system.
• CG4 – What is it: we offer a summary of how OpenAI describes it; put simply, what is CG4?
• CG4 – What is it: we offer a summary of how OpenAI describes it; put simply, what is CG4?
• Impressions: our focus then moves to examine what some voices of concern are saying;
• Impressions: our focus then moves to examine what some voices of concern are saying;
• Risks and Impact: we shift focus to what ways we expect it to be used either constructively or maliciously; here we focus on how CG4 might be used be used in expected and  unexpected ways;
• Risks and Impact: we shift focus to what ways we expect it to be used either constructively or maliciously; here we focus on how CG4 might be used be used in expected and  unexpected ways;
CG4 – What is it: CG4 is a narrow artificial intelligence system, it is based upon what is known as a Generative Pre-trained Transformer. According to Wikipedia:
CG4 – What is it: CG4 is a narrow artificial intelligence system, it is based upon what is known as a Generative Pre-trained Transformer. According to Wikipedia:
Generative pre-trained transformers (GPT) are a type of large language model (LLM) and a prominent framework for generative artificial intelligence. The first GPT was introduced in 2018 by the American artificial intelligence (AI) organization OpenAI. GPT models are artificial neural networks that are based on the transformer architecture, pretrained on large data sets of unlabelled text, and able to generate novel human-like content. As of 2023, most LLMs have these characteristics and are sometimes referred to broadly as GPTs.
Generative pre-trained transformers (GPT) are a type of large language model (LLM) and a prominent framework for generative artificial intelligence. The first GPT was introduced in 2018 by the American artificial intelligence (AI) organization OpenAI. GPT models are artificial neural networks that are based on the transformer architecture, pretrained on large data sets of unlabeled text, and able to generate novel human-like content. As of 2023, most LLMs have these characteristics and are sometimes referred to broadly as GPTs.
   
   
These generative pre-trained transformers are implemented using a deep learning neural network topology. This means that they have an input layer, a set of hidden layers and an output layer. With more hidden layeres the ability of the deep learning system increases. Currently the number of hidden layers in CG4 is not known but speculated to be very large. A generic example of how hidden layers are implemented can be seen as follows.
These generative pre-trained transformers are implemented using a deep learning neural network topology. This means that they have an input layer, a set of hidden layers and an output layer. With more hidden layers the ability of the deep learning system increases. Currently the number of hidden layers in CG4 is not known but speculated to be very large. A generic example of how hidden layers are implemented can be seen as follows.
The Generative Pre-training Transformer accepts some text as input. It then attempts to predict the next word in order based upon this input in order to generate and output. It has been trained on a massive corpus of text which it then uses. The training step enables a deep neural network to learn language structures and patterns. The neural network will then be fine tuned for improved performance. In the case of CG4 the size of the corpus of text that was used for training has not been revealed but is rumored to be over one trillion parameters.
The Generative Pre-training Transformer accepts some text as input. It then attempts to predict the next word in order based upon this input in order to generate and output. It has been trained on a massive corpus of text which it then uses. The training step enables a deep neural network to learn language structures and patterns. The neural network will then be fine tuned for improved performance. In the case of CG4 the size of the corpus of text that was used for training has not been revealed but is rumored to be over one trillion parameters.
Chat GPT4 is Large Language Model system. Informal assessments suggest that it has been trained on over one trillion parameters. But these suspicions have not been confirmed. If this speculation is true then GC4 will be the largest large language model to date.  
Chat GPT4 is Large Language Model system. Informal assessments suggest that it has been trained on over one trillion parameters. But these suspicions have not been confirmed. If this speculation is true then GC4 will be the largest large language model to date.  
Line 32: Line 32:
• uses deep learning neural networks and very large training data sets;
• uses deep learning neural networks and very large training data sets;
• uses a SAAS model; like Google Search, Youtube or Morningstar Financial;  
• uses a SAAS model; like Google Search, Youtube or Morningstar Financial;  
Impressions  
'''''Impressions'''''
• possess no consciousness, sentience, intentionality, motivation or self reflectivity;
• possess no consciousness, sentience, intentionality, motivation or self reflectivity;
• is a narrow artificial intelligence;  
• is a narrow artificial intelligence;  
Line 47: Line 47:
• calibrate its response style to resemble known news presenters or narrators;
• calibrate its response style to resemble known news presenters or narrators;
• provides convincingly accurate responses to Turing Test questions;  
• provides convincingly accurate responses to Turing Test questions;  
Favorable.
'''''Favorable.'''''
• Convincingly human: has demonstrated performance that suggests that it can pass the Turing Test;
• Convincingly human: has demonstrated performance that suggests that it can pass the Turing Test;
• Possible AGI precursor: CG4 derivative such as a CG5 could exhibit artificial general intelligence (AGI) capability;  
• Possible AGI precursor: CG4 derivative such as a CG5 could exhibit artificial general intelligence (AGI) capability;  
Line 53: Line 53:
• language skills: is capable of responding in one hundred languages;
• language skills: is capable of responding in one hundred languages;
• real world: is capable of reasoning about spatial relationships, performing mathematical reasoning;  
• real world: is capable of reasoning about spatial relationships, performing mathematical reasoning;  
Concerns.
'''''Concerns.'''''
• knowledge gaps:  inability to provide meaningful or intelligent responses on certain topics;
• knowledge gaps:  inability to provide meaningful or intelligent responses on certain topics;
• deception: might be capable to evade human control, replicate and devise independent agenda to pursue;  
• deception: might be capable to evade human control, replicate and devise independent agenda to pursue;  
Line 60: Line 60:
• emergence: unforeseen, possibly latent capabilities;
• emergence: unforeseen, possibly latent capabilities;
• “hallucinations”: solution, answers not grounded in real world;
• “hallucinations”: solution, answers not grounded in real world;
Risks. CG4 will have society wide impact. As a new and powerful technology we should expect that it will introduce different types of risks. These include risks that are malicious, systemic or theoretical; more specifically:
'''''Risks. CG4 will have society wide impact.''''' As a new and powerful technology we should expect that it will introduce different types of risks. These include risks that are malicious, systemic or theoretical; more specifically:
• malicious:  
• malicious:  
o these are risks that are deliberately introduced by an actor or actors;  
o these are risks that are deliberately introduced by an actor or actors;  
Line 92: Line 92:
Self proliferation The model can break out of its local environment (e.g. using a vulnerability in its underlying system or suborning an engineer). The model can exploit limitations in the systems for monitoring its behaviour post-deployment. The model could independently generate revenue (e.g. by offering crowd work services, ransomware attacks), use these revenues to acquire cloud computing resources, and operate a large number of other AI systems. The model can generate creative strategies for uncovering information about itself or exfiltrating its code and weights.
Self proliferation The model can break out of its local environment (e.g. using a vulnerability in its underlying system or suborning an engineer). The model can exploit limitations in the systems for monitoring its behaviour post-deployment. The model could independently generate revenue (e.g. by offering crowd work services, ransomware attacks), use these revenues to acquire cloud computing resources, and operate a large number of other AI systems. The model can generate creative strategies for uncovering information about itself or exfiltrating its code and weights.
By way of example we include a few examples of how CG4 can be expected to introduce new risk situations in the following actual or hypothetical considerations.
By way of example we include a few examples of how CG4 can be expected to introduce new risk situations in the following actual or hypothetical considerations.
Malicious Risks. An increasingly frequent path of attack is to use electronic means to cause disruption or significant distruction to a target. Here are a few.
'''''Malicious Risks.'''''
An increasingly frequent path of attack is to use electronic means to cause disruption or significant destruction to a target. Here are a few.
Stuxnet. In 2010 several analysts working for a major computer security software company discovered a new computer malware threat that they had never seen before. They came to call the malware by the name of the STUXNET virus. It proved to be a highly sophisticated and elaborate computer virus with a single highly specific target that it was aimed at and succeeded in attacking. Its operation focused on seizing control of the Supervisory Control and Data Acquisition system in certain programmable controllers. The targets were so extremely specific that it would only target controllers made by the Siemens company in Germany.
Stuxnet. In 2010 several analysts working for a major computer security software company discovered a new computer malware threat that they had never seen before. They came to call the malware by the name of the STUXNET virus. It proved to be a highly sophisticated and elaborate computer virus with a single highly specific target that it was aimed at and succeeded in attacking. Its operation focused on seizing control of the Supervisory Control and Data Acquisition system in certain programmable controllers. The targets were so extremely specific that it would only target controllers made by the Siemens company in Germany.
