{"id":2542,"date":"2018-06-08T17:33:09","date_gmt":"2018-06-08T17:33:09","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/threatpost\/?p=132679"},"modified":"2018-06-08T17:33:09","modified_gmt":"2018-06-08T17:33:09","slug":"google-tackles-ai-principles-is-it-enough","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/google-tackles-ai-principles-is-it-enough\/","title":{"rendered":"Google Tackles AI Principles: Is It Enough?"},"content":{"rendered":"<div class=\"media_block\"><\/div>\n<p>Google has released its manifesto of principles guiding its efforts in the artificial intelligence realm \u2013 though some say the salvo isn\u2019t as complete as it could be.<\/p>\n<p>AI is the new golden ring for developers, thanks to its potential to not just automate functions at scale but also to make contextual decisions, based on what it learns over time. This experiential aspect has the capacity to bring immense good to the proceedings of life, in the form of weeding out cyber-threats before they happen, offering smarter recommendations to consumers and improving algorithms, even tracking wildfire risk and monitoring the environments of endangered species \u2013 or, on the back-end, it can speed along manufacturing processes or evaluate open-source code for potential flaws.<\/p>\n<p>What we don\u2019t want, of course, is a Matrix-y, Skynet-y, self-aware network interested in, say, enslaving humans.<\/p>\n<p>Google is looking to thread this needle with its latest weigh-in on the AI front, its <a href=\"https:\/\/blog.google\/topics\/ai\/ai-principles\/\" target=\"_blank\" rel=\"noopener\">principles for guiding AI development<\/a>. The company uses AI to filter spam from email and to power its digital assistant for Google Home; and it incorporates it into cool things such as overlaying augmented reality to photos to point out items of interest. As CEO Sundar Pichai said in a post Thursday, the company \u201cinvests heavily in AI research and development, and makes AI technologies widely available to others via our tools and open-source code.\u201d<\/p>\n<p>Given this, the company has released seven values to guide AI work, which Pichai said the company is approaching \u201cwith humility.\u201d<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/31\/2018\/06\/08131038\/I_Robot_-_Runaround.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-132684 size-medium\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/31\/2018\/06\/08131038\/I_Robot_-_Runaround-185x300.jpg\" alt=\"\" width=\"185\" height=\"300\"\/><\/a>These are the equivalent of Isaac Asimov\u2019s three rules of robotics, but Google is doing the sci-fi hero four better. Asimov famously postulated: A robot may not injure a human being or, through inaction, allow a human being to come to harm; a robot must obey orders given it by human beings except where such orders would conflict with the First Law; and a robot must protect its own existence as long as such protection does not conflict with the First or Second Law.<\/p>\n<p>The internet giant seems to have an eye towards these, along with risk-reward, with its seven tenets, which are: Be socially beneficial; avoid creating or reinforcing unfair bias; be built and tested for safety; be accountable to people; incorporate privacy design principles; uphold high standards of scientific excellence; be made available for uses that accord with these principles.<\/p>\n<p><strong>Google\u2019s AI Principles: Addressing Unintended Consequences<\/strong><\/p>\n<p>That AI should be socially beneficial, be designed with safety checks, and be accountable to people speak to the dark robotic overlord trope in many ways.<\/p>\n<p>Google\u2019s AI technologies will be \u201csubject to appropriate human direction and control,\u201d Pichai said, adding that \u201cWe will continue to develop and apply strong safety and security practices to avoid unintended results that create risks of harm\u2026.In appropriate cases, we will test AI technologies in constrained environments and monitor their operation after deployment.\u201d<\/p>\n<p>He also noted on the first point that development will \u201ctake into account a broad range of social and economic factors, and will proceed where we believe that the overall likely benefits substantially exceed the foreseeable risks and downsides.\u201d<\/p>\n<p>All of this is important, given that the potential for things to go wrong exists, according to some of the great minds out there. Tesla CEO Elon Musk for instance told the National Governors Association last summer that AI poses a \u201cfundamental risk to the existence of human civilization.