transaction? If you’ve contributed one ten-thousandth of a vote, what is your legal
liability?
51
If vending machines are programmed to order
the most profitable products, will
they discover a supplier for illegal goods or drugs? (Hey, the candy machine is selling
Ecstasy!) How should the law handle an autonomous vehicle that accidentally kills a
human being? For
Wired magazine, two hackers demonstrated how to hijack the
control systems of a Jeep Cherokee on the highway. Chrysler responded by recalling
1.4 million vehicles and alarming drivers,
manufacturers, and policymakers alike.
52
Could terrorists figure out how to hack smart devices so that they performed
unwanted actions with devastating consequences?
There are other challenges with distributed models of the enterprise. How does
society govern these entities? How can owners keep ultimate control? How do we
prevent hostile takeovers of personless businesses? Let’s say we own a decentralized
Web hosting company where each of the servers has a say in company management.
A human hacker or some malware could pretend to be a million servers and outvote
the legitimate servers in the network. When such takeovers
of traditional companies
occur, the results can vary. With a DAE, the results will most likely be disastrous.
Once that malevolent entity controls our distributed Web hosting company, it could
cash out. Or it could release the private data from other servers or hold the data
hostage until we human owners paid a ransom.
Once machines have intelligence and the ability to learn,
how quickly will they
become autonomous? Will military drones and robots, for example, decide to turn on
civilians? According to researchers in AI, we’re only years,
not decades, away from
the realization of such weapons. In July 2015, a large group of scientists and
researchers, including Stephen Hawking, Elon Musk, and Steve Wozniak,
issued an
open letter calling for a ban on the development of autonomous offensive weapons
beyond meaningful human control.
53
“The nightmare headline for me is, ‘100,000 Refrigerators Attack Bank of
America,’” said Vint Cerf, widely regarded as the father of the Internet. “That is going
to take some serious thinking not only about basic security
and privacy technology,
but also how to configure and upgrade devices at scale,” he added, noting that no one
wants to spend their entire weekend typing IP addresses for each and every household
device.
54
We do not recommend broad regulation of DAEs and the IoT or regulatory
approvals. We do recommend that managers and entrepreneurs
who are developing
apps identify any significant public impacts—good, bad, or neutral—and alter source
code and designs. We think they should consult with those likely affected by their
creations to minimize risks in advance, identify alternative paths forward, and build
support.
Do'stlaringiz bilan baham: