Preface
The public will increasingly come to rely upon AI researchers. Our ideas and philosophies presuppose that responsibility. Thus, it is important to point out that AI security is not just a difference in opinion, but rests upon a technical basis.
We cannot control the flow of information, and the implementation of these advanced artificial intelligence systems will be exactly that; software that anyone can use, modify, and share. That is not a long-term issue to be set aside for later, as its consequences require planning today for an inevitable future where everyone has access.
Complicating matters are the facts that we have not had a research direction for strong artificial intelligence and that some in the machine learning community have made claims that deep learning is “general”. What they are referring to are narrow AI systems that utilize reinforcement learning to adjust to new applications, despite failing to exhibit cross-domain transfer of knowledge.
Those issues are also addressed in this text, as it provides an entirely new research direction and a way to test claims of generality. True generalizing intelligence is falsifiable in artificial systems, and involves the enhancement of effectiveness based on prior learning in different subject areas from the one being attempted. This distinction is critical, as it is part of what makes strong artificial intelligence unique; the most difficult problems in automation are believed to require this capacity.
The mathematics behind that test are provided in Chapter 6: Measuring Generalizing Intelligence, and was one of the most surprising discoveries made while writing this book.
The underlying thesis of this work is the falsifiable hypothesis that generalizing intelligence, in both natural and artificial individuals, requires sentience. This claim creates a unique perspective on AI security and sets up many of its theories. However, regardless of whether or not that hypothesis is true, the consequences of advanced automation will remain; the global problems will stem from how easily it is distributed, modified, and used, and not necessarily in the exact way in which it is implemented.
Though counterintuitive, the most important first step we can take is to begin research and development into strong artificial intelligence as soon as possible. We are already paying for the absence of this technology. Delays in its creation correspond with daily loss of life and suffering on a planetary scale. This claim is based on the projection that it would yield medical and economic breakthroughs that would uplift our entire species, which defines a moral imperative to develop this technology and motivates its research. Whether or not it is acknowledged, we are caught in a struggle between our present level of development and our future, better selves.
How To Read This Book
After reading Part I: Background, it may be helpful to skip ahead to Part III: AI Security, which begins at Chapter 7: Arrival of Strong AI. This is due to the technical detail contained in Part II: Foundations, which may be time-consuming and arduous for some, as it covers many interrelated topics to strong artificial intelligence research.