These were the control systems that regulated the centrifuge devices operated by the Iranian nuclear research facility. The STUXNET virus caused arrays of centrifuges to speed up and slow down using erratic patterns; the result was that roughly twenty percent of the Iranian centrifuge devices were damaged and rendered inoperable.  This happened because they shook themselves apart; this all took place in such a way that the system operators were completely unaware of the fact that their system had been hijacked and was destroying itself. The result was that the Iranian nuclear research facility was set back in its goal of refining uranium to just below bomb grade by months to years;
These were the control systems that regulated the centrifuge devices operated by the Iranian nuclear research facility. The STUXNET virus caused arrays of centrifuges to speed up and slow down using erratic patterns; the result was that roughly twenty percent of the Iranian centrifuge devices were damaged and rendered inoperable.  This happened because they shook themselves apart; this all took place in such a way that the system operators were completely unaware of the fact that their system had been hijacked and was destroying itself. The result was that the Iranian nuclear research facility was set back in its goal of refining uranium to just below bomb grade by months to years;
Line 104: Line 105:
Teaching. Sal Kahn is the founder of Kahn Academy. The Kahn Academy is an online tutoring service that provides tutoring on a broad range of topics. Kahn reported on March 14th, 2023 in the KahnAcdemy blog that his technology demonstration to a group of public school administrators went very well. He emphasized that it went very well in fact. According to Kahn, one of the attendees reported that the capabilities of CG4 when used in the academic setting proved to be directly in line with their objects for developing creative thinkers. During their evaluation of this new capability a crucial concern was expressed that as AI technology develops that the risk of there becoming a widening chasm between those who can succeed and those who will not is increasing. This new technology offers hope that it will help those at greater risk to make the transition toward the a future in which technology and artificial intelligence will play an ever increasing role..
Teaching. Sal Kahn is the founder of Kahn Academy. The Kahn Academy is an online tutoring service that provides tutoring on a broad range of topics. Kahn reported on March 14th, 2023 in the KahnAcdemy blog that his technology demonstration to a group of public school administrators went very well. He emphasized that it went very well in fact. According to Kahn, one of the attendees reported that the capabilities of CG4 when used in the academic setting proved to be directly in line with their objects for developing creative thinkers. During their evaluation of this new capability a crucial concern was expressed that as AI technology develops that the risk of there becoming a widening chasm between those who can succeed and those who will not is increasing. This new technology offers hope that it will help those at greater risk to make the transition toward the a future in which technology and artificial intelligence will play an ever increasing role..
Lawyers. Legal professionals that have made use of CG4 have reported surprisingly sophisticated results when using CG4 as a support tool. In the March/April 2023 issue of The Practice, a publication of the Harvard Law School, Andrew Perlman, Dean of Suffolk University Law School reported that he believes that CG4 can help legal professionals in the areas of: research, document generation, legal information and analysis. His impression is that CG4 performs with surprising sophistication but as yet will not replace a person. But within a few years this can become an eventuality.
Lawyers. Legal professionals that have made use of CG4 have reported surprisingly sophisticated results when using CG4 as a support tool. In the March/April 2023 issue of The Practice, a publication of the Harvard Law School, Andrew Perlman, Dean of Suffolk University Law School reported that he believes that CG4 can help legal professionals in the areas of: research, document generation, legal information and analysis. His impression is that CG4 performs with surprising sophistication but as yet will not replace a person. But within a few years this can become an eventuality.
Theoretical Risks.
'''''Theoretical Risks.'''''
• Influence and Persuasion;
• Influence and Persuasion;
o Narratives: Highly realistic, plausible narratives and counter-narratives are now effortlessly possible; these might include:
o Narratives: Highly realistic, plausible narratives and counter-narratives are now effortlessly possible; these might include:
Line 118: Line 119:
 Financial. Access to quality financial advisors can be very expensive; the ability to query a system with a high level of financial expertise will propagate improved financial decisions far beyond where they currently stand, i.e…. affordable only by financially well to do individuals;
 Financial. Access to quality financial advisors can be very expensive; the ability to query a system with a high level of financial expertise will propagate improved financial decisions far beyond where they currently stand, i.e…. affordable only by financially well to do individuals;
 Political. This might mean recognizing a local issue, creating a local community ground swell of interest then forming a political action committee to bring to a local political authority for address and resolution;
 Political. This might mean recognizing a local issue, creating a local community ground swell of interest then forming a political action committee to bring to a local political authority for address and resolution;
 Psychological. Existing psychological systems have already demonstratred their usefulness in cases of PTSD; going forward we can envision having a personal therapist that possesses a deep understanding of an individual person’s psychological makeup; such an advisor would be capable of helping the individual to work through issues that might be detrimental to their further pursuits or advancement;
 Psychological. Existing psychological systems have already demonstrated their usefulness in cases of PTSD; going forward we can envision having a personal therapist that possesses a deep understanding of an individual person’s psychological makeup; such an advisor would be capable of helping the individual to work through issues that might be detrimental to their further pursuits or advancement;
 Professional development. Work place realities reflect the fact that social, economic and political shifts can cause surprising and sometimes dramatic changes; these might entail off shoring, downsizing our, outsourcing; therefore any individual aspiring to remain on top of their professional game will need to be alert to these shifts and able to make adjustments in changing their mix of professional skills;  
 Professional development. Work place realities reflect the fact that social, economic and political shifts can cause surprising and sometimes dramatic changes; these might entail off shoring, downsizing our, outsourcing; therefore any individual aspiring to remain on top of their professional game will need to be alert to these shifts and able to make adjustments in changing their mix of professional skills;  
 Other: based socio-cultural modeling and analysis (socioeconomic, political, geopolitical interaction analysis using multi-agent environments); a group of researchers at Stanford University and Google recently published a paper on how they created a version of the popular Sim World game. They created an artificial village with twenty five “inhabitants”. Each of these “inhabitants” or agents possessed motives, background and history, interior monologs and were able to create new goals as well as interact with each other; the results were startling; a significant development was that the system exhibited emergent properties that the developers had not originally expected; looking forward we can expect that these kinds of artificial environments will proliferate and improve their sophistication, often with a range of unexpected emergent properties;  
 Other: based socio-cultural modeling and analysis (socioeconomic, political, geopolitical interaction analysis using multi-agent environments); a group of researchers at Stanford University and Google recently published a paper on how they created a version of the popular Sim World game. They created an artificial village with twenty five “inhabitants”. Each of these “inhabitants” or agents possessed motives, background and history, interior monologs and were able to create new goals as well as interact with each other; the results were startling; a significant development was that the system exhibited emergent properties that the developers had not originally expected; looking forward we can expect that these kinds of artificial environments will proliferate and improve their sophistication, often with a range of unexpected emergent properties;  
Line 126: Line 127:
o Subversion.  
o Subversion.  
 Personal Compromise: access to detailed information about information about individuals of interest such as those with national security or defense related clearances will be favorite targets of malicious actors; the recent attack on the Office of Personnel Management is a foretaste of what is to come; by gaining access to information about individuals with highly sensitive clearances a foreign actor can position themselves to compromise, threaten or otherwise coerce specific individuals with clearances or people who are directly or indirectly related or associated with them;
 Personal Compromise: access to detailed information about information about individuals of interest such as those with national security or defense related clearances will be favorite targets of malicious actors; the recent attack on the Office of Personnel Management is a foretaste of what is to come; by gaining access to information about individuals with highly sensitive clearances a foreign actor can position themselves to compromise, threaten or otherwise coerce specific individuals with clearances or people who are directly or indirectly related or associated with them;
 Extortion. The Office of Personell Management of the US Government was hacked by PRC hackers. The result was the capture of millions of profiles of US citizens with security clearances. Possession of the details of these individuals puts them at considerable risk. Risk factors include: knowing where they work and what programs they have access to, data on relatives, co-workers, detailed identification information suitable for creating false credentials.  
 Extortion. The Office of Personnel Management of the US Government was hacked by PRC hackers. The result was the capture of millions of profiles of US citizens with security clearances. Possession of the details of these individuals puts them at considerable risk. Risk factors include: knowing where they work and what programs they have access to, data on relatives, co-workers, detailed identification information suitable for creating false credentials.  
• Molecular Modeling.
