-
Computing Power and the Governance of Artificial Intelligence
Authors:
Girish Sastry,
Lennart Heim,
Haydn Belfield,
Markus Anderljung,
Miles Brundage,
Julian Hazell,
Cullen O'Keefe,
Gillian K. Hadfield,
Richard Ngo,
Konstantin Pilz,
George Gor,
Emma Bluemke,
Sarah Shoker,
Janet Egan,
Robert F. Trager,
Shahar Avin,
Adrian Weller,
Yoshua Bengio,
Diane Coyle
Abstract:
Computing power, or "compute," is crucial for the development and deployment of artificial intelligence (AI) capabilities. As a result, governments and companies have started to leverage compute as a means to govern AI. For example, governments are investing in domestic compute capacity, controlling the flow of compute to competing countries, and subsidizing compute access to certain sectors. Howe…
▽ More
Computing power, or "compute," is crucial for the development and deployment of artificial intelligence (AI) capabilities. As a result, governments and companies have started to leverage compute as a means to govern AI. For example, governments are investing in domestic compute capacity, controlling the flow of compute to competing countries, and subsidizing compute access to certain sectors. However, these efforts only scratch the surface of how compute can be used to govern AI development and deployment. Relative to other key inputs to AI (data and algorithms), AI-relevant compute is a particularly effective point of intervention: it is detectable, excludable, and quantifiable, and is produced via an extremely concentrated supply chain. These characteristics, alongside the singular importance of compute for cutting-edge AI models, suggest that governing compute can contribute to achieving common policy objectives, such as ensuring the safety and beneficial use of AI. More precisely, policymakers could use compute to facilitate regulatory visibility of AI, allocate resources to promote beneficial outcomes, and enforce restrictions against irresponsible or malicious AI development and usage. However, while compute-based policies and technologies have the potential to assist in these areas, there is significant variation in their readiness for implementation. Some ideas are currently being piloted, while others are hindered by the need for fundamental research. Furthermore, naive or poorly scoped approaches to compute governance carry significant risks in areas like privacy, economic impacts, and centralization of power. We end by suggesting guardrails to minimize these risks from compute governance.
△ Less
Submitted 13 February, 2024;
originally announced February 2024.
-
Open-Sourcing Highly Capable Foundation Models: An evaluation of risks, benefits, and alternative methods for pursuing open-source objectives
Authors:
Elizabeth Seger,
Noemi Dreksler,
Richard Moulange,
Emily Dardaman,
Jonas Schuett,
K. Wei,
Christoph Winter,
Mackenzie Arnold,
Seán Ó hÉigeartaigh,
Anton Korinek,
Markus Anderljung,
Ben Bucknall,
Alan Chan,
Eoghan Stafford,
Leonie Koessler,
Aviv Ovadya,
Ben Garfinkel,
Emma Bluemke,
Michael Aird,
Patrick Levermore,
Julian Hazell,
Abhishek Gupta
Abstract:
Recent decisions by leading AI labs to either open-source their models or to restrict access to their models has sparked debate about whether, and how, increasingly capable AI models should be shared. Open-sourcing in AI typically refers to making model architecture and weights freely and publicly accessible for anyone to modify, study, build on, and use. This offers advantages such as enabling ex…
▽ More
Recent decisions by leading AI labs to either open-source their models or to restrict access to their models has sparked debate about whether, and how, increasingly capable AI models should be shared. Open-sourcing in AI typically refers to making model architecture and weights freely and publicly accessible for anyone to modify, study, build on, and use. This offers advantages such as enabling external oversight, accelerating progress, and decentralizing control over AI development and use. However, it also presents a growing potential for misuse and unintended consequences. This paper offers an examination of the risks and benefits of open-sourcing highly capable foundation models. While open-sourcing has historically provided substantial net benefits for most software and AI development processes, we argue that for some highly capable foundation models likely to be developed in the near future, open-sourcing may pose sufficiently extreme risks to outweigh the benefits. In such a case, highly capable foundation models should not be open-sourced, at least not initially. Alternative strategies, including non-open-source model sharing options, are explored. The paper concludes with recommendations for developers, standard-setting bodies, and governments for establishing safe and responsible model sharing practices and preserving open-source benefits where safe.
△ Less
Submitted 29 September, 2023;
originally announced November 2023.
