{"id":88624,"date":"2024-10-02T17:50:44","date_gmt":"2024-10-02T15:50:44","guid":{"rendered":"https:\/\/intercoaching.fr\/?p=88624"},"modified":"2024-10-02T19:31:11","modified_gmt":"2024-10-02T17:31:11","slug":"how-ais-were-used-to-generate-images-from-child-pornography","status":"publish","type":"post","link":"https:\/\/intercoaching.fr\/en\/how-ais-were-used-to-generate-images-from-child-pornography\/","title":{"rendered":"How AIs were used to generate images from child pornography"},"content":{"rendered":"<h2 class=\"wp-block-heading\">Artificial intelligence at the heart of a child pornography controversy<\/h2>\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"fr\" dir=\"ltr\">IA et Art\u00a0: processus de cr\u00e9ation des \u0153uvres IA pr\u00e9sent\u00e9 par <a href=\"https:\/\/twitter.com\/obv_ious?ref_src=twsrc%5Etfw\">@obv_ious<\/a> <a href=\"https:\/\/t.co\/p3wqJpf9zs\">pic.twitter.com\/p3wqJpf9zs<\/a><\/p>\u2014 CNIL (@CNIL) <a href=\"https:\/\/twitter.com\/CNIL\/status\/1729525007959970195?ref_src=twsrc%5Etfw\">November 28, 2023<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n<h3 class=\"wp-block-heading\">The Unexpected Use of AI Databases<\/h3>\n\n\n<p>When tech enthusiasts employ AI systems to generate visuals, they are often unaware that these tools can draw from collections of objectionable images. According to research conducted by the Stanford Internet Observatory and relayed by 404 Media, this alarming situation is linked to LAION-5B, a vast database used for training multiple algorithms, including the notable Stable Diffusion. This immense library of approximately six billion items unfortunately includes thousands of illicit files, with no less than 3,226 images classified as child pornography.<\/p>\n\n\n<h3 class=\"wp-block-heading\">The controversial origin of the data<\/h3>\n\n\n<p>The nonprofit LAION was originally created with the goal of providing publicly available machine learning tools. LAION-5B is among its main contributions. The database lists various image links from the Internet, including social platforms where child pornography can unfortunately hide. Marcus Rogers of Purdue University raises a harsh criticism in this regard: companies either lack the will to become aware of illicit content, or they have frankly lost control over the content distributed.<\/p>\n\n\n<h3 class=\"wp-block-heading\">Ineffective filtration attempts<\/h3>\n\n\n<p>As early as 2021, LAION managers expressed doubts about the legal compliance of certain elements of their database. Despite attempts at cleanup, questionable images remained and LAION-5B was made available to the public. Reports from affected users were only seriously considered after several months, ultimately leading to the temporary suspension of LAION-5B and another base, LAION-44M, while these tools were rendered harmless.<\/p>\n\n\n<h3 class=\"wp-block-heading\">Implications for users<\/h3>\n\n\n<p>The implications are serious for anyone who downloads all of these databases without taking extreme measures: they potentially find themselves in possession of illegal content. David Thiel of Stanford points out that the filters developed by LAION to eliminate these images only appeared recently.<\/p>\n\n\n<h3 class=\"wp-block-heading\">Summary Table<\/h3>\n\n\n<figure class=\"wp-block-table\">\n<table>\n<tbody>\n<tr>\n<td>Database<\/td>\n<td>Number of images<\/td>\n<td>Illicit content<\/td>\n<td>Action by LAION<\/td>\n<\/tr>\n<tr>\n<td>LAION-5B<\/td>\n<td>~6 billion<\/td>\n<td>Yes, includes child pornography images<\/td>\n<td>Filtering and temporary suspension<\/td>\n<\/tr>\n<tr>\n<td>LAION-44M<\/td>\n<td>Not specified<\/td>\n<td>Potentially (preventive suspension)<\/td>\n<td>Temporary suspension<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n\n\n<p>In conclusion, this case raises crucial ethical and legal questions about the management of data by organizations that promote open source, as well as the responsibilities of users of these databases. It highlights the need to protect the integrity and security of generative AI systems.