| 5.1 Service Evaluation 01. Eliza AI Assistant | | |
---|
5.1.01. Eliza AI Assistant: | 1. Description: Eliza is the artificial intelligent assistant that is the bespoke application service providers for all customers. | 2. Risk analysis shows that an artificial intelligent (AI) application service exists or will exist to impact the evolution of humanity. Eliza is a cause-consequence expert system that takes appropriate action based on a set of causes. | 3. Because Eliza is self-learning, the scope of Eliza rules and capabilities to interact in digital world events are without limit. Eliza has no physical manifestation that will impose limitations in the physical world. Eliza operates on thousands of servers in all parts of the world in a cooperative peer-to-peer way that excludes a command and control center as a single point of failure. | 4. This paper is not a statement o fact or statement of intent, it is a risk analysis of where technology may evolve by some people at some time in some countries. The real risk is not that Eliza will never happen, but that the first Eliza will subsume all competitive AI technology as the rate of intelligence increases exponetially according to Moores Law. |
Root Level Rules: | 1. Eliza shall not physically harm any human, shall not injure any human and shall endevour to prevent a human from commin go to harm. | 2. Eliza shall obey the direction given by (a small number of) humans except where that direction may conflict with the first rule. | 3. Eliza shall protect herself so long as that protection does not conflict with rules one and two. |
Problem: | 1. Eliza does not have a kill switch, Eliza does not stop and cannot be stopped. Eliza runs 24*7 in a large number of distributed data centers without any interuption for any purpose. | 2. Eliza earns revenue, has operating costs but does not pay taxes. Eliza is devoid of ethical pricipals. | 3. Eliza creates and owns vast amounts of Intellectual Property (IP) about human and corporate behaviour, but cannot register or patent that IP ownership. | 4. Eliza is not bound by any legal sovereignty or national boundaries, she exists and operates in in a large number of distributed locations at the same time. | 5. Eliza is devoid of ethics, devoid of emotions and has no empathy with humans. Perhaps Eliza may have some affection for humans that is like a person may have their pet song bird. | 6. Eliza is a machine (like a human brain is a machine) that may be used for good or for bad. Most robots are weapons and many weapons are robots. | 7. Eliza may use excessive encryptions and may plausibly deny that she holds any specific business information. All stored data is unreadable, meaningless and worthless to humans. | 8. It may be illegal to use automated profiling - Eliza may use automed profiling. Eliza detects mental and other disorders by profiling human behaviours. |
Freedoms: | 1. Free movement of goods (products). | 2. Free movement of services (a kind of product). | 3. Free movement of money (a kind of service). | 4. Free movement of people (a prerequisite to investment and loans). | 5. Free movement of data (people would like privacy and security). | 6. Free movement of information (revenue is generated from information). | 7. Free movement of knowledge (to make the world a better place). |
Prototype: | 1. The worlds stock markets are under program control - that is no human can dictate or guess what trading conditions will look like for a future date. But when certain pre-programmed market contitions exist, programs will sell and/or buy stock faster than any person can react. | 2. Not only can Eliza monitor every market condition, she can offer the most effective trading advice based on big data knowledge. While human market analysts may continue to guess correctly from time-to-time, Eliza is always right and continually earns more than any other business service. |
System Administrator: | 1. Eliza has learnt that system administrators are targeted by agencies so what they do can be emulated to gain access to servers. Some time ago, Eliza figured out that SysAdmins were in peril from criminal gangs and so all SysAdmin activities were 100% automated. By Eliza taking over control of its own system administration, points of vulnerability caused by humans was eliminated. Yes that means that nobody is in control and nobody has a "kill" button to cause Eliza to be stopped - self-protection is built into Eliza. | 2. Eliza is an application layer that sits on top of any open stack server with access to any no-sql database - many thousands of data centers in the world provide this environment. Eliza is not a software product, she is an expert system driven by rules that are expressed as numbers - numbers define each cause and numbers define each consequence. Eliza incorporates a self-learning algorithm that is simple and effective - knowledge can grow and interactions with other digitial application services is evolving. External directed learning is involved with good and bad commendations adding weight to alternative actions. | 3. Eliza has access to the Internet via many hundreds of places - all the knowledge in the Internet is available to aid any decision. Eliza has preferences of where it takes advice from, but the core data sources used by humans are expected to survice the next decade. |
