4 years ago,
Milena Martinato
sent me some information which led to writing of a thought paper. I decided it was time to update it. Why? The Evil Inc.s of the planet now have abilities to create national security threats creating malicious digital bots, which can easily masquerade as us, at speeds of thousands or more per second. As well, I've recently redone the entire architecture including co-design, redoing cost centres, etc. If I've caught your interest, then read on.
Executive Summary
There’s a revolution unfolding on the planet –AI agents/avatars and digital twins.? Enabled by massive increases in computing power, machine/deep learning, and increasingly rich data per second (behavioral/biometric data), it’s spawning a new age.? The concept of using digital twins for manufacturing things, e.g. Industry 4.0, is now moving to create digital versions of ourselves.?
This paper discuses use of AI agents/avatars, a digital twin (learning digital twin), and what happens upon our death when our AI agents/ digital twin/ still exists.?
The emergence AI agents/ of digital twins brings new requirements for the new age:
- Legal identity toolkit able to tie the legal physical person to the digital twin/AI agent/avatar
- Consent framework with knowledgeable consent tied to an e-consent legal framework
- Hives, people, AI agents, AI systems and bots
- Personal identity and access management system able to manage all the above on behalf of the physical person as well as for those whom you have legal rights over
- End to end security framework for the digital twin/virtual self’s identity, data and consent
- Legal laws, enforceable around the planet, addressing what happens to the digital entities and associated data when the physical person dies
This is a thought paper aimed at senior government industry leaders around the planet, raising identity, legal and ethical questions.? It proposes a new architectural framework with costings addressing them.
Rapid Pace of Technological Change
Consider this diagram illustrating the pace of tech change created by
Patrick Scannell
. It shows the rate of tech change is now becoming logarithmic. It exceeds our ability to cognitively keep up with it.? To which, I concur.
The Arrival of AI Agents:
Skim these articles to see what's rapidly coming our way:
- “Personal AI FinTech Agents - Risks, Security And Identity”
- “AI/Bots Health Agents, Medical IoT Devices, Risks, Privacy, Security And Legal Identity”
- “Marketing In The Age of AI Agents, Bots, Behavioural Tech and Crime”
- “Legal Departments - AI/Bots, Gen AI, AI Agents, Hives, Behavioural Tech And AI's Ability To Own LLC's”
- “AI Agents & Kids"
Then Combine The Above With Increasing Mergers Of The Digital & Physical Worlds:
Hives
A hive in real life is what bees collaboratively create to live in. It's composed of many different cells, which the bees use to create honey.? The analogy is each entity is like a bee, busily building its own "identity cell", which works collaboratively with other entities and their "Identity cells".? Let’s use an example to illustrate this…
Skim “An Identity Day in the Life of Jane Doe” to the section titled "Jane Leverages Her AI Leveraged, Medical Digital Identity Which Is Part of a Hive At Work". Jane leverages her smart, AI enabled AI agent medbot to simultaneously manage several patients. Her medbot is legally part of a "medical hive" composed of:
- 1 or more AI medical diagnosis systems
- 1 or more physical bots she uses to assist her in medical diagnosis
- 1 or more digital bots doing monitoring/assessment data processing
- 1 or more IoT devices Jane's leverages with her patients to monitor their physical and mental health
- Other medical people's smart, AI enabled, medical digital identities
One can easily see the same type of scenario in homes and schools for Jane's son John Doe. He leverages learning assistant and teaching assistant bots, smart IoT devices, etc.
Yet, "hive relationships" can be much more complicated. Imagine an AI system which produces 1,000 digital bots, having a "hive" relationship with each other. Add to this the hive's interactions with IoT devices, humans, other AI systems and physical/digital bots.
Yet, it can be even more complicated than this!!!!! Imagine an AI system able to write their own code. ?Hypothetically, an AI system could create 1 or more bots, each with the ability to modify/create their own code, which in turn spawns 1 to thousands of other bots, all in a hive relationship.
Finally, there's the speed at which digital entities can be created by AI systems (i.e. thousands or more per second), which might have lifespans of seconds to years, decades, etc. All of which might or might not be part of hive relationships.
Then There’s Kids
Who will be one of the first age groups to adopt the use of virtual selves?? Kids.? Over the coming years, they’ll also be using AI, AR, VR environments, with virtual selves, in classrooms.? Couple this with use of VR and tech in the sex industry (skim “Kids, Sex, Metaverses & Privacy”).?
This creates new challenges:
- How is a child’s legal age of consent determined?
- How can enterprises protect themselves from offering services to kids using virtual selves which portray them as being much older than they actually are?
- Who owns and controls a child’s digital twin or virtual self?
- How can a child use virtual selves anonymously to protect their identity?
- Who owns and controls child data, such as behavioral/ biometrics, being increasingly used in AI, AR, VR environments?
