Not because he thinks the AI is sentient – although that may have ticked a few people off – but because he published confidential Google information.
Blake Lemoine: Google fires engineer who said AI tech has feelings – BBC News
Blake still chose to persistently violate clear employment and data security policies that include the need to safeguard product information,”
Statement from Google
There was no doubt in my my mind when I first read Blake’s claims that he was going to get fired, as he had released confidential information. Dismissal would have been my advice to my clients in these circumstances. I am not sure what legal recourse is hoping for, as it will be difficult to show that he had not abused the trust put in him by Google.
This is a classic case of the “Insider Threat” – a trusted member of your team, with access to the most confidential of information, abuses that trust and misuses that access.
It may not be simple theft of data. Just consider the case of a police officer accessing the police criminal database of personal reasons.
237 UK police force staff punished for misusing IT systems in last 2 years • The Register
Defending against the insider threat is exceedingly difficult. Here are a couple of bits of advice, but it is not a complete list:
- When someone in a trusted position gives in their notice disable their access as soon as possible. Organise a routine with your IT team for this to happen immediately 24/7 – it is a service we offer at Octagon.
- When a trusted person gives in their notice, check the logs to see what they have recently accessed.
- If you have a suspicion that a trusted team member is leaving or dissatisfied – talk to them about it. It seems odd advice but disgruntled employees – such as those who think that their claims of sentient AI’s are not being taken seriously – are likely to become cybersecurity risks.
- Use software that monitors and reports on user system activity – Microsoft 365 for Business has a comprehensive reporting module.
- Remote Monitoring and Management software, with the ability to report on the use of USB memory sticks or even disable the use of probably the most convenient way to steal your data, the USB memory stick, is an essential first step. If use this type of software you get the added functionality of patch management and data wiping.
Well there is a short list of some of the quickest steps to take against the insider threat – you should take some action to defend yourself.
Clive Catton MSc (Cyber Security) – by-line and other articles
Further Reading
We were talking about this, and helping clients with the issue 10 years ago.
Insider Threat – Octagon Technology
Other resources:
IT Monitoring – Octagon Technology
Watchmen – What can you report on? – Octagon Technology