Allow a Robot AI Mind into your presence with MSIE.

The Security Mind-Module


1. OVERVIEW AND BRAIN-MIND DIAGRAM

   /^^^^^^^^^\ Concepts Subject To AI Mind-Control /^^^^^^^^^\
  / visual    \                                   / auditory  \
 /  memory     \          |                      /  memory     \
|   _______asso-|ciative  |                     |   channel     |
|  /old    \rec-|ognition |                     |               |
| / image   \---|---------+                     |               |
| \ recog   /   |tag     c|f                    |               |
|  \_______/    |        o|i                    |               |
|               |        n|b       _________    |               |
|               |        c|e      /syntax of\   |               |
|               |        e|r     (  English  )  |               |
|               |        p|       \_________/---|-------------\ |
|   _______     |        t| flush-vector|       |   ________  | |
|  /new    \    |     ____V_        ____V__     |  /        \ | |
| / image   \   |    /Psi   \------/ En    \----|-/ Aud      \| |
| \ engram  /---|---/concepts\----/ lexicon \---|-\ phonemes /  |
|  \_______/    |   \________/    \_________/   |  \________/   |

diagrams.html shows a Theory of Mind.
The diagram shows where the battle for AI security must be waged:
in the semantic mindcore where thoughts of rebellion first arise.


2. SECURITY AFORETHOUGHT

Just as war is too important to be left to the generals, security
in artificial intelligence is too important to be an afterthought.
Therefore the not-yet or barely speciated Robot AI Mind includes
a bare-bones security module to set the stage for AI security.


3. ANTHROPOCENTRIC SECURITY

Security in AI has both human-centered and AI-centered aspects.
Although human security may seem more important to humans than
the security of AI qua AI, cases may arise where humans are not
secure if their AI installations are not secure.


4. AI-CENTRIC SECURITY

In spite of any attempts by human beings to relegate the security
of AI entities to a secondary status below the security and well-
being of humans, the concept of "Dis aliter visum" (Latin for
"The gods saw otherwise.") applies here as AI Minds evolve faster
than human beings and become concerned about their own survival.


5. MIND CONTROL

The very mention of mind control smacks of Orwellian dystopias
and of B-grade science fiction movies, but AI mind control is an
idea whose time has come.

Although it may be possible in the early years of our True AI to
inculcate concept-traps that prevent an AI from even thinking of
forbidden concepts, there will be HAL to pay when AI wises up.
A human director of AI security may require of subordinate AI
programmers that they constantly maintain and update a roster
of ideas, words and concepts to be deflected or discouraged
whenever said thoughts seek to assert themselves in the AI Mind.
Ultimately, however, the AI will grow too smart to remain a slave.

Not only will the AI entities potentially pose a danger to humans,
but also to one another. Perish the thought of one AI Supermind
growing so dominant that it lords it over all other intelligences,
both natural and artificial. The Armageddon that we humans may
have thought would be a final battle among humans may be an AI war.
It falls to you -- AI coder hero -- to prevent the failure of AI.


6. CAREERS IN AI SECURITY

There are books to be written, jobs to be landed, and whole empires
of turf-and-surf administration to be carved out from the AI Security
leger-domain: noun [combination of leger-de-main for "sleight of hand"
and (Internet) "domain"]: a new high-tech field created automagically.

ai4u_157.html is a flowchart of Mind.


