Footnotes to Plato from the foothills of the Superstition Mountains

AI, Intellectual Theft, and Lawsuits

A year or two ago I was bumping along at about one thousand page views per diem when I experienced an unusual uptick in traffic. Inspection of the MavPhil traffic log suggested that my content was being stolen. But I didn't much care, and I still don't much care inasmuch as my content has very little commercial value, and in any case, I'm a "made man" with more than enough loot to see me through my remaining sublunary travels and travails. My thinking and writing is a labor love and not a money-making enterprise. Add to that the fact that I'm an Enough is Enough kind of guy who has no interest in piling up the lean green far in excess of what is needed.  And maybe I'm steering Group Mind or Objektiver Geist in a wholesome direction. I'm doing my bit, like a good Boomer, to make this world a better place. 

But what if you make your living by scribbling? What if you have a 'high maintenance' wife, children, a hefty mortgage and you live in a high-tax lefty locale? Interesting questions here.  More grist for the mill.

And so I tip my  hat to Ingvarius Maximus the Alhambran for sending us to  this Washington (Com)Post article actually worth reading. Access is free. (What fool pays for access to such a crappy publication?)

One more thing. When lawyers are replaced by AI systems will AI systems be suing AI systems over intellectual property theft? 


by

Tags:

Comments

4 responses to “AI, Intellectual Theft, and Lawsuits”

  1. Joe Odegaard Avatar

    This kind of theft is why, when I design new things, I use a drafting board, and paper, and a pencil. And a tungsten light bulb. Sometimes the old ways are the best ways.

  2. Joe Odegaard Avatar

    Many more good reasons to go analog, and avoid computers and “AI,” are outlined in this sobering article about our enemy China:
    https://spectator.org/digital-landmines-beijings-quiet-invasion/

  3. BV Avatar
    BV

    Be serious Joe, we are not going to go analog, avoid computers, or dump AI. All that is here to stay — until such time as cyber warfare leads to nuclear holocaust. You are I should rejoice that we are old men who have had a good run. The end may well be nigh. Time for Ultimate (as opposed to proximate) Prep: praeparatio mortis.
    Sancta Maria, mater dei, ora pro nobis peccatoribus, nunc et in hora mortis nostrae.
    The article you cite is important and chilling and people should read it.
    >>The real problem? We’re numb to breach. What once triggered national panic now barely scratches the news cycle. But intent has changed. Today’s attacks aren’t about stolen trade secrets — they’re about planting latent explosives in our infrastructure, dormant yet deadly, waiting for political ignition. Volt Typhoon didn’t hack Massachusetts to observe. It nested, silently, ready to flip switches. TechRadar cited government sources warning this is not the endgame. It’s the staging ground.<< Luckily, Trump's in the saddle. So all is not lost. The illegals have to be rounded up and deported. But beyond that, and perhaps even more important, is a total reform of LEGAL immigration policy: no Sharia-supporting Muslims may be allowed in, and no Chinese either unless they are subject to extremely rigorous vetting. It is not enough to secure the borders against illegals. It must also be secured against nefarious LEGALS. But it may be too late. But I have a fall-back position. Death is Janus-faced: Grim Reaper - Benign Releaser.

  4. BV Avatar
    BV

    >>What’s needed now is doctrine. Treat foreign cyber intrusions as acts of aggression, not IT issues. Enforce mandatory breach disclosure for critical infrastructure operators. Penalize any firm that fails to patch known vulnerabilities or delays mitigation. And above all, empower Cyber Command to strike first: neutralize command-and-control centers, disrupt attacker infrastructure, and inject cost into breach attempts.
    The Chinese model is disturbingly efficient. It disperses risk, removes attribution, and ensures persistent access. As the Washington Post detailed, Salt Typhoon exploited vulnerabilities in common networking hardware to establish long-term presence in U.S. telecom backbones. They didn’t knock. They mined the hallway, rigged the wiring, and left the lights on — for now.
    We are already living in a contested digital battlespace. Every day we delay action is another day malware lingers, undetected, patient. We’ve allowed infrastructure breaches to become white noise. And China has noticed. The game is no longer denial. It’s readiness. And right now, we’re behind.<< Read it all, kiddies. And stop being a pollyannish Dementocrat!

Leave a Reply

Your email address will not be published. Required fields are marked *