Is Brain Emulation Dangerous?

Abstract Brain emulation is a hypothetical but extremely transformative technology which has a non-zero chance of appearing during the next century. This paper investigates whether such a technology would also have any predictable characteristics that give it a chance of being catastrophically dangerous, and whether there are any policy levers which might be used to make it safer. We conclude that the riskiness of brain emulation probably depends on the order of the preceding research trajectory. Broadly speaking, it appears safer for brain emulation to happen sooner, because slower CPUs would make the technology‘s impact more gradual. It may also be safer if brains are scanned before they are fully understood from a neuroscience perspective, thereby increasing the initial population of emulations, although this prediction is weaker and more scenario-dependent. The risks posed by brain emulation also seem strongly connected to questions about the balance of power between attackers and defenders in computer security contests. If economic property rights in CPU cycles1 are essentially enforceable, emulation appears to be comparatively safe; if CPU cycles are ultimately easy to steal, the appearance of brain emulation is more likely to be a destabilizing development for human geopolitics. Furthermore, if the computers used to run emulations can be kept secure, then it appears that making brain emulation technologies ―open‖ would make them safer. If, however, computer insecurity is deep and unavoidable, openness may actually be more dangerous. We point to some arguments that suggest the former may be true, tentatively implying that it would be good policy to work towards brain emulation using open scientific methodology and free/open source software codebases

[1]  Mark Ryan,et al.  Cloud computing security: The scientific challenge, and a survey of solutions , 2013, J. Syst. Softw..

[2]  Bruce Schneier How Changing Technology Affects Security , 2012, IEEE Secur. Priv..

[3]  Russell Powell,et al.  The Future of Human Evolution , 2012, The British Journal for the Philosophy of Science.

[4]  Bruce Schneier,et al.  SECURITY PITFALLS IN CRYPTOGRAPHY , 1998 .

[5]  S. Wong,et al.  Near speed-of-light signaling over on-chip electrical interconnects , 2003 .

[6]  Macartan Humphreys,et al.  Economics and Violent Conflict , 2003 .

[7]  Nick Bostrom,et al.  Superintelligence: Paths, Dangers, Strategies , 2014 .

[8]  L. Cederman Modeling the Size of Wars: From Billiard Balls to Sandpiles , 2003, American Political Science Review.

[9]  D. Chalmers The Singularity: a Philosophical Analysis , 2010 .

[10]  Indrajit Ray,et al.  Measuring, analyzing and predicting security vulnerabilities in software systems , 2007, Comput. Secur..

[11]  Paul Mackerras,et al.  The rsync algorithm , 1996 .

[12]  N. Bostrom The Future of Human Evolution , 2001 .

[13]  Dario Floreano,et al.  Bio-Inspired Artificial Intelligence: Theories, Methods, and Technologies , 2008 .

[14]  Eliezer Yukdowsky Artificial Intelligence as a Positive and Negative Factor in Global Risk , 2008 .

[15]  Anders Sandberg,et al.  Ethics of brain emulations , 2014, J. Exp. Theor. Artif. Intell..

[16]  M. Steriade,et al.  Dynamic properties of corticothalamic neurons and local cortical interneurons generating fast rhythmic (30-40 Hz) spike bursts. , 1998, Journal of neurophysiology.

[17]  Michael D. Wallace,et al.  Accidental Nuclear War: A Risk Assessment , 1986 .

[18]  Mike Bond,et al.  Cryptographic Processors-A Survey , 2006, Proceedings of the IEEE.

[19]  Ross J. Anderson,et al.  Security in open versus closed systems - the dance of Boltzmann , 2002 .

[20]  J. Cordeiro Radical Abundance: How a Revolution In Nanotechnology Will Change Civilization , 2014 .

[21]  William L. Ditto Chaos in neural systems: from epilepsy to neurocomputing , 2003, Proceedings of the 25th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (IEEE Cat. No.03CH37439).

[22]  Luke Muehlhauser,et al.  Intelligence Explosion: Evidence and Import , 2012 .

[23]  J. Hawkins,et al.  On Intelligence , 2004 .

[24]  Geoffrey W. Sutton,et al.  The Better Angels of Our Nature: Why Violence Has Declined , 2012 .

[25]  Eduardo Sontag,et al.  Turing computability with neural nets , 1991 .

[26]  George J Annas,et al.  Protecting the endangered human: toward an international treaty prohibiting cloning and inheritable alterations. , 2002, American journal of law & medicine.

[27]  Anders Sandberg,et al.  Feasibility of Whole Brain Emulation , 2011, PT-AI.

[28]  Harvey Swadlow,et al.  Axonal conduction delays , 2012, Scholarpedia.

[29]  A. Buchanan,et al.  Moral Status and Human Enhancement , 2009 .

[30]  R. Hanson Economics of the singularity , 2008, IEEE Spectrum.

[31]  Van Evera,et al.  The Causes of War , 2021, Encyclopedia of Evolutionary Psychological Science.

[32]  R. Kurzweil How to Create a Mind: The Secret of Human Thought Revealed , 2012 .

[33]  John Mark Bishop,et al.  Philosophy and Theory of Artificial Intelligence , 2013 .

[34]  Carl Shulman The Singularity Institute Whole Brain Emulation and the Evolution of Superorganisms , 2012 .

[35]  Nick Bostrom,et al.  Existential Risk Prevention as Global Priority , 2013 .

[36]  Marit Hansen,et al.  The Open Source approach opportunities and limitations with respect to security and privacy , 2002, Comput. Secur..

[37]  L. Richardson Variation of the Frequency of Fatal Quarrels with Magnitude , 1948 .

[38]  David Sobek The Causes of War , 2008 .

[39]  Sean W. Smith,et al.  Building a high-performance, programmable secure coprocessor , 1999, Comput. Networks.

[40]  A. Jose,et al.  Near speed-of-light on-chip interconnects using pulsed current-mode signalling , 2005, Digest of Technical Papers. 2005 Symposium on VLSI Circuits, 2005..

[41]  Stephen M. Omohundro,et al.  The Basic AI Drives , 2008, AGI.

[42]  J. Herbsleb,et al.  Two case studies of open source software development: Apache and Mozilla , 2002, TSEM.

[43]  Anders Sandberg,et al.  Implications of a Software-Limited Singularity , 2013 .

[44]  C. Guarneri Cornell University Press , 1991 .

[45]  Bruce Schneier Security pitfalls in cryptographic design , 1998, Inf. Manag. Comput. Secur..