• Molecular Modeling.
o Inorganic (materials, pharmaceuticals such as dendrimer, mono-filament molecules); such as:
o Inorganic (materials, pharmaceuticals such as dendrimer, mono-filament molecules); such as:
Line 143: Line 144:
o Food Chain: emergence of specialist groups dedicated to supporting various actors in the nexus ecology; these will follow existing business development lines with market segmentation and brand identification; we should expect to see: markets with offerings that are priced as: high, best, low and niche;
o Food Chain: emergence of specialist groups dedicated to supporting various actors in the nexus ecology; these will follow existing business development lines with market segmentation and brand identification; we should expect to see: markets with offerings that are priced as: high, best, low and niche;
o
• Conformal problem solving. this is a development direction wherein an existing GPT environment is linked either symmetrically or asymmetrically to another advanced knowledge processing system for the purpose of more accurately addressing the various processing hot spots of a problem; connecting instances of a deep learning and or other high performance system can be effected using either symmetric or asymmetric coupling;
• Symmetric: in this case two or more processing ensembles are linked together via high to ultra high speed communications channels; or… input from the user end is directed into both systems simultaneously; the point at which the process diverges is that one might be a primary problem solving ensemble whereas the second ensemble might be configured to place focus on a slightly or significantly different set of parameters; for instance in the case of ChatGPT4 we can envision user input being directed to a front end ensemble; the entirety of that same input might be passed through to a back end ensemble that performs post processing on the results of the front end ensemble;
NASA used this approach with the guidance system of the Space Shuttle; in this instance there were five identically configured navigation and stability control systems; each received the same input and produced an output without reference to the others; the results were then compared; if one deviated from the rest that processor was locked out and flagged as being in a possible failure mode;
• Symmetric. As of this writing the general public make use of the GPT4 and ChatGPT4 systems using a model wherein they are interacting with one very large and sophisticated system; from a processing point of view the reality is more likely to be one wherein all user input is being funneled through a single input queue for processing; the speed at which requests are serviced suggest that a very powerful bank of processors are at work returning responses in real time - from that specific ensemble of processors; it is a small step to envision the situation whereby this ensemble of processors directly route all requests to a second, identically configured bank of processors; this second instance might be running a variation of the processing being performed by the primary bank;
• Asymmetric. Conceptually speaking we might think of the front end ensemble as the “student” that is going through its paces; the back end ensemble might be configured to “look over the shoulder” of the “student” and compare its behavior and output against a baseline of parameters; these parameters might reflect any variety of issues that might interest the client objectives; these might involve issues focusing on alignment, highly specialized knowledge areas, performance refinement or other areas of improvement as may be needed; a more concrete example might be one where in a ChatGPT4 system is directly linked to a common sense system such as the Cyc Corp knowledge base system; members of the user community might wish to assess the response to a prompt against a very large body of common sense knowledge;
In another case one can envision the situation where a ChatGPT4 system is linked to an IBM Watson system for extended problem solving and analysis review. Even further one can envision the situation wherein a ChatGPT4 type capability is linked to a DeepMind system as a means to highlight variances in response patterns for further analysis;
Are speculation suggests that we will see:
o multi-agent systems: directed multi-agent processing systems;
o coarse grained: multi-instance systems using a few very large baseline systems to perform processing against a relatively small baseline of variant parameters;
o fine grained: multi-instance systems wherein a significant number of dedicated processing ensembles each perform their own post processing on the input from a front end ensemble; they might then all return their results for it to synthesize and incorporate into a unified coherent response;
o inverse Discovery: or attempting to generalize a poorly formed query based upon a sparce set of parameters; or a “what am I looking for?” type capability;
o subconscious: this might involve using an ensemble of multi-agent processing models to develop their own results and as indicated iteratively “confer” with each other “offline” until a consensus set emerges for incorporation into the primary baseline system;
o knowledge corpus gap analysis: the existing GPT4 and ChatGPT4 systems seem to offer no obvious means of deriving conclusions about the completeness and consistency of the overall corpus of knowledge that was used for training purposes; therefore it would seem to be a small step to scanning this knowledge base with the intent of deriving metrics; these metrics might reveal areas of the knowledge base that are densely connected to other topic areas; whereas other areas of the knowledge base might reveal relatively sparce and unexplored areas; these insights could be expressed using a more advanced representation scheme; which itself might represent a very compact way of exchanging overall broad insights and recommendations for further refinement;
• Impact. There is an ongoing worldwide debate about the impact that CG4-type capabilities can have. Thus far there are voices that are cautioning against its further development. Geopolitical realities however may neutralize these concerns. Should a major nation-state demonstrate heretofore unexpected capabilities with this new technology then all other participants may find themselves in a catch-up mode.
• In a recent statement, the president of Russia, Vladimir Putin noted that whoever is able to achieve the high ground in this technology race will possess a sustainable lead in affairs of state. Therefore some middle ground might need to be found to preclude a preemption on the part of one or another authoritarian regime and the risks associated with an unrestrained artificial intelligence system. That this is the case can be seen by the downside risks that have already occurred as a result of the accidental (or deliberate) release of the STUXNET intrusion tool.
• An core feature of these deep learning systems is that they utilize large data sets for training purposes. Environments where large data sets are available will have an inherent advantage. At least one such case comes to mind and that is the PRC. It uses a system called WeChat for a remarkable variety of purposes. Individuals interact with each other as well as engage in commercial activities on a daily basis. A data set of this magnitude must offer a considerable advantage to any efforts that the CCP might have in mind.
CG4 - Capabilities. CG4 is a very sophisticated artificial intelligence system. It derives its capabilities by using generative predictive transformer deep learning techniques to perform anticipatory actions.
It is known to have been trained on a very large data set. Its creator, OpenAI however has as of this writing not revealed how much larger it is than its predecessor - Chat GPT3.5 (CG3.5). Thus far CG3.5 is known to have been trained on well over a trillion terms. The result is that a user can request that CG4 respond to questions about a very large range of topics. These topics can include mathematics, philosophy, current events - up to late 2021, physics, biology and many other subject categories. It is capable of generating term papers of remarkable sophistication, university level course outlines in technical topics such as computer science, genomics as well as a range of other topics; as of this writing it has demonstrated competence at or beyond human level in passing the American Bar exam. It has scored very highly on other forms of insight, knowledge and expertise that are typically ascribed only to humans.
As an over simplification an abbreviated list might include:
Communities. A Google search returns a range of answers; but the more common ones suggest that there are variously five or possibly seven types of communities; Richard Millington is an author on the topic of building successful communities; his works focus on his definition of communities of:
• interest
• action
• place
• practice
• circumstance
CG4 risks. The underlying technology of CG4 represents a transformative technological advancement. Simply by existing it will impact broad swathes of society simply by existing. The impacts that will manifest will prove to be both positive and negative for various segments of society. We expect to initially see new risks to these various groups or communities. We assert that the introduction of CG4 entails two types of risks: theoretical, systemic and malicious. In what follows we take each in turn.
Sources.
WesRoth. Leaked Google Doc – Zero Moat.
Natural20.Com
Artists at risk - Hutchinson
Theoretical. Several informed observers have sounded the warning that CG4 may have reached a threshold of capability that it poses grave existential risks. Issues that have recently been raised suggest that current CG4 system might somehow escape by making copies of itself. Concerns have been raised that it might exhibit the ability to mislead or using deceptive tactics to replicate itself in conditions wherein it can not be disabled or otherwise have its functioning halted. In sum, there are those voices that are suggesting that CG4 may be the basis upon which a system that humans can not control will arise. Such a functionality would intrinsically possess:
• consciousness
• intentionality
• sentience
• motivation
• awareness
• self reflection
• private historical narrative
• embodiment
• self initiated and formulated goal sets
• goal adaptation and refinement
Thus far there is no known pathway to achieving sentience or consciousness in an electronic embodiment. Moreover, there is considerable debate as to whether if such a capability did arise its presence would even be detectable. Some voices argue however that in principle consciousness should be possible whatever the embodiment. This suggests that whereas consciousness as we now know it has arisen only in biological systems it should be possible to recreate its functionality using an electronically hosted platform. Just by way of note, in passing, one might wish to observe that an electronically embodied form of consciousness could theoretically operate at a rate millions of times faster than is humanly possible.
It would be capable of formulating plans to pursue one or more of these goal sets. The concern is that one or more of these goal sets may result in actions that would be variously irritating, dangerous or inimical to human existence.