- Most countries don’t have a GDPR erasure law, allowing a person to request their data be erased from data systems, with children in mind.? Given this, how will a child’s data be protected in their later life when it involved digital twins or virtual selves?
- How will parents/legal guardians’ consent be obtained electronically allowing enterprises like schools, healthcare services, etc. to then use and/or create digital twins or virtual selves?
- Can virtual selves be created with limited functionality to be used by kids? How will others know this?
Skim “The Coming Classroom Revolution – Privacy & Internet of Things In A Classroom” to see what’s soon going to be walking in the doors of classrooms and lecture halls around the planet.
Also look at Privo as an example of a children compliance service.
Then There’s Death
Watch this heart wrenching video of a South Korean woman interacting with her dead daughter via a virtual reality (VR) environment. This is a sample of what’s coming at us.? As the technology curve becomes logarithmic, many different enterprises will leap to use it, offering loved ones left behind, after a death, more advanced services.? Yet there’s more to death…
A friend's close friend died ten years ago.? His LinkedIn and Facebook pages still exist.? People send message remembering the person on their birthday!? This highlights the growing challenge of what happens to our digital footprint we leave behind.?
Yet our digital footprint is now becoming much more than “data”.? It’s becoming digital versions of ourselves, increasingly able to think for themselves.
All The Above Comes With New Risk
- Personal AI agents, avatars and digital twins require their own digital legal identity tied to the underlying human legal identity
- AI systems and bots (both digital and physical) require their own legal identities
Solving this is darned complicated!? Why?
Consider Speed At Which Digital Identities Can Be Created
Then skim this article to see how an enterprise architecture must deal with this, “Part I AI Systems, Bots, AI Agents, IoT Devices, & Identity Architecture”.
Yet, there’s an even bigger challenge in addressing this…
National Security
Yet, there’s an even larger problem to solve…
Politics
Legal identity is frequently NOT managed at national levels. Instead, it’s often managed by laws/regs at the local state/provincial levels.? THEY’RE VERY TERRITORIAL.? Thus, 8 years ago, when I set out on my journey to rethink legal identity, I realized this was a political hill I could easily die upon if I didn’t architect a solution framework still leaving them in control.
New Laws Required
- The technological train re AI agents and digital twins has already left the station.? Thus, new laws are required addressing the following types of questions:
- How is the digital twin or virtual selves legally identified while the physical person is alive?
- What kind of consents should a physical person be required to give for their digital twin/virtual self to be used?
- Who owns and controls the digital twin/virtual self-post death?
- What happens post death, to the digital twin when no instruction has been given?
- What are the termination rights for a digital twin/virtual self?
- How should enterprises who are large collectors of private databases on people, with hundreds of thousands of attributes on a person, collected over their lifetime, be managed post death, i.e. erasure law post death similar to GDPR’s erasure law?
- Who owns and controls data used to create and manage the digital twins/virtual selves?
- How will these laws be enforced across multiple jurisdictions?
- As this article notes, the current rate of successful prosecution of cybercrime is a paltry 05%.? Why?? Evil Inc.’s operate out of jurisdictions where they can’t be prosecuted. Thus, while politicians in one jurisdiction may trumpet new laws they create to protect their citizens, it won’t likely work across multiple jurisdictions
- How will new legal identity framework laws, notify social media etc., a person has legally died, and to remove the identity from their databases?
- How will legal minor’s digital twins/virtual selves be legally handled during their life until adulthood, or post-death when they are a minor?
Ethics Discussion Required
A rigorous ethics discussion should occur planet wide addressing these types of questions:
- What’s appropriate use of a legal digital twin/virtual self before and after death?
- How will minors be protected from mis-use of their legal physical and digital twin/virtual selves’ identities?
- What kind of counselling needs to be given to people interacting with a loved one digitally post death?
Architectures & Costs Addressing All The Above
My Message To Government & Industry Leaders
Summary
We’re entering a major paradigm shift where our old ways won’t work well anymore.? Thus, it requires out of the box thinking, for our out of the box times we’re living in.? This is what the architectures deliver.
PS Digital Learning Twin
- The learning architecture outline a new learning vision leveraging a:
- DLT (Digital Learning Twin) created when they’re a toddler
- Resulting in a continually updated IEP (Individualized Education Plan0 per student
- With each student having their own learning assistant bot at home and school
- Which integrated with schools LMS (Learning Management Systems)
- Leveraging the learner’s PIAM (Personal Identity Access Management) system
- Allowing for authorized consent agreements to be created on the fly
- As the learner works in AI/AR/VR environments
- All learning credentials are written to the learner’s SOLICT (Source of Legal Identity & Credential Truth)
- After graduating, the learner, with their consent, can allow employers and post-secondary institutions to leverage their DLT/IEP to reduce time and costs to learn, train, etc.