\u201d<\/p>\n<p>Bill Gates is on record too: \u201cFirst the machines will do a lot of jobs for us and not be super-intelligent. That should be positive if we manage it well,\u201d he\u00a0<a href=\"http:\/\/www.washingtonpost.com\/blogs\/the-switch\/wp\/2015\/01\/28\/bill-gates-on-dangers-of-artificial-intelligence-dont-understand-why-some-people-are-not-concerned\/\" target=\"_blank\" rel=\"noopener\">said<\/a>\u00a0during a Reddit Ask Me Anything Q&amp;A a few years ago. \u201cA few decades after that though, the intelligence is strong enough to be a concern.\u201d<\/p>\n<p>Stephen Hawking also weighed in before his passing: \u201cThe development of full artificial intelligence could spell the end of the human race,\u201d he told the\u00a0<a href=\"http:\/\/www.bbc.co.uk\/news\/technology-30290540\" target=\"_blank\" rel=\"noopener\">BBC<\/a>.<\/p>\n<p>Unintended consequences do happen: last year, the research team at Facebook Artificial Intelligence Research (FAIR) <a href=\"https:\/\/www.fastcodesign.com\/90132632\/ai-is-inventing-its-own-perfect-languages-should-we-let-it\" target=\"_blank\" rel=\"noopener\">pulled the plug<\/a> on an AI project after the AI developed its own language. FAIR built two AIs, named Alice and Bob, who were tasked with learning how to negotiate between themselves to trade hats, balls and books, by observing and imitating human trading and bartering practices. Over the course of the testing, the chatbots decided that English was inefficient, and began stripping out what they saw as superfluous linguistics until they had their own babble-talk.<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/31\/2018\/06\/08132321\/Robot_Retro.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-132685 size-thumbnail\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/31\/2018\/06\/08132321\/Robot_Retro-150x150.jpg\" alt=\"\" width=\"150\" height=\"150\"\/><\/a>\u201cThere was no reward to sticking to English language,\u201d Dhruv Batra, visiting research scientist from Georgia Tech at FAIR, speaking to <em>Fast Company<\/em>. \u201cAgents [the AIs] will drift off understandable language and invent codewords for themselves. Like if I say \u2018the\u2019 five times, you interpret that to mean I want five copies of this item. This isn\u2019t so different from the way communities of humans create short-hands.\u201d<\/p>\n<p>Batra added, \u201cIt\u2019s important to remember, there aren\u2019t bilingual speakers of AI and human languages.\u201d<\/p>\n<p>So Facebook went back to the drawing board and programmed a new requirement for AIs to use English-language conversations.<\/p>\n<p>Pichai noted that many technologies have multiple uses, and said that Google will work to limit potentially harmful or abusive applications by evaluating the \u201cprimary purpose and likely use of a technology and application, including how closely the solution is related to or adaptable to a harmful use.\u201d<\/p>\n<p>AI applications that Google won\u2019t pursue include those where there is a material risk of harm, including weapons or other technologies whose \u201cprincipal purpose or implementation is to cause or directly facilitate injury to people.\u201d<\/p>\n<p><strong>Privacy Concerns<\/strong><\/p>\n<p>When it comes to incorporating privacy by design, Pichai noted: \u201cWe will incorporate our privacy principles in the development and use of our AI technologies. We will give opportunity for notice and consent, encourage architectures with privacy safeguards, and provide appropriate transparency and control over the use of data.\u201d<\/p>\n<p>In the harmful applications arena, he also pledged that Google wouldn\u2019t participate in developing \u201ctechnologies that gather or use information for surveillance violating internationally accepted norms,\u201d nor \u201ctechnologies whose purpose contravenes widely accepted principles of international law and human rights.\u201d<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/31\/2018\/06\/08133155\/hal-2001-space-odyssey_AI_Artificial_Intelligence-e1528479138892.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-132686 size-medium\" src=\"https:\/\/s3-eu-west-1.amazonaws.com\/khub-media\/wp-content\/uploads\/sites\/31\/2018\/06\/08133155\/hal-2001-space-odyssey_AI_Artificial_Intelligence-207x300.jpg\" alt=\"\" width=\"207\" height=\"300\"\/><\/a><\/p>\n<p>Privacy watchdog Electronic Frontier Foundation unsurprisingly <a href=\"https:\/\/www.eff.org\/deeplinks\/2018\/06\/how-good-are-googles-new-ai-ethics-principles\" target=\"_blank\" rel=\"noopener\">weighed in<\/a> on these, citing a few concerns.<\/p>\n<p>In a post, EFF acknowledged that \u201con many fronts, the principles are well thought-out and promising. With some caveats, and recognizing that the proof will be in their application by Google, we recommend that other tech companies consider adopting similar guidelines for their AI work.\u201d<\/p>\n<p>Concerns however include a fear that Google hasn\u2019t committed to a third-party, independent review to ensure the AI principles are actually implemented.