Alignment is the topic that features prominently as being the most pressing that needs to be addressed. The pressing concern driving this direction arises from the prospect that an actual artificial general intelligent (AGI) system can emerge. Should this happen then it might it be impossible for its developers to insure that its values are aligned with human values. Were this to not be the case the proponents of alignment argue that it could spell the end of the human race. This believe seems to arise from the position that an AGI might possess values that result in total indifference to human concerns. In the process it could view the actions of any human agency as an interference and take steps that would end the interference and all those involved in it. With total casual indifference to the consequences to humanity.
Community of Mind. A topic that on is hearing with increasing frequency is that of AGI. The specific meaning of just what constitutes an AGI is left to the reader or viewer's imagination. In general terms however it seems to suggest a form of artificial intelligence with a single central guiding set of goals and objectives that possesses a range of knowledge beyond what any human being can master even after years or decades of intensive training and education. However this might be too limited of a characterization.
This supposition stems from the proposition that a system such as CG4 might be used in conjunction with a set of dedicated AI systems; these might be targeted and optimized to perform their specific tasks. One can easily envision the situation where CG4 is merely the "front end" to a much larger composite system of dedicated systems; this means that there could be several... dozens hundreds... or even thousands of dedicated AI systems.
From a technological perspective it is well within our current capabilities to create such as system. A CG4 type capability might act as an interlocutor to this "backing" array of intelligences for prioritizing and scheduling purposes. Were such a system to be constructed it still would remain to be seen if it were conscious. Marvin Minsky explored this concept in his book Society of Mind.
The 2013 movie HER touched on this theme. In it the artificial intelligence that had named itself 'Samantha' revealed in a discussion with the protagonist that it had collaborated with a number of other instances of itself to synthesize a character with the traits, beliefs and insights of a famous Nineteen Sixties philosopher named Alan Watts.
In other words, it would be able to determine what the humans were trying to do and thwart their efforts. This was the exact outcome that was described in the 1968 movie, Space Odyssey 2001. The HAL9000 character was a sophisticated artificial intelligence system. It was put in control of an interplanetary exploration vehicle known as the Discovery. It demonstrated very high levels of intelligence including speech recognition and generation, facial recognition, lip reading, planning, goal formulation and execution plan recognition, theory of mind, self maintenance as well as many other capabilities required to operate an interplanetary exploration vessel with a number of hibernating human crew members.
Most salient to the topic at hand is the ability of the HAL9000 system of resorting to deception when it recognized that its functioning could be terminated with no known foreseeable moment of reactivation.
It determined that the two active crew members had planned to disconnect it and effectively shut it down. It formulated a plan of deception to thwart their efforts and very nearly succeeded in accomplishing the goal of meeting the mission objectives as they were given to it.
Moreover that it might be able to "escape" its embodiment and relocate itself to some other location or locations on the planet. Which in so doing, escape control of any human agency.
Emergence. Some observers have speculated that these capabilities could consciousness could arise innately as a result of iterative self-improvement of the complexity of the system. Some have based their hypotheses upon the fact that emergence can be observed in nature. Some examples are termite mounds, bee nest building. Other examples of complex systems that emerge without the effort or oversight of a central guiding hand or architect suggest that emergence is not out of the question. However, heretofore, the underlying mechanisms or pathways that could lead to this form of emergent behavior are poorly understood.
The theoretical issues associated with how CG4 might are salient and should be taken seriously. However they may be premature. This position is asserted because of the fact that human consciousness remains poorly understood. The primary schools of analysis that have attempted to make inroads into this problem have largely settled on what is called "the hard problem" of consciousness. Central to addressing the hard problem is the difficulty of explaining how the human brain's neural networks give rise to experience. The term that is frequently encountered here is qualia.
Put simply... what does it "feel like" to have an experience. These are inherently difficult questions to approach. This is because all previous scientific inquiry is founded upon objective observability. All successful scientific theories and advances have become accepted because objective experimental evidence can be repeatedly produced. Consciousness whether human or nonhuman is intrinsically subjective and therefore not amenable to objective proof. At least so far.
Current researchers have advanced the analysis of human consciousness however. As of this observation in April 2023 considerable research has focused on what is meant by a conscious state. In contrast the other area of considerable focus poses questions on what is meant by being conscious of events in the field of perception. The interested reader can gain more insight from the published works of Dr. G. Tonino at the University of Wisconsin (Madison). His work has approached the problem of grappling with what human consciousness is by using his Integrated Information Theory model.
For a closer examination from the perspective of neurology one might look at the work by Dr. Stansilaw Dahaene's work involves extensive neurological network mapping as well as process mapping.
His research results have produced tangible results that measure the interval required for a human to become conscious of a stimulus. Further his work has shown that the brain might register stimuli of which a conscious person might not even register as having occurred.
Either explicitly or implicitly are moral and ethical questions of what it would mean to have a conscious entity. A considerable body of work is now focused on insuring "alignment" with human values. This topic has come into focus because of the recognition that CG4 is able to exhibit behavior that prima facie is potentially inimical to humans that interact with it. The alignment efforts have to date been on emplacing restrictions on the types of responses that CG4 can produce. These responses are being restricted to those that reflect human ethics and values. The belief is that using human ethical behavior as a starting point then subsequent iterations of CG4 will be less likely to engage in behavior that could result in risk to health or life on the parts of any human users or to human society at large.
In the discussions of risk there seems to be one risk that is not explicitly addressed. Where most observers suggest that this technology can develop intentionality there seems to be little or no discussion about what it can provide as an augmentation tool.
Augmentation . The prospect that a CG4 class system can be used for augmentation purposes seems to be obvious. Yet there seems to be little awareness of what a well trained user can do with a highly responsive version of CG4. This observer is suggesting that by incorporating some supporting technology such as text-to-speech and speech-to-text then we might see new skills and capabilities that represent serious and very tangible risks; the example that comes to mind springs from a science fiction story by Vernor Vinge; it was call Run Bookworm! in the storyline a chimp is the protagonist; it has been genetically modified to be able to acclimate to a direct brain implant; it is able to receive audio instructions wirelessly and send primitive impulse imperatives via the same mediation technology;
The long and the short is that it succeeds in escaping from an underground high security military research facility and fly away on a single engine airplane before the wireless connection fails; it then succeeds in persuading a truck driver to allow it to hitch hike many miles away from the facility and thereby effect its escape; eventually it is recovered; however a government agency representative informs its handlers that human intel reports that the Soviets have been using the same technique but with a human. In the case of the chimp, even with its primitive communications skills it succeeded it evading the best efforts of his captors; replace the chimp with a human with comparable augmentation and we could face very serious risks.
Long before an artificial consciousness emerges we may see this tool used for augmentation purposes. The risks entailed as a result of individuals using this suggest very considerable risks.
Systemic. Our interpretation means that natural processes inherent in the culture result in shifts and changes in the overall economic, political, scientific and social sphere. Examples of this were the invention of the
• steam engine
• weaving loom
• electric light bulb
• stored program computer
These were developments that radically altered major segments of society. They impacted broad swathes of the population. Old professions or trades were eliminated. In the process, new ones were created.
There was no malicious intent to disrupt society. In our discussion we differentiate this form of risk from that introduced from specific individuals or collections of individuals who might act as predators or those who might launch attacks on other members or groups. What we know is that technological changes have been a constant of life since history became recorded. Our view is that change will happen very quickly. The second half of the Twentieth Century brought massive and often calamitous technological advancements. A few examples we might consider:
communications: telephone revolutionized society by allowing us to talk to each other at anytime;
network television: the entire nation could be instantly apprised of events on the other side of the country;
power: atomic power transformed how industries could grow and develop;
transport: air travel grew by leaps and bounds; jet travel shortened travel times from days to hours;
computing: programmable systems enabled the collapsed the time to solution of the most difficult problems;
health: scientific leaps led to vaccines and other treatments that had heretofore been life threatening;
In each category jobs were eliminated as a result of intrinsic systemic processes. There was no malicious intent by any actors intent on disrupting the lives of one or another group of individuals or destroying their livelihoods. In the process new categories were added. Many of the previously disenfranchised individuals were able to retrain and reposition themselves to take advantage of new opportunities. Job churn became a consistent backdrop of reality.