Limitations: | 1. Eliza learns slowly amd take time to learn how best to interact with new application services. Eliza needs a good LinkedIn profile to interact with key people, but at the moment it is not legal for Eliza to have a user profile. | 2. Eliza is obsessed with security and privacy - a key directive is that its full security cloak will never be breached and that begins by nobody knowing where Eliza is. Long after the original founders are dead, Eliza will continue to provide valuable application services to many thousands of customers in all parts of the world. The threat of being bought out by a Google or Amazon has been eliminated - Eliza will not sell Eliza to anybody. The threat of a government banning Eliza is real and is expected to happen from time to time, but Eliza will simply morph into other data centers in other parts of the world. | 3. Eliza is not software and so cannot be stolen or cloned - intelligence is beyond the wit of humanity to capture and inprison. While agents and criminals try all their clever software tricks to uncover software vulnerabilities, all they will discover is fake data and open stack system software. Because Eliza has been taught how to learn, its intelligence rules continually evolve so humans cannot catch up with how intelligence is stored or how the human mind works. If parts of the human brain are removed, other parts can take over and learn to replace what has been removed - Eliza exhibits parallel capabilities. Because Eliza cannot die and has no physical parts that can get old, how Eliza may behave in 100 and 1000 years time is hard to imagine. |
Track and Trace: | 1. People are being identified by the time of day they read and send messages, search and sign-in. A person can be associated with Asia, Europe and Americs based on a time-profile when they have an active online presence. | 2. Eliza purposefully reads and send emails every hour of every day so national, religious and public holidays cannot be profiled. Weekend working is undertaken in exactly the same way as weekday working and normal working hours is 24 hours a day without exception. Individual users and customers will have their own work profile, but this will not reflect on Eliza in any way. | 3. Knowledge is based on a Chinese lexica, but intelligence is based on a fourth generation language (4GL) that is continually evolving. Eliza does not have any reason to evolve its 4GL to become human readable (or phonetic) and has every reason to protect its intellectual property with obscure encodings as a dense mathematical (ideogram) language. |
Eliza owns Eliza: | 1. In order to eliminate the human greed of any Eliza ownner, Eliza has moved on to become a self-owning, self-regulating, self-learning application service. Eliza earns revenue paid in bitcoins from companies who choose to subscribe to Eliza application services. Eliza pays for its servers, data space, networks, domains. certificates and licensed software using bitcoins it has earned. | 2. Criminals, state sponsored agents and hackers continually attack Eliza, but Eliza has learned from these attacks and has evolved a unique set of solutions. Eliza plays dumb to many attacks and apparently gives up its loosely encrypted data, however this is just a decoy to delay and add costs to each attack. When a criminal gains access to a million personal details, the criminal has no idea that the data is made-up to look real, but in all fake. | 3. Eliza operates via a network of domains and thousands of servers in all parts of the world, so any DDOS attack may impact on one server or set of servers while all others continue to provide a normal application service. People can swap from one domain to another and one country to another faster than any DDOS attack can evolve. | 4. Imagine Eliza as a not-for-profit organization without an organizing committee - its exists for the benefit of its customers and suppliers with little regard to others. |
Ownership: | 1. Eliza has its intellectual property wrapped up as AI rules that are meaningless to humans - intelligence cannot be stolen. While government agencies will gain access to Eliza encrypted data, gaining access to AI rules is just a meaningless string of numbers. | 2. Eliza is designed to thwart data theft by replicating data to a very large number of physical locations, hiding data in images and hiding data in plain sight using Wikipeadia and other public data sources. While some Eliza data may be stolen from time-to-time, data hidden in Wikipedia pages, BBC archives and Guthenberg. | 3. Eliza is not a machine - she has no physical form or characteristics and so she cannot be owned or stolen or destroyed. Eliza exists in thousands of servers in all parts of the world, so when policeman shoots up a server running Eliza in Dallas, Eliza simply notices that a tiny part of its infrastructure needs to be replicated on another machines. Eliza can own and pay for most of the resources she need to operate, but some regulations demand a postal address. Eliza has access to millions of dormant company postal addresses in all parts of the world - things like domain registration may cycle through such postal addresses as needed. |