<\/p>\n<p>\u201cWithout that, the public will have to rely on the company\u2019s internal, secret processes to ensure that these guidelines are followed,\u201d EFF said.<\/p>\n<p>Another concern is with the language, \u201cwidely accepted principles of international law and human rights.\u201d This is too vague given that human rights principles are too unsettled in this arena, EFF pointed out.<\/p>\n<p>\u201cIt is not at all settled \u2014 at least in terms of international agreements and similar law \u2014\u00a0 how many key international law and human rights principles should be applied to various AI technologies and applications,\u201d the group said. \u201cThis lack of clarity is one of the key reasons that we and others have called on companies like Google to think so hard about their role in developing and deploying AI technologies, especially in military contexts.\u201d<\/p>\n<p>And indeed, Google has landed in controversy thanks to its participation in <a href=\"https:\/\/www.nytimes.com\/2018\/04\/04\/technology\/google-letter-ceo-pentagon-project.html\" target=\"_blank\" rel=\"noopener\">Project Maven<\/a>, which is a Department of Defense effort to use object recognition and machine learning for military purposes. Google had become a contractor for that project, but the level of its involvement is murky, according to reports.<\/p>\n<p>Thus, EFF also offered specific guidance for Google and others to follow when it comes to surveillance: \u201cWe want to hear clearly that those include the Necessary and Proportionate Principles, and not merely the prevailing practice of many countries spying on the citizens of almost every other country. In fact, in the light of this practice, it would be better if Google tried to avoid building AI-assisted surveillance systems altogether.\u201d<\/p>\n<p>Others are feeling cynical about the declaration of principles.\u00a0Mike Banic, vice president at\u00a0Vectra, told Threatpost thatactions will speak louder than words.<\/p>\n<p>\u201cThe coincidence of this blog publishing roughly two weeks after the news about\u00a0<a href=\"https:\/\/www.cnbc.com\/2018\/05\/24\/amazon-echo-recorded-conversation-sent-to-random-person-report.html\" target=\"_blank\" rel=\"noopener\">Alexa sending a secretly recorded conversation to someone<\/a>\u00a0via email may bring out the cynic in some readers,\u201d he told us. \u201cThis outcome was likely unintentional, but the public\u2019s reaction affects their view of the maker\u2019s brand. AI does have powerful implications like reducing cybersecurity workload and increasing human efficacy. In addition, the way vendors implement and deliver AI-based solutions is key to building trust in their brand. My recommendation is judge vendor by their actions rather than their words.\u201d<\/p>\n<p>Threatpost reached out to Google for comment, and will update this story with any statements.<\/p>\n<p> READ MORE <a href=\"https:\/\/threatpost.com\/google-tackles-ai-principles-is-it-enough\/132679\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>AI offers an immense capacity for good &#8212; and for unintended consequences. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":2543,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[3],"tags":[408,349,1142,1143,9,126,1144,5,860,1145,1146],"class_list":["post-2542","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threatpost","tag-ai","tag-artificial-intelligence","tag-eff","tag-electronic-frontier-foundation","tag-google","tag-government","tag-harmful-applications","tag-privacy","tag-robot","tag-seven-principles","tag-unintended-consequences"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Google Tackles AI Principles: Is It Enough? 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/google-tackles-ai-principles-is-it-enough\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google Tackles AI Principles: Is It Enough? 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/google-tackles-ai-principles-is-it-enough\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-08T17:33:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/google-tackles-ai-principles-is-it-enough.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"185\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/google-tackles-ai-principles-is-it-enough\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/google-tackles-ai-principles-is-it-enough\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Google Tackles AI Principles: Is It Enough?