{"version":"1.1.0","chapters":[{"startTime":13.0,"title":"Abstract"},{"startTime":151.0,"title":"1 Introduction"},{"startTime":390.0,"title":"1.1 Preliminaries"},{"startTime":640.0,"title":"1.2 Backdrop"},{"startTime":670.0,"title":"1.2.1 Intelligence"},{"startTime":794.0,"title":"1.2.2 Agency"},{"startTime":878.0,"title":"1.2.3 Playing with fire"},{"startTime":1024.0,"title":"1.2.4 Power"},{"startTime":1249.0,"title":"2 Timelines"},{"startTime":1273.0,"title":"2.1 Three key properties"},{"startTime":1292.0,"title":"2.1.1 Advanced capabilities"},{"startTime":1408.0,"title":"2.1.2 Agentic planning"},{"startTime":1822.0,"title":"2.1.3 Strategic awareness"},{"startTime":1916.0,"title":"2.2 Likelihood by 2070"},{"startTime":2062.0,"title":"3 Incentives"},{"startTime":2329.0,"title":"3.1 Usefulness"},{"startTime":2771.0,"title":"3.2 Available techniques"},{"startTime":2848.0,"title":"3.3 Byproducts of sophistication"},{"startTime":2979.0,"title":"4 Alignment"},{"startTime":3005.0,"title":"4.1 Definitions and clarifications"},{"startTime":3452.0,"title":"4.2 Power-seeking"},{"startTime":4395.0,"title":"4.3 The challenge of practical PS-alignment"},{"startTime":4472.0,"title":"4.3.1 Controlling objectives"},{"startTime":4601.0,"title":"4.3.1.1 Problems with proxies"},{"startTime":4894.0,"title":"4.3.1.2 Problems with search"},{"startTime":5228.0,"title":"4.3.1.3 Myopia"},{"startTime":5417.0,"title":"4.3.2 Controlling capabilities"},{"startTime":5475.0,"title":"4.3.2.1 Specialization"},{"startTime":5761.0,"title":"4.3.2.2 Preventing problematic improvements"},{"startTime":5863.0,"title":"4.3.2.3 Scaling"},{"startTime":5951.0,"title":"4.3.3 Controlling circumstances"},{"startTime":6161.0,"title":"4.4 Unusual difficulties"},{"startTime":6250.0,"title":"4.4.1 Barriers to understanding"},{"startTime":6458.0,"title":"4.4.2 Adversarial dynamics"},{"startTime":6580.0,"title":"4.4.3 Stakes of error"},{"startTime":6820.0,"title":"5 Deployment"},{"startTime":7028.0,"title":"5.1 Timing of problems"},{"startTime":7266.0,"title":"5.2 Decisions"},{"startTime":7519.0,"title":"Image: assessment of expected value of deployment"},{"startTime":7653.0,"title":"5.3 Key risk factors"},{"startTime":7682.0,"title":"5.3.1 Externalities and competition"},{"startTime":7947.0,"title":"5.3.2 Number of relevant actors"},{"startTime":8125.0,"title":"5.3.3 Bottlenecks on usefulness"},{"startTime":8440.0,"title":"5.3.4 Deception"},{"startTime":8628.0,"title":"5.4 Overall risk of problematic deployment"},{"startTime":8738.0,"title":"6 Correction"},{"startTime":8792.0,"title":"6.1 Take-off"},{"startTime":8950.0,"title":"6.2 Warning shots"},{"startTime":9277.0,"title":"6.3 Competition for power"},{"startTime":10101.0,"title":"6.4 Corrective feedback loops"},{"startTime":10490.0,"title":"6.5 Sharing power"},{"startTime":10573.0,"title":"7 Catastrophe"},{"startTime":10711.0,"title":"Marker 53"},{"startTime":10881.0,"title":"8 Probabilities"},{"startTime":11996.0,"title":"Acknowledgments"}]}