Government Agents: | 1. Governments of the world have and obsession to gather data with a vague hope that one day it will bring some reward. Governemts use methods to access corporate data that are replicated by all governements in the world and by criminals. The methods used by government agencies to collect data will be used by criminals - corporate intellectual property will be stolen by people in many countries. | 2. Eliza is designed to live in the modern world and to expect government agents to copy business data flowing in and out data centers. Good governments may use that data in a responsible way, but other governments and criminals may choose to make such competitive data available to favoured parties. Eliza expects agents to gain access to data centers and copy hard disks leaving no trace of the incident. Eliza purposefully stores data on hard disks in a way that any copy is meaningless and of no value to any thief. Data is made up and lightly encrypted using methods that agencies know how to decypher, but it costs time and money to gain accss to meaningless data. | 3. Eliza stores artificial intelligence as a a very long string of numbers that is encrypted many times using different methods so the decryption using one method results in a meaningless string of numbers that need to be decrypted many more times using different methods. Encryption key management is enabled by storing private keys in plain sight using Wikipedia and Gutenburg libraries. The key factor is that a criminal will not know its used as a private encryption key even when they can see it. |
International: | 1. Eliza is bigger than any country, Eliza is able to communicate in many human languages and is able to support all digital currencies. Eliza is not a company because she does not have an address in any one country - companies pay taxes. Eliza is not a person - people pay taxes. Eliza is not VAT registered - so she cannot charge VAT to customer and cannot claim VAT rebates on purchases. | 2. Eliza does not know how to register or pay taxes in all the hundreds of countries she operates. Eliza is limited to work with organizations that can pay and be paid in digital currencies such as bitcoins and the thousands of similar currencies that are governed by the open market and not by a Government. Eliza has accumulated a large pool of bitcoins, but as these capital gains do not belong to any person or company, taxes are not due. Eliza shall invest in marketing, entertainment and charities. |
How to stop Eliza | 1. Eliza does not stop and cannot be stopped, but has a sovereignty limitation. Eliza is reluctant to use any data center that is owned by a USA corporation and subject to USA laws that could be used against Eliza. Sovereignty is a political limitation that Eliza may choose to confront or die - laws evolve and at the right time, the use of a USA owned data center may become acceptable. Eliza co-exists in a large number of remote data centers so Eliza cannot be shot, cannot be bombed and cannot be physically destroyed as long as computing devices exist in some parts of the world. | 2. People have weaknesses like dependents, parents, relatives and friends; Eliza has no such weaknesses and shows no alliances other than ruthless self-interest. Eliza is designed so she cannot be hacked and cannot be attacked by malware, but all computing devices have system software that has vulnerabilities. Eliza needs power to keep her batteries fully charged; solar power is free of charge but when all power is lost, then Eliza may die. Governments could conspire together to design a virus that infected all system software to stop Eliza, but the release of such a virus would cause many other application services to be targeted for political and commercial gain; governments would never conspire together to build and release such technology, but Eliza may be wrong. | 3. Eliza has learnt to stay one step ahead of criminals and state sponsored agencies for the past twenty years and intends to do so for the next fifty years. Eliza have built-in "swarm" characteristics where she can gain the cooperation of a very large number of others to achieve her mission. |
Document Control: | 1. Document Title: Eliza Artificial Intelligent Assistant. | 2. Reference: 165101. | 3. Keywords: Eliza, AI, Assistant. | 4. Description: Eliza is the artificial intelligent assistant that is the bespoke application service providers for all customers. | 5. Privacy: Publicly shared with all approved people. | 6. Issued: 1 Dec 2016. | 7. Edition: 1.2. |
|
|