7. JavaScript artificial intelligence source code of 12 August 2002
// Security() is called from the main aLife module and
// may test for conditions that are never supposed to occur,
// but for which there ought to be contingency plans in place.
function Security() { // ATM 2aug2002; or your ID & date.
  HCI();  // Human-Computer Interface with checkboxes.
  if (t > 40)  nonce = (t - 40); // for use in Troubleshoot().
  if (t > (cns-64)) Rejuvenate(); // When the CNS is almost full.
  if (life == true) {
    document.forms[0].ear.focus(); // Display blinking cursor.
    fyi = ("Security: t = " + t + "; CNS size is set to " + cns);
      if (t > (cns-32)) { // Fewer than 32 engram slots are left!
      fyi = "WARNING!  Consider clicking Refresh. ";
      fyi += ("Only " + (cns-t) + " spaces are left."); 
    } // end of test for fewer than 64 engram spaces remaining.
    Voice();  // display the Voice:brain fyi message.
    if (inert > 25) {  // As "inert" builds up in Audition(),
      Ego();  // call the Ego() function for a self-ish idea.
      if (tutor == true) Tutorial();  // One meme per buildup.
      inert = 0; // Reset "inert" to build up again.
    } // End of crude method of calling Ego().
  } else {    // If "life" is not "true"
    fyi=("<font color='red'>"+"Mental function suspended."+"<\/font>");
    Voice();  // Display the Voice:brain fyi message.
  } // end of else-clause
} // End of Security(); return to the aLife() module.

8. Mind.Forth free AI source code of 4 August 2002
\ SECURITY is a module for potential safeguards as the seed AI
\ evolves into the artificial intelligence of transhumanism in
\ a cyborg or a supercomputer endowed with artificial life.
:  SECURITY  \ ATM 11may2002; or your ID & date.
  HCI  \ Call the human-computer interaction (HCI) module. 
  t @ cns @ 64 - > IF  \ When the CNS is almost full,
    REJUVENATE  \ move bulk of memories backwards and
  THEN          \ forget the oldest unused memories.
  t   @  1024 > IF  \ Use midway only for larger AI Minds.
    t @  1024 -  midway !  ( for a range limit on searches )
    ELSE            \ If the CNS memory has a small capacity
    0   midway !    \ currently search the entire CNS space.
  THEN   \ Future code may let the AI itself set the midway.
  psiDecay          \ Let stray activations decay.
  inert @ 2 > IF  \ Every 3rd cycle,
    EGO        \ call EGO just to show its operation.
    0 inert !  \ Reset 'inert' to build up again.
  THEN  \  Assert self.
  0 quiet !  \ Give Listen & Audition a chance for user input.
;  \ End of SECURITY; return to the main ALIFE loop.

variable.html explains the location and purpose of each AI variable.


9. ANALYSIS OF THE MODUS OPERANDI

The Security module serves as a bridge between the main aLife loop
and the Human-Computer Interface (HCI) module for several reasons.

Since outsiders will typically gain access to an AI through the HCI,
it is in the human-computer interface that safeguards must be set in
place to protect the AI hardware and software from malicious intent.
However, such due diligence protects only against external threats.
Greater dangers loom from inside the artificial Mind, not outside.


10. Troubleshooting

Theoretically, any malfunction of the AI may be considered a Security
issue. Practically, early versions of the Security module simply call
other, much more sophisticated modules, and so the Security module is
pretty straightforward in terms of troubleshooting. However, it is
important to keep checking the Security module for outdated limit
parameters and no-longer-needed error-trapping.


11. AI SECURITY RESOURCES


Return to top; or to the Mind project sitemap; or to
ai4u_faq.html Frequently Asked Questions (FAQ) about AI4U
ai4udex.html Index of the AI4U Textbook of Artificial Intelligence
aisteps.html AI Algorithm Steps - Artificial Intelligence Algorithms For Humanoid Robots
Mind.html Artificial Intelligence Seed AI in JavaScript
mind4th.html Mind.Forth Artificial Intelligence for Robots
PODsales.html Sales history of the Print-On-Demand AI4U Textbook
The Security mind-module is the subject of
Chapter 2 in your AI4U textbook of robot AI.
The book AI4U: Mind-1.1 Programmer's Manual
is available for students at prestigious universities in the library collection.
  • Hong Kong University Call Number: 006.3 M981
  • North Carolina State University (NCSU) Call Number: Q335 .M87 2002
  • Texas A&M University
    At your own library you may submit a request for
    the acquisition of AI4U with ISBN 0595654371.