Feeds

Robots capable of 'deceiving humans' built by crazed boffins

'We do understand there's a downside to this'

Next gen security for virtualised datacentres

Worrying news from Georgia, America, where boffins report that they have developed robots which are able to "deceive a human".

"We have been concerned from the very beginning with the ethical implications related to the creation of robots capable of deception and we understand that there are beneficial and deleterious aspects," says Ronald Arkin, interactive-computing prof at the Georgia Institute of Technology.

The black robot has fooled the red one by laying a false trail. Credit: GIT

Old Red, the Roscoe P Coltrane of the robot world

"Robots will probably rarely use deception, but it's still an important tool in the robot's interactive arsenal because robots that recognize the need for deception have advantages," adds Arkin's fellow liar-droid builder, GIT engineer Alan Wagner.

The method chosen by the two men to test their new and mendacious robot algorithms was that of setting one robot to try and hide from another. The fleeing droid would move through a region of prepositioned markers, knocking some of them down and so leaving a trail indicating where it was going.

But the cunning decepto-bots naturally laid false trails, swerving off towards alternative hides once clear of the markers.

"The hider's set of false communications was defined by selecting a pattern of knocked over markers that indicated a false hiding position," explains Wagner.

This fiendish plan apparently fooled the hunter droids 75 per cent of the time.

"We have developed algorithms that allow a robot to determine whether it should deceive a human or other intelligent machine and we have designed techniques that help the robot select the best deceptive strategy to reduce its chance of being discovered," says Arkin, proudly.

"We strongly encourage discussion about the appropriateness of deceptive robots to determine what, if any, regulations or guidelines should constrain the development of these systems," adds the prof.

So there you have it - conclusive proof that robots are quite capable of lying to or otherwise deceiving their fleshy masters. Don't trust the machines.

Arkin and Wagner's paper Acting Deceptively: Providing Robots with the Capacity for Deception can be read in here (pdf). ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Our LOHAN spaceplane ballocket Kickstarter climbs through £8000
Through 25 per cent but more is needed: Get your UNIQUE rewards!
LOHAN tunes into ultra long range radio
And verily, Vultures shall speak status unto distant receivers
EOS, Lockheed to track space junk from Oz
WA facility gets laser-eyes out of the fog
Volcanic eruption in Iceland triggers CODE RED aviation warning
Lava-spitting Bárðarbunga prompts action from Met Office
NASA to reformat Opportunity rover's memory from 125 million miles away
Interplanetary admins will back up data and get to work
LOHAN Kickstarter breaks NINETEEN THOUSAND of your EARTH POUNDS
That's right, OVER 9,000 beer tokens - and counting
Major cyber attack hits Norwegian oil industry
Statoil, the gas giant behind the Scandie social miracle, targeted
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.