\",\"datePublished\":\"2018-06-08T17:33:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/google-tackles-ai-principles-is-it-enough\/\"},\"wordCount\":1503,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/google-tackles-ai-principles-is-it-enough\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/google-tackles-ai-principles-is-it-enough.jpg\",\"keywords\":[\"AI\",\"artificial intelligence\",\"EFF\",\"Electronic Frontier Foundation\",\"Google\",\"Government\",\"harmful applications\",\"Privacy\",\"robot\",\"seven principles\",\"unintended consequences\"],\"articleSection\":[\"Threatpost\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/google-tackles-ai-principles-is-it-enough\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/google-tackles-ai-principles-is-it-enough\/\",\"name\":\"Google Tackles AI Principles: Is It Enough? 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/google-tackles-ai-principles-is-it-enough\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/google-tackles-ai-principles-is-it-enough\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/google-tackles-ai-principles-is-it-enough.jpg\",\"datePublished\":\"2018-06-08T17:33:09+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/google-tackles-ai-principles-is-it-enough\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/google-tackles-ai-principles-is-it-enough\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/google-tackles-ai-principles-is-it-enough\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/google-tackles-ai-principles-is-it-enough.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/google-tackles-ai-principles-is-it-enough.jpg\",\"width\":185,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/google-tackles-ai-principles-is-it-enough\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/ai\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Google Tackles AI Principles: Is It Enough?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Google Tackles AI Principles: Is It Enough? 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/google-tackles-ai-principles-is-it-enough\/","og_locale":"en_US","og_type":"article","og_title":"Google Tackles AI Principles: Is It Enough? 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/google-tackles-ai-principles-is-it-enough\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-06-08T17:33:09+00:00","og_image":[{"width":185,"height":300,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/google-tackles-ai-principles-is-it-enough.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/google-tackles-ai-principles-is-it-enough\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/google-tackles-ai-principles-is-it-enough\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Google Tackles AI Principles: Is It Enough?","datePublished":"2018-06-08T17:33:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/google-tackles-ai-principles-is-it-enough\/"},"wordCount":1503,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/google-tackles-ai-principles-is-it-enough\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/google-tackles-ai-principles-is-it-enough.jpg","keywords":["AI","artificial intelligence","EFF","Electronic Frontier Foundation","Google","Government","harmful applications","Privacy","robot","seven principles","unintended consequences"],"articleSection":["Threatpost"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/google-tackles-ai-principles-is-it-enough\/","url":"https:\/\/www.threatshub.org\/blog\/google-tackles-ai-principles-is-it-enough\/","name":"Google Tackles AI Principles: Is It Enough? 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/google-tackles-ai-principles-is-it-enough\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/google-tackles-ai-principles-is-it-enough\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/google-tackles-ai-principles-is-it-enough.jpg","datePublished":"2018-06-08T17:33:09+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/google-tackles-ai-principles-is-it-enough\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/google-tackles-ai-principles-is-it-enough\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/google-tackles-ai-principles-is-it-enough\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/google-tackles-ai-principles-is-it-enough.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/google-tackles-ai-principles-is-it-enough.jpg","width":185,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/google-tackles-ai-principles-is-it-enough\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"AI","item":"https:\/\/www.threatshub.org\/blog\/tag\/ai\/"},{"@type":"ListItem","position":3,"name":"Google Tackles AI Principles: Is It Enough?"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/2542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=2542"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/2542\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/2543"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=2542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=2542"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=2542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}