-
Spear Phishing With Large Language Models
Authors:
Julian Hazell
Abstract:
Recent progress in artificial intelligence (AI), particularly in the domain of large language models (LLMs), has resulted in powerful and versatile dual-use systems. This intelligence can be put towards a wide variety of beneficial tasks, yet it can also be used to cause harm. This study explores one such harm by examining how LLMs can be used for spear phishing, a form of cybercrime that involves…
▽ More
Recent progress in artificial intelligence (AI), particularly in the domain of large language models (LLMs), has resulted in powerful and versatile dual-use systems. This intelligence can be put towards a wide variety of beneficial tasks, yet it can also be used to cause harm. This study explores one such harm by examining how LLMs can be used for spear phishing, a form of cybercrime that involves manipulating targets into divulging sensitive information. I first explore LLMs' ability to assist with the reconnaissance and message generation stages of a spear phishing attack, where I find that LLMs are capable of assisting with the email generation phase of a spear phishing attack. To explore how LLMs could potentially be harnessed to scale spear phishing campaigns, I then create unique spear phishing messages for over 600 British Members of Parliament using OpenAI's GPT-3.5 and GPT-4 models. My findings provide some evidence that these messages are not only realistic but also cost-effective, with each email costing only a fraction of a cent to generate. Next, I demonstrate how basic prompt engineering can circumvent safeguards installed in LLMs, highlighting the need for further research into robust interventions that can help prevent models from being misused. To further address these evolving risks, I explore two potential solutions: structured access schemes, such as application programming interfaces, and LLM-based defensive systems.
△ Less
Submitted 22 December, 2023; v1 submitted 11 May, 2023;
originally announced May 2023.
-
Protecting Society from AI Misuse: When are Restrictions on Capabilities Warranted?
Authors:
Markus Anderljung,
Julian Hazell
Abstract:
Artificial intelligence (AI) systems will increasingly be used to cause harm as they grow more capable. In fact, AI systems are already starting to be used to automate fraudulent activities, violate human rights, create harmful fake images, and identify dangerous toxins. To prevent some misuses of AI, we argue that targeted interventions on certain capabilities will be warranted. These restriction…
▽ More
Artificial intelligence (AI) systems will increasingly be used to cause harm as they grow more capable. In fact, AI systems are already starting to be used to automate fraudulent activities, violate human rights, create harmful fake images, and identify dangerous toxins. To prevent some misuses of AI, we argue that targeted interventions on certain capabilities will be warranted. These restrictions may include controlling who can access certain types of AI models, what they can be used for, whether outputs are filtered or can be traced back to their user, and the resources needed to develop them. We also contend that some restrictions on non-AI capabilities needed to cause harm will be required. Though capability restrictions risk reducing use more than misuse (facing an unfavorable Misuse-Use Tradeoff), we argue that interventions on capabilities are warranted when other interventions are insufficient, the potential harm from misuse is high, and there are targeted ways to intervene on capabilities. We provide a taxonomy of interventions that can reduce AI misuse, focusing on the specific steps required for a misuse to cause harm (the Misuse Chain), and a framework to determine if an intervention is warranted. We apply this reasoning to three examples: predicting novel toxins, creating harmful images, and automating spear phishing campaigns.
△ Less
Submitted 29 March, 2023; v1 submitted 16 March, 2023;
originally announced March 2023.
-
Enhancing the bond strength in meta-crystal lattice of architected materials
Authors:
M. G. Rashed,
Dhriti Bhattacharyya,
R. A. W. Mines,
M. Saadatfar,
Alan Xu,
Mahmud Ashraf,
M. Smith,
Paul J. Hazell
Abstract:
Architected materials produced by powder bed fusion metal additive manufacturing technique offer realization of complex structural hierarchies that mimic the principles of crystal plasticity while still being ultralight-weight, though suffering from deep-rooted multiscale defects including microstructural heterogeneity caused by the complex thermo-mechanical transients in the melt pool. Here we ma…
▽ More
Architected materials produced by powder bed fusion metal additive manufacturing technique offer realization of complex structural hierarchies that mimic the principles of crystal plasticity while still being ultralight-weight, though suffering from deep-rooted multiscale defects including microstructural heterogeneity caused by the complex thermo-mechanical transients in the melt pool. Here we manufacture meta-crystal 316L stainless steel microlattice structures by selective laser melting process for utilizing the strain localization mechanism in bulk structures akin to dislocation slip mediated plasticity. The build angle was observed to be the primary influencer of defects generated and the presence of inherent voids was the major drawback that would undermine their structural performance as mechanical metamaterials. However, other defects in the form of spatially correlated dislocation networks and micro-segregated cellular substructures overcome the strength-ductility trade-off and render the bulk structures comparable to other engineering materials including conventional steels. By exploiting this intrinsic strengthening mechanism, the bond strength of meta-crystals (i.e. strut strength) can be enhanced (or controlled) on top of employing hardening principles of metallurgy to design materials with desired properties.
△ Less
Submitted 23 October, 2019;
originally announced October 2019.