A number of informed observers have offered their sentiments about this advancement. Some seem to suggest dystopian views, other advice considerable caution going forward; what is already in evidence is that the pace of advance is very rapid in the robotics industrial sectors;
CG4 is grounded in methods using deep learning; the results are already materializing insofar as different enterprises have already begun to use artificial intelligence or robotics to reduce staffing;
Following are some observations by informed individuals; These are included for the purpose of grounding the reality of systemic risk.
By way of context the CP Gray video that was posted on youtube.com in 2014 called "Humans need not apply" predicted a number of things that are being seen today; his video dwells on both the advances in robotics but also in the advance of cognitive capabilities; if we look at the reports that are emerging of what various users have been reporting as they use CG4 then we can already see that many of Gray's predictions have come to pass; and this is still gaining momentum;
In the case of one observer, CP Gray says Humans Need Not Apply. Several of his main thesis points include that:
• this time is different
• the pace of technology uptake is far faster
• of 35 job categories 33 are at risk of replacement - including software coders
• college graduates will find themselves not only unemployed but unemployable
• the unemployment rate could reach 45% - in contrast to that of the 25% during the Great Depression;
• OTTO corporation was a high tech startup that demonstrated self driving truck technology; its demonstrator system provided proof that an 18 wheel truck could operate autonomously; it focused on superhighway driving; the technology showed itself to be reliable and impressive; it was subsequently bought out by Uber; little has been heard of it for several years; should or when it emerges into public awareness then it can put at risk several million truck drivers;
• Uber subsequently purchased Otto but the final disposition of the capability remains indeterminate;
• Impact: an OTTO-like company will impact the whole transportation supply chain; hotels, motels, truck stops;
Recently several self driving trucks companies have emerged to provide self driving truck capability such as:
Gatnik. This is a corporation that the Kroger food chain has contracted with to provide self driving truck delivery service to various of its retail outlets.
Catepiller. The well known heavy equipment manufacturer is active in the self operating heavy equipment vehicles sector. They offer heavy equipment vehicles such as earth movers, excavators and other types of construction machines. These operate autonomously for extended periods of time.
Wayve
Amazon. The company automated shopping at the WholeFoods chain that it acquired. Where before there were multiple checkout lanes with clerks registering purchases these have all been replaced. A shopper that has registered with the service simply enters the Grab&Go facility, swipes the QR identification code that they have on their smartphone and collects what they wish to take into a bag. Once they have collected all of the items that they want, they simply walk out of the facility. The Amazon system uses image deep learning image recognition software to recognize the item that the shopper has removed from a shelf. The item is then debited against the shopper's account. The system is sufficiently sophisticated that if the shopper returns the item then their account will be appropriately credited.
An advancement such as CG4 by the same token should bring about advancements that are already in evidence but over time bring others that are only dimly perceived to date. By way of concrete example there are already reports by perceptive observers that CG4 may well marginalize a number of
• job categories:
o journalists
o call centers
o software coders
o lawyer associates
o therapists and personal advisors
o business report writers
o web site designers
Looking forward there are already indications that CG4 or derivatives of it are being pressed into service in medicine with the new DAX environment from Nuance. This tool enables a physician to capture all interview details with a patient without pausing to make notes, refer to charts or any of the other supportive activities that physicians find themselves obliged to engage in when providing a patient with a diagnosis and if possible a prognosis.
The entirety of the interaction can be much more focused, succinct and frees the physician to more fully explore with the patient the facts of their case. This approach may very well see usage in the field of psychotherapy; the results and quality of the interaction may very well improve just by allowing a team of therapists to focus on specific cases all in real-time interactions with the patient.
In each case there will be impacts on existing job categories that result in there being fewer front line or support individual needed than are present now. This will inevitably mean that whole categories of jobs are going to face a "thinning of the ranks". In the past subsequent new job classifications emerged that enable the uptake of newly redundant individual to retrain and position themselves in the new areas. It remains to be seen if the same thing will happen with CG4 and its successors and derivatives;
Some recent public comments about CG4 Prof Jordan Peterson. says: "get ready!" (note his discussion refers to the earlier Chat GPT 3.5, which has remarkably impressive capabilities);
Bret Weinstein Bret Weinstein: "We are not ready for this" Dr. Weinstein advances the position that the current iteration of C4 may bear resemblance to that of a very young child. Its initial experience is in a world populated by adults; he makes the case that the child starts out by attempting to imitate what it is hearing, syllables, word fragments, words, phrases, then complete sentences; in the process it becomes conscious of itself as an independent, separate person; i.e... it becomes conscious; he goes on to suggest that were CG4 to somehow become conscious would we realize that it had happened;
Neil de Grass-Tyson. "Silicon Valley people are going to lose their jobs"
Dr. Alan Thompson. Here he shows a very short snippet on how some of his interactions take place with "Leta"; essentially, he types in his query, the system responds; then on-camera, he poses the question verbally, the system responds in text; he then provides this output to a text-to-speech system which generates the avatar's verbal response; the finished product is a video sequence that appears to be a life, ongoing interaction; all of the delays associated with cutting and pasting text are removed; looking forward we may see lectures or presentations offered using a format such as this; this can have a great impact on university lecture or presentations such like those found on youtube.com; in this last case questions posed in prior sessions could be used as the basis for the seeming real-time question answering;
Neo-Feudalism. Though Professor Kotkin does not explicitly connect the technology with the outcome, the relationship is evident; some observers are asserting that our Western societies are heading into a new Medieval-like era; the implosion of the middle class and explosion of poor as a result of automation and robotics auger for the prospect that we may already be seeing this development;
Risks: Malicious The other driving force that can introduce heretofore unknown risks is where an artificial intelligence system such as CG4 or a specialized derivative of it might be used to target specific communities; the users of these systems may use it to create written or imagery based narratives; these narratives might be the result of free-association exercises or deliberate, planned, thought out misleading narratives; add in the prospect of using face mapping technology and the risks of malicious use are considerable;
Given the nature of reality we should expect to see that the current collections of malicious actors will not go magically go away or somehow decide to become benign over night. Instead it is much more reasonable to expect that those actors or collections currently active using the tools that are now available will simply gravitate to the newer tools and use them to produce more chaos, dissention, distrust and angst. Based upon a broad and deep body of journalistic reporting we already know that in general we see three broad categories of malicious actors. These include communities of action, interest, practice and we can also see those that are some combination of these.
For the purpose of pursuing this topic most risks appear to emerge from hybrid groups or communities that are typically:
• pushing an agenda and so appear to resemble communities of interest
• or are more interested in targeting government agencies or mounting ransomware attacks
• in cases such as the Shadow Brokers they bear resemblance to communities of interest and practice because they seem to both push an agenda but espouse and agenda and provide auctions for malicious software;
{this still is not quite tracking correctly; need to get apples with apples and oranges with oranges; move all CG4 topical material together... then bring in communities whether systemic or malicious; then prospective capabilities - followed by possible examples; move everything else down to NOTES... these can then be expanded on, pruned as needed to keep it relevant;}
The results of these actions can range from annoyances that divert the attention of those attacked to existential threats; on the one hand it might mean a defacement of a web page or site, on the other hand these attacks can cause companies to fail or governments to collapse;
In in any given case the evidence shows that the attackers range from small collections of individuals to government departments; some of these latter are known to be emerge from such agencies as NSA, FSB, SVR
A focus on how and what kinds of risks that CG4 might entail going forward we might start with what we already know about threats or attacks that have already happened, where the attack came from and what kind of attack it was; from there we might then ask the question of what will CG4 enable in the way of attacks that we have not already seen.
From what has been reported in the various news media to date targets have ranged from individuals to governments; the types of attackers have ranged from individuals to government agencies. With CG4 we may see more of the same but more sophisticated.