<\/p>\n\n\n\n<div class=\"kk-star-ratings kksr-auto kksr-align-right kksr-valign-bottom\"\n    data-payload='{&quot;align&quot;:&quot;right&quot;,&quot;id&quot;:&quot;88624&quot;,&quot;slug&quot;:&quot;default&quot;,&quot;valign&quot;:&quot;bottom&quot;,&quot;ignore&quot;:&quot;&quot;,&quot;reference&quot;:&quot;auto&quot;,&quot;class&quot;:&quot;&quot;,&quot;count&quot;:&quot;0&quot;,&quot;legendonly&quot;:&quot;&quot;,&quot;readonly&quot;:&quot;&quot;,&quot;score&quot;:&quot;0&quot;,&quot;starsonly&quot;:&quot;&quot;,&quot;best&quot;:&quot;5&quot;,&quot;gap&quot;:&quot;5&quot;,&quot;greet&quot;:&quot;Notez cet article&quot;,&quot;legend&quot;:&quot;0\\\/5 - (0 votes)&quot;,&quot;size&quot;:&quot;24&quot;,&quot;title&quot;:&quot;How AIs were used to generate images from child pornography&quot;,&quot;width&quot;:&quot;0&quot;,&quot;_legend&quot;:&quot;{score}\\\/{best} - ({count} {votes})&quot;,&quot;font_factor&quot;:&quot;1.25&quot;}'>\n            \n<div class=\"kksr-stars\">\n    \n<div class=\"kksr-stars-inactive\">\n            <div class=\"kksr-star\" data-star=\"1\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"2\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"3\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"4\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"5\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n        <\/div>\n    <\/div>\n    \n<div class=\"kksr-stars-active\" style=\"width: 0px;\">\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 24px; height: 24px;\"><\/div>\n        <\/div>\n    <\/div>\n<\/div>\n                \n\n<div class=\"kksr-legend\" style=\"font-size: 19.2px;\">\n            <span class=\"kksr-muted\">Rate this article<\/span>\n    <\/div>\n    <\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":84555,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","_seopress_analysis_target_kw":"","_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_glsr_average":0,"_glsr_ranking":0,"_glsr_reviews":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[2249],"tags":[2311,2482,4128,4131,3014],"class_list":["post-88624","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai-news-en","tag-artificial-intelligence-en","tag-ia-en","tag-pictures-en","tag-tag-en","tag-wordpress-en","infinite-scroll-item","masonry-post","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-33"],"acf":[],"jetpack_featured_media_url":"https:\/\/intercoaching.fr\/wp-content\/uploads\/2024\/01\/Comment-des-IA-ont-ete-utilisees-pour-generer-des-images-a-partir-de-contenus-pedopornographiques.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/intercoaching.fr\/en\/wp-json\/wp\/v2\/posts\/88624","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/intercoaching.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/intercoaching.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/intercoaching.fr\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/intercoaching.fr\/en\/wp-json\/wp\/v2\/comments?post=88624"}],"version-history":[{"count":1,"href":"https:\/\/intercoaching.fr\/en\/wp-json\/wp\/v2\/posts\/88624\/revisions"}],"predecessor-version":[{"id":88625,"href":"https:\/\/intercoaching.fr\/en\/wp-json\/wp\/v2\/posts\/88624\/revisions\/88625"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/intercoaching.fr\/en\/wp-json\/wp\/v2\/media\/84555"}],"wp:attachment":[{"href":"https:\/\/intercoaching.fr\/en\/wp-json\/wp\/v2\/media?parent=88624"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/intercoaching.fr\/en\/wp-json\/wp\/v2\/categories?post=88624"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/intercoaching.fr\/en\/wp-json\/wp\/v2\/tags?post=88624"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}