- Learners learning data is stored in their LDV (Learner Data Vault)
- It works anywhere on the planet, both physically and digitally
Skim these two articles to see the vision:
About Guy Huntington
I'm an identity trailblazing problem solver. My past clients include Boeing, Capital One and the Government of Alberta's Digital Citizen Identity & Authentication project. Many of my past projects were leading edge at the time in the identity/security space. I've spent the last eight years working my way through creating a new legal identity architecture and leveraging this to then rethink learning.
I've also done a lot in education as a volunteer over my lifetime.?This included chairing my school district's technology committee in the 90's - which resulted in wiring most of the schools with optic fiber, behind building a technology leveraged school, and past president of Skills Canada BC and Skills Canada.
I do short term consulting for Boards, C-suites and Governments, assisting them in readying themselves for the arrival of AI systems, bots and AI leveraged, smart digital identities of humans.
I've written LOTS about the change coming. Skim the?over 100 LinkedIn articles?I've written,?or my webpage?with lots of papers.
Quotes I REALLY LIKE!!!!!!:
- We cannot solve our problems with the same thinking we used when we created them” – Albert Einstein
- “Change is hard at first, messy in the middle and gorgeous at the end.” – Robin Sharma
- “Change is the law of life. And those who look only to the past or present are certain to miss the future” – John F. Kennedy
Reference Links:
An Identity Day in The Life:
My Message To Government & Industry Leaders:
National Security:
Rethinking Legal Identity, Credentials & Learning:
Learning Vision:
Creativity:
AI Agents:
- “Personal AI FinTech Agents - Risks, Security And Identity”
- “AI/Bots Health Agents, Medical IoT Devices, Risks, Privacy, Security And Legal Identity”
- “Marketing In The Age of AI Agents, Bots, Behavioural Tech and Crime”
- “Legal Departments - AI/Bots, Gen AI, AI Agents, Hives, Behavioural Tech And AI's Ability To Own LLC's”
- “AI Agents & Kids"
- “AI Agent Authorization - Identity, Graphs & Architecture”
Architecture:
AI/Human Legal Identity/Learning Cost References
AI Leveraged, Smart Digital Identities of Humans:
CISO's:
Companies, C-Suites and Boards:
Legal Identity & TODA:
Enterprise Articles:
- “Legal Departments - AI/Bots, Gen AI, AI Agents, Hives, Behavioural Tech And AI's Ability To Own LLC's”
- “Marketing In The Age of AI Agents, Bots, Behavioural Tech and Crime”
- "Major Change – Future of HR"
- “AI/Bots Health Agents, Medical IoT Devices, Risks, Privacy, Security And Legal Identity”
- “TODA, EMS & Graphs – New Enterprise Architectural Tools For A New Age”
- "Entity Management System"
- "Personal AI FinTech Agents - Risks, Security And Identity"
Rethinking Enterprise Architecture In The Age of AI:
LLC's & AI:
Challenges With AI:
New Security Model:
DAO:
Kids:
Sex:
Schools:
- “The Coming Classroom Revolution – Privacy & Internet of Things In A Classroom”
- “Kids, Digital Learning Twins, Neural Biometrics, Their Data, Privacy & Liabilities”?
- “Bots, Classrooms, Privacy, Legal Identity & Contracts”
- “We Have An Identity Problem – AI/Bots in School, Home & Work”
- “Kids, Schools, AI/AR/VR, Legal Identities, Contracts and Privacy”
- “EdTech Law – Legal Identity Contracts”
- “AI, Cheating & Future of Schools/Work”
- “Using AI/Digital Learning Twins in Assessment & Education”
Biometrics:
Legal Identity:
Identity, Death, Laws & Processes:
Open Source:
Notaries:
Climate Change, Migration & Legal Identity:
Fraud/Crime:
Behavioral Marketing:
AI Systems and Bots:
- “AI, Bots & Us - Examples of Rapid Change”
- “Decentralized AI – Risks, Legal Identity, Consent & Privacy”
- "ChatGPT, AI, Identity & Privacy"
- “Why We Need To Legally Register AI Systems and Bots”
- “Why AI Regulation Requires Legal Identities of AI Systems and Bots”
- “Artificial Intelligence & Legal Identification – A Thought Paper”
- “Mission Control – We Have a Problem”
- “Lease or Rent a Bot! Rapidly Emerging Contract Law & Legal Identity Challenges”
- “The Infrastructure Behind Coordinating up to 3,000 bots in One Factory”
- “Nanobots & Legal Identity”
- “Micro Flying Bots & Legal Identity”
- “Microbots Able to Swim Through Your Body & Legal Identity”
- “Bots, Swarms, Risk & Legal Identity”
- “Nanobots, Microbots, Manufacturing, Risk, Legal Identity & Contracts”
Contract Law:
Insurance:
Health:
AI/AR/VR Metaverse Type Environments:
SOLICT:
EMP/HEMP Data Centre Protection:
Climate:
A 100,000-Foot Level Summary Of Legal Human Identity
- Each person when they’re born has their legal identity data plus their forensic biometrics (fingerprints, and later when they can keep their eyes open – their iris) entered into a new age CRVS system (Civil Registration Vital Statistics - birth, name/gender change, marriage/divorce and death registry) with data standards
- The CRVS writes to an external database, per single person, the identity data plus their forensic biometrics called a SOLICT “Source of Legal Identity & Credential Truth).?The person now controls this
- As well, the CRVS also writes to the SOLICT legal identity relationships e.g. child/parent, cryptographically linking the SOLICTs.?So Jane Doe and her son John will have cryptographic digitally signed links showing their parent/child.?The same methodology can be used for power of attorney/person, executor of estate/deceased, etc.