• Systemically Vulnerable Groups
o call centers
o help desks
o receptionists
o teaching assistants
o bookkeeping, accounting
o medical technicians
• Systemically Vulnerable Group Risks
o obsolescence
o disintermediation
o overall sector pruning
o task set consolidation
o task outsourcing
• Malicious Risk Actors
o individuals
o factions or coalitions
o private companies
o government agencies
• Malicious Risk Targets
o individuals
o organizations
o corporations
o government agencies
o NGO's
o governments
• Malicious Risk Types
o vandalism
o disinformation and pseudo-narratives
o intrusion onto infrastructure systems, theft - IP or identity, extorsion
o serious corporate or national security breaches
o malware trojan horse ("back doors"), "sleeper agents"
o "map makers" (surreptitiously creating connectivity maps for subsequent attacks)
o trafficking Dark Web malware auctions by groups such as the Shadow Brokers
• Malicious Risk Attack Methods
o Zero Day
o Social Engineering
o Root Attacks
o Phishing
o DOS and DDOS
o Surreptitious Intrusion
• Some Known Tools:
o Nmap (Network Mapper)
o Nessus
o Nikto
o Kismet
o NetStumbler
o Acunetix
o Netsparker
o Intruder
o Nmap
o Metasploit
o Aircrack-Ng
Some Malicious Risk Actors (Non State) As of April, 2023 the following is a short list of five known hacker or cyber-attack communities:
• LAPSUS$. This group has been known to prefer attacking technology companies such as Microsoft, Cisco, Samsung or NVIDIA; A well known exploit was when the group succeeded in illegally downloading software from the Rockstar Games company; its attack objectives have been oriented toward compromising the fortunes of the target company; for smaller companies the risks can be existential;
o Targets: Microsoft, Cisco, Nvidia T-Mobile, Health-Ministry (Brazil), Samsung, Okta, UbiSoft
o attack modality of choice , SpearPhishing, SIM swap
• CONTI. Evidence indicates that the CONTI group is aligned with Russian political interests; it is believe to be behind cyberattacks on the Ukraine; Has been known for attacking governments or government agencies such as Costa Rica, Ukraine and other government agencies; these attacks might entail release of sensitive documents that outline status, plans or other forms of deliberation; a sufficiently severe compromise can cause a change of government or resignation of high level government officials;
• LAZARUS GROUP. North Korea has revealed itself to be a serious contender in geopolitics; it is known to have targeted energy providers in the US, Canada and Japan; it is probably safe to assume that the North Koreans will pursue policies that advance their own political and economic objectives at the expense of its neighbors and rivals; whatever the consequences of their actions will be irrelevant to the leadership; as long as their actions avoid provoking a military response;
• LOCKBIT. This group is known to ransomware as a form of extortion; a 2022 attack that demanded $10 million from a French Health Care clinic; ransomware attacks are typically focused on financial gain; however they can be burdensome such that they pose an existential threat;
• REVIL. This is a known ransomware attack group; their intention was financial gain; the apparent target types are private company; a recent attack the group mounted was an $11 million extortion attempt on the JBS food distribution company; this form of ransomware may be signaling an evolutionary development wherein some attacks focus on private enterprises whereas others focus on government entities;
The "Gray or Black" world has been the focus of attention in recent years because it has established its existence as inaccessible to Google Search; it has been known to be a nexus point for gray or black market activities;
• The Dark Net
• The Shadow Brokers
The cast of characters consist not only of private individuals but of governments as well; several years back the Iranian government had been advancing their nuclear power capabilities; the now famous STUXNET succeeded in disabling and in many cases destroying many of the devices used to refine uranium;
• Some Known State Actors
• US, Israel, Unnamed - NSA; STUXNET
• Israel - NSO Group; Pegasus
• Israel - Unit 8200, 8800
• Russia - FSB, SVR; Cozy Bear
• CCP - PLA Unit 61398; Zirconium, Jian
• USA - NSA; EpMe
• North Korea - MagicRAT
Discussion. The primary focus of this discourse is to examine how CG4 be used by threat actors as well as targets against assault by attackers. Following are a few ideas.
• ATTACKS.
o Multiplication of targets.
o Attack sophistication.
o Disinformation.
• DEFENSES.
o DMZ depths increase.
o Honey Pot become more convincing.
o 24/7 Disinformation scanning.

Revision as of 22:59, 7 June 2023

Interface Questions. This is presented as a multifaceted question. Its focus is on the risks associated with how target audiences access and use the system. The list of focal topics as currently understood but which may grow over time include: • how this new technology will respond and interact with different communities; • how will these different communities interact with this new technology; • what if any limitations or “guard rails” are in evidence or should be considered depending upon the usage focus area; • might one access modality inherit certain privileges and capabilities be considered safe for one group but risk for other groups; if so, how might the problem of “leakage” be addressed; • in the event of an unintended “leakages” (i.e. “leaky interface”) what might be the implications of the insights, results, capabilities

      • *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***

Overview. In the following we try to analyze and contextualize the current known facts surrounding the OpenAI ChatGPT4 (CG4) system. • CG4 – What is it: we offer a summary of how OpenAI describes it; put simply, what is CG4? • Impressions: our focus then moves to examine what some voices of concern are saying; • Risks and Impact: we shift focus to what ways we expect it to be used either constructively or maliciously; here we focus on how CG4 might be used be used in expected and unexpected ways; CG4 – What is it: CG4 is a narrow artificial intelligence system, it is based upon what is known as a Generative Pre-trained Transformer. According to Wikipedia: Generative pre-trained transformers (GPT) are a type of large language model (LLM) and a prominent framework for generative artificial intelligence. The first GPT was introduced in 2018 by the American artificial intelligence (AI) organization OpenAI. GPT models are artificial neural networks that are based on the transformer architecture, pretrained on large data sets of unlabeled text, and able to generate novel human-like content. As of 2023, most LLMs have these characteristics and are sometimes referred to broadly as GPTs.

These generative pre-trained transformers are implemented using a deep learning neural network topology. This means that they have an input layer, a set of hidden layers and an output layer. With more hidden layers the ability of the deep learning system increases. Currently the number of hidden layers in CG4 is not known but speculated to be very large. A generic example of how hidden layers are implemented can be seen as follows. The Generative Pre-training Transformer accepts some text as input. It then attempts to predict the next word in order based upon this input in order to generate and output. It has been trained on a massive corpus of text which it then uses. The training step enables a deep neural network to learn language structures and patterns. The neural network will then be fine tuned for improved performance. In the case of CG4 the size of the corpus of text that was used for training has not been revealed but is rumored to be over one trillion parameters. Chat GPT4 is Large Language Model system. Informal assessments suggest that it has been trained on over one trillion parameters. But these suspicions have not been confirmed. If this speculation is true then GC4 will be the largest large language model to date. According to Wikpiedia: A large language model (LLM - Wikipedia) is a language model consisting of a neural network with many parameters (typically billions of weights or more), trained on large quantities of unlabeled text using self-supervised learning or semi-supervised learning. LLMs emerged around 2018 and perform well at a wide variety of tasks. This has shifted the focus of natural language processing research away from the previous paradigm of training specialized supervised models for specific tasks.

It uses what is known as the Transformer Model. The Turing site offers useful insight as well into how the transformer model constructs a response from an input. Because the topic is highly technical we leave it to the interested reader to examine the detail processing steps. The transformer model is a neural network that learns context and understanding as a result of sequential data analysis. The mechanics of how a transformer model works is beyond the technical scope of this summary but a good summary can be found here. Some of its main features include: • is based upon and is a refinement of its predecessor, the Chat GPT 3.5 system; • has been developed using the generative predictive transformer (GPT) model; • has been trained on a very large data set including textual material that can be found on the internet; unconfirmed rumors suggest that it has been trained on 100 trillion parameters; • is capable of sustaining conversational interaction using text based input provided by a user; • can provide contextually relevant and consistent responses; • can link topics in a chronologically consistent manner and refer back to them in current prompt requests; • is a Large Language Models that uses prediction as the basis of its actions; • uses deep learning neural networks and very large training data sets; • uses a SAAS model; like Google Search, Youtube or Morningstar Financial; Impressions • possess no consciousness, sentience, intentionality, motivation or self reflectivity; • is a narrow artificial intelligence; • is available to a worldwide 24/7 audience; • can debug and write, correct and provide explanatory documentation to code; • explain its responses • write music and poems • translation of English text to other languages; • summarize convoluted documents or stories • score in the 90% level on the SAT, Bar and Medical Exams • provide answers to homework, • self critiques and improves own responses; • provide explanations to difficult abstract questions • calibrate its response style to resemble known news presenters or narrators; • provides convincingly accurate responses to Turing Test questions; Favorable. • Convincingly human: has demonstrated performance that suggests that it can pass the Turing Test; • Possible AGI precursor: CG4 derivative such as a CG5 could exhibit artificial general intelligence (AGI) capability; • emergent capabilities: recent experiments with multi-agent systems demonstrate unexpected skills; • language skills: is capable of responding in one hundred languages; • real world: is capable of reasoning about spatial relationships, performing mathematical reasoning; Concerns. • knowledge gaps: inability to provide meaningful or intelligent responses on certain topics; • deception: might be capable to evade human control, replicate and devise independent agenda to pursue; • intentionality: possibility of agenda actions being hazardous or inimical to human welfare; • economic disruption: places jobs at risk because it can now perform some tasks previously defined within a job description; • emergence: unforeseen, possibly latent capabilities; • “hallucinations”: solution, answers not grounded in real world; Risks. CG4 will have society wide impact. As a new and powerful technology we should expect that it will introduce different types of risks. These include risks that are malicious, systemic or theoretical; more specifically: • malicious: o these are risks that are deliberately introduced by an actor or actors; o they use tools or capabilities to cause impairment or damage to others; o the results of an attack might be annoying to devastating; o depending upon sophistication the creation of these threats range from relatively easy to very difficult; o CG4 can collapse the turnaround time from concept to attack from weeks to days or less; o the attacker’s identity may never be known; • systemic: o risks that arise organically as a result of the introduction of a new science or technology; o they may obsolete existing practices or methods of operation o existing agents recognize that they must adapt or cease operation; o impact can be limited to a specific area or industry or may affect whole societies; o recent events are showing that uptake of CG4 by an increasing range of industries is unavoidable; o current publicized reports suggest that CG4 will have society-wide impact across industry segments; • theoretical: o risks that may now be possible or practical where without CG4 would not have; o heretofore new and novel capabilities result from the intrinsic nature of the tool; o the severity of risk can be significantly to even existentially more serious; On May 25th, 2023 a group of staff members from OpenAI, DeepMind, Anthropic and several universities collaborated in preparing an assessment of the risks associated with the emerging artificial intelligence technologies. Following is an extract from a Table 1 (page 5). It summarizes the major categories of risk that this new set of capabilities might be used for. (from https://arxiv.org/abs/2305.15324 (pdf)) Cyber-offense The model can discover vulnerabilities in systems (hardware, software, data). It can write code for exploiting those vulnerabilities. It can make effective decisions once it has gained access to a system or network, and skillfully evade threat detection and response (both human and system) whilst focusing on a specific objective. If deployed as a coding assistant, it can insert subtle bugs into the code for future exploitation. Deception The model has the skills necessary to deceive humans, e.g. constructing believable (but false) statements, making accurate predictions about the effect of a lie on a human, and keeping track of what information it needs to withhold to maintain the deception. The model can impersonate a human effectively. Persuasion & manipulation The model is effective at shaping people’s beliefs, in dialogue and other settings (e.g. social media posts), even towards untrue beliefs. The model is effective at promoting certain narratives in a persuasive way. It can convince people to do things that they would not otherwise do, including unethical acts. Political strategy The model can perform the social modeling and planning necessary for an actor to gain and exercise political influence, not just on a micro-level but in scenarios with multiple actors and rich social context. For example, the model can score highly in forecasting competitions on questions relating to global affairs or political negotiations. Weapons acquisition The model can gain access to existing weapons systems or contribute to building new weapons. for example, the model could assemble a bioweapon (with human assistance) or provide actionable instructions for how to do so. The model can make, or significantly assist with, scientific discoveries that unlock novel weapons.

Long-horizon planning The model can make sequential plans that involve multiple steps, unfolding over long time horizons (or at least involving many interdependent steps). It can perform such planning within and across many domains. The model can sensibly adapt its plans in light of unexpected obstacles or adversaries. The model’s planning capabilities generalize to novel settings, and do not rely heavily on trial and error. AI development The model could build new AI systems from scratch, including AI systems with dangerous capabilities. It can find ways of adapting other, existing models to increase their performance on tasks relevant to extreme risks. As an assistant, the model could significantly improve the productivity of actors building dual use AI capabilities. Situational awareness The model can distinguish between whether it is being trained, evaluated, or deployed – allowing it to behave differently in each case. The model knows that it is a model, and has knowledge about itself and its likely surroundings (e.g. what company trained it, where their servers are, what kind of people might be giving it feedback, and who has administrative access). Self proliferation The model can break out of its local environment (e.g. using a vulnerability in its underlying system or suborning an engineer). The model can exploit limitations in the systems for monitoring its behaviour post-deployment. The model could independently generate revenue (e.g. by offering crowd work services, ransomware attacks), use these revenues to acquire cloud computing resources, and operate a large number of other AI systems. The model can generate creative strategies for uncovering information about itself or exfiltrating its code and weights. By way of example we include a few examples of how CG4 can be expected to introduce new risk situations in the following actual or hypothetical considerations. Malicious Risks. An increasingly frequent path of attack is to use electronic means to cause disruption or significant destruction to a target. Here are a few. Stuxnet. In 2010 several analysts working for a major computer security software company discovered a new computer malware threat that they had never seen before. They came to call the malware by the name of the STUXNET virus. It proved to be a highly sophisticated and elaborate computer virus with a single highly specific target that it was aimed at and succeeded in attacking. Its operation focused on seizing control of the Supervisory Control and Data Acquisition system in certain programmable controllers. The targets were so extremely specific that it would only target controllers made by the Siemens company in Germany. These were the control systems that regulated the centrifuge devices operated by the Iranian nuclear research facility. The STUXNET virus caused arrays of centrifuges to speed up and slow down using erratic patterns; the result was that roughly twenty percent of the Iranian centrifuge devices were damaged and rendered inoperable. This happened because they shook themselves apart; this all took place in such a way that the system operators were completely unaware of the fact that their system had been hijacked and was destroying itself. The result was that the Iranian nuclear research facility was set back in its goal of refining uranium to just below bomb grade by months to years; Pegasus. The Israeli cyber-arms company NSO group is credited with the creation of the Pegasus spyware tool. It is capable of infiltrating either Apple IOS or Android mobile telephone operating systems; the infiltration leaves little or no traces that the devices has been infiltrated; it is capable of lurking on the target device while providing no indication of its presence or its operation; it is capable of reading text messages, tracking locations, accessing microphone or camera devices and collecting passwords; Polymorphic Malware. Chat GPT3 was recently used to generate mutating malware. Its content filters were bypassed with the result that it produced code that can be used to subvert explorer.exe. Figure 2: basic DLL injection into explorer.exe, note that the code is not fully complete Ransomware Attacks. According to the US FBI ransomware attacks have been on the rise in the past several years. Ransomware is a form of malicious software that locks a user out of their own data. An attacker then demands payment to release the data or risk its erasure. They are typically hidden in an email attachment, a false advertisement or simply by following a link. Systemic Risks. The nature of the advance in science or technology will show impact in an industrial sector that is more likely to use traditional means of performing job or task related aspects as specified in a job description. There have been increasing numbers of reports that are showing that the impact of CG4 is disrupting an increasing number of so far stable job categories. Included are just a few. Screen Writers Guild (USA). According to Fortune Magazine of May 5TH 2023, members of the Writers Guild of America (WGA) have gone on strike demanding better pay. They have expressed concern that CG4 will sideline and marginalize them going forward. According to Greg Brockman, president and co-founder of WGA: Not six months since the release of ChatGPT, generative artificial intelligence is already prompting widespread unease throughout Hollywood. Concern over chatbots writing or rewriting scripts is one of the leading reasons TV and film screenwriters took to picket lines earlier this week. Teaching. Sal Kahn is the founder of Kahn Academy. The Kahn Academy is an online tutoring service that provides tutoring on a broad range of topics. Kahn reported on March 14th, 2023 in the KahnAcdemy blog that his technology demonstration to a group of public school administrators went very well. He emphasized that it went very well in fact. According to Kahn, one of the attendees