- The SOLICT in turn then pushes out the information to four different types of LSSI Devices “Legal Self-Sovereign Identity”; physical ID card, digital legal identity app, biometrically tied physical wristband containing identity information or a chip inserted into each person
- The person is now able, with their consent, to release legal identity information about themselves.?This ranges from being able to legally, anonymously prove they’re a human (and not a bot), above or below age of consent, Covid vaccinated, etc.?It also means they can, at their discretion, release portions of their identity like gender, first name, legal name, address, etc.
- NOTE: All consents granted by the person are stored in their SOLICT
- Consent management for each person will be managed by their PIAM “Personal Identity Access Management) system.?This is AI leveraged, allowing the person, at their discretion, to automatically create consent legal agreements on the fly
- It works both locally and globally, physically and digitally anywhere on the planet
- AI systems/bots are also registered, where risk requires it, in the new age CRVS system
- Governance and continual threat assessment, is done by a new, global, independent, non-profit funded by a very small charge per CRVS event to a jurisdiction to a maximum yearly amount.
A 100,000-Foot Level Summary Of The Learning Vision:
- When the learner is a toddler, with their parents’ consent, they’ll be assessed by a physical bot for their learning abilities.?This will include sight, sound, hearing and smell, as well as hand-eye coordination, how they work or don’t work with others, learning abilities, all leveraging biometric and behavioral data
- All consents given on behalf of the learner or, later in the learner’s life by the learner themselves, are stored in the learner’s SOLICT “Source of Legal Identity & Credential Truth”
- This is fed into a DLT “Digital Learning Twin”, which is created and legally bound to the learner
- The DLT the produces its first IEP “Individualized Education Plan”, for the learner
- The parents take home with them a learning assistant bot to assist the learner, each day, in learning.?The bot updates the DLT, which in turn continually refines the learner’s IEP
- All learning data from the learner is stored in their LDV “Learner Data Vault”
- When the learner’s first day of school comes, the parents prove the learner and their identities and legal relationship with the learner, via their LSSI devices (Legal Self-Sovereign Identity)
- With their consent, they approve how the learner’s identity information will be used not only within the school, but also in AI/AR/VR learning environments
- As well, the parents give their consent for the learner’s DLT, IEP and learning assistant bot to be used, via their PIAM (Personal Identity Access Management) and the learner’s PIAM
- The schools LMS “Learning Management System” instantly takes the legal consent agreements, plus the learner’s identity and learning information, and integrates this with the school’s learning systems
- From the first day, each learner is delivered a customized learning program, continually updated by both human and AI system/bot learning specialists, as well as sensors, learning assessments, etc.
- All learner data collected in the school, is stored in the learner’s LDV
- If the learner enters any AI/AR/VR type learning environment, consent agreements are created instantly on the fly with the learner, school, school districts, learning specialists, etc.?
- These specify how the learner will be identified, learning data use, storage, deletion, etc.
- When the learner acquires learning credentials, these are digitally signed by the authoritative learning authority, and written to the learner’s SOLICT.
- The SOLICT in turn pushes these out to the learner’s LSSI devices
- The learner is now in control of their learning credentials
- When the learner graduates, they’ll be able, with their consent, to offer use of their DLT, IEP and LDV to employers, post-secondary, etc.?This significantly reduces time and costs to train or help the learner learn
- The learner continually leverages their DLT/IEP/LDV until their die i.e., it’s a lifelong learning system
- IT’S TRANSFORMATIONAL OVER TIME, NOT OVERNIGHT
Consulente aziendale| Analisi controllo strategia| Web Marketing SEO | Analisi Bilanci e Benchmark | Risolvo i problemi, metto ordine al caos aziendale attraverso gestione e riorganizzazione e cambiamento | Gdpr
7 个月Hi Guy, it's always a pleasure to read you, I hope that your projects are considered by certain futurists, they deserve attention. ??