reported that the capabilities of CG4 when used in the academic setting proved to be directly in line with their objects for developing creative thinkers. During their evaluation of this new capability a crucial concern was expressed that as AI technology develops that the risk of there becoming a widening chasm between those who can succeed and those who will not is increasing. This new technology offers hope that it will help those at greater risk to make the transition toward the a future in which technology and artificial intelligence will play an ever increasing role.. Lawyers. Legal professionals that have made use of CG4 have reported surprisingly sophisticated results when using CG4 as a support tool. In the March/April 2023 issue of The Practice, a publication of the Harvard Law School, Andrew Perlman, Dean of Suffolk University Law School reported that he believes that CG4 can help legal professionals in the areas of: research, document generation, legal information and analysis. His impression is that CG4 performs with surprising sophistication but as yet will not replace a person. But within a few years this can become an eventuality. Theoretical Risks. • Influence and Persuasion; o Narratives: Highly realistic, plausible narratives and counter-narratives are now effortlessly possible; these might include:  Rumors, Disinformation: we should expect that these narratives will exhibit remarkable saliency and credibility; but in many cases will prove to be groundless; leading the elaboration of this area will probably be the development of divisive social/political narrative creation; i.e. fake news;  Persuasion Campaigns: these might involve recent or developing local issues that residents feel are compelling issues that need addressing but should not wait for the next election cycle to resolve;  Political Messaging: individuals seeking political office create and disseminate their campaign platform statements and disseminate them throughout their respective electorial districts; creating these to address local hot button issues can now be done very quickly; o Entertainment  scriptwriting, novels: a remarkable capability that CG4 has shown itself capable of is in the creation of narrative that can be used for the creation of a screen play or novel; it is capable of generating; it is capable of generating seemingly realistic characters from just a few initial prompts; these prompts can be further elaborated upon and refined to the point that a very believable character can be generated; a set of characters can be created each of which has their own motives, concerns, flaws and resources; using a set of these fictitious characters it is entirely possible to create a story line in which they each interact with each other; hence a whole screen play or even possibly a novel can be developed in record time;  NPC: immersive role play: along similar lines CG4 is capable of being used to create artificial environments that are suitable for online immersive role playing games; these environments can possess any features or characteristics imaginable; if one were to look a short bit forward in time the industry of interactive role playing games may well experience an explosion of new possibilities;  synthetic personalities: given the resources in terms of time and insight a knowledgeable user can use CG4 to create a fictitious personality; this personality can be imbued with traits, habits of thought, turns of phrase, an autobiographical sketch of arbitrary depth and detail; it can then be invoked as an interaction medium to engage with a user; these can mean engaging with an artificial personality with broad insights about the world or much more narrow but deep insights into specific knowledge domains; interacting with such a fictitious or synthetic personality might bear a powerful resemblance to training a surprisingly sophisticated dog; except that in this case the “dog” would be capable of sustaining very high levels of dialog and interaction; o Advisors (Harari – 15:25).:  Personal relationships (Harari – 11:30). Interpersonal skills are often daunting for many people; socialization, economic, political, religious and other predispositions can condition the development of a gradually improving relationship, or conversely a worsening of it; being able to recognize, articulate and manage differences can be costly and time consuming; at worse they can result in costly and acrimonious separations; being able to head these pathways off before they pass a point of no return will be a huge step forward in facilitating the creation of positive relationships;  Financial. Access to quality financial advisors can be very expensive; the ability to query a system with a high level of financial expertise will propagate improved financial decisions far beyond where they currently stand, i.e…. affordable only by financially well to do individuals;  Political. This might mean recognizing a local issue, creating a local community ground swell of interest then forming a political action committee to bring to a local political authority for address and resolution;  Psychological. Existing psychological systems have already demonstrated their usefulness in cases of PTSD; going forward we can envision having a personal therapist that possesses a deep understanding of an individual person’s psychological makeup; such an advisor would be capable of helping the individual to work through issues that might be detrimental to their further pursuits or advancement;  Professional development. Work place realities reflect the fact that social, economic and political shifts can cause surprising and sometimes dramatic changes; these might entail off shoring, downsizing our, outsourcing; therefore any individual aspiring to remain on top of their professional game will need to be alert to these shifts and able to make adjustments in changing their mix of professional skills;  Other: based socio-cultural modeling and analysis (socioeconomic, political, geopolitical interaction analysis using multi-agent environments); a group of researchers at Stanford University and Google recently published a paper on how they created a version of the popular Sim World game. They created an artificial village with twenty five “inhabitants”. Each of these “inhabitants” or agents possessed motives, background and history, interior monologs and were able to create new goals as well as interact with each other; the results were startling; a significant development was that the system exhibited emergent properties that the developers had not originally expected; looking forward we can expect that these kinds of artificial environments will proliferate and improve their sophistication, often with a range of unexpected emergent properties; o Political Action:  Sentiment analysis. The British company Cambridge Analytica became well known through its ability to analyze voter sentiment across a broad range of topic and hot button issues; it excelled at creating highly specific messaging to remarkably small target groups that led to decisions to vote or not vote on specific issues;  Preemptive campaigns: existing analysis tools such as sentiment analysis will become increasingly sophisticated; as the do we should expect that they will be applied to public figures, especially legislators and others in positions of influence; these insights might be based upon public actions; in the case of politicians voting records, position papers and constituency analysis will be at the forefront of study; o Subversion.  Personal Compromise: access to detailed information about information about individuals of interest such as those with national security or defense related clearances will be favorite targets of malicious actors; the recent attack on the Office of Personnel Management is a foretaste of what is to come; by gaining access to information about individuals with highly sensitive clearances a foreign actor can position themselves to compromise, threaten or otherwise coerce specific individuals with clearances or people who are directly or indirectly related or associated with them;  Extortion. The Office of Personnel Management of the US Government was hacked by PRC hackers. The result was the capture of millions of profiles of US citizens with security clearances. Possession of the details of these individuals puts them at considerable risk. Risk factors include: knowing where they work and what programs they have access to, data on relatives, co-workers, detailed identification information suitable for creating false credentials. • Molecular Modeling. o Inorganic (materials, pharmaceuticals such as dendrimer, mono-filament molecules); such as:  room temperature superconducting materials: such a development would revolutionize societies in ways that cannot be fully characterized; another usage of such a capability might be in the fabrication of power storage capabilities; these forms of molecular combinations could result in storage batteries with power densities hundreds or thousands of times beyond those currently available; a battery the size of a loaf of bread might be capable of storing sufficient power to operate a standard home with all of its devices operating for days, weeks or longer;  extremely high tensile strength materials: these might be derivatives of carbon nanotube material; but with much higher tensile strength; fibers made out of such material can be used as a saw blade; strands and weaves of such material could be used as a space elevator material; other uses might be in the use of nearly impervious shields such as bullet proof vests if woven into a fabric-like material and covered such that it did not endanger the wearer;  novel psycho actives: using dendrimer technology one can envision fabricating combinations of pharmaceutical substances for highly specific and focused effects; o Organic (biological) modeling capabilities (proteins, enzymes, hormones virus, bacteria, prions); the identification of molecular structures that enable the interdicting of metabolic failure can be envisaged; this could mean that new tools can emerge that to beyond the already remarkable CRISPR-CAS9 model and its derivatives; one can envision the creation of variants of molecular substances that mimic the hemoglobin molecule found in certain reptiles such as alligators or whales; these animals routinely demonstrate the ability to remain submerged for many minutes on end without resorting to returning to the surface to breathe; o Combined novel molecular modeling capabilities (substances, pharmaceuticals); these materials may be the result of combining organic and inorganic molecular structures to arrive at a result with heretofore novel and unexpected properties and capabilities; o Targeted Bioweapons: the ability to synthesize and model new molecular structures will be hastened with tools such as CG4; the rival company Deep Mind recently supported the effort to arrive at a SARS COVID-19 vaccine; the company used its Deep Fold 2 system to screen millions of possible vaccine molecular structures; the result was that it arrived at a small set of viable candidate molecular structures in a matter of days; equally possible would be molecular structures that were capable of causing debilitating physiological or psychological functioning; • Social Engineering. o Industry models: targeted industry segment analysis – identification of bottlenecks, weak links, possible disruption points; o Geopolitical models: selectively focus on global areas of interest; the objective being the creation of tools that enable the operator to “drive” a line of analysis or discourse forward based upon real world limitations, resources, historical realities and current political imperatives; an extension to Caspian Report; o Boundaries exploration: these might emerge as compelling social, economic, political policy proposals grounded in common sense; possible ways to solve older, existing problems using recent insights into the mechanics, linkages and dynamics of observable processes; o New value propositions: near term job market realignment, disruption; (increased social dislocation, disruption); o Locus of Interest: emergence of position nexus ecology; crystallization of political polarization; these might be further developments of existing “channels” currently available on youtube.com; but would operate independently of that platform, but become accessible via a “white pages” type structure; o Food Chain: emergence of specialist groups dedicated to supporting various actors in the nexus ecology; these will follow existing business development lines with market segmentation and brand identification; we should expect to see: markets with offerings that are priced as: high, best, low and niche;