April 06, 2018
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation
Artificial intelligence and machine learning capabilities are growing
at an unprecedented rate. These technologies have many widely
beneficial applications, ranging from machine translation to medical
image analysis. Countless more such applications are being
developed and can be expected over the long term. Less attention
has historically been paid to the ways in which artificial intelligence
can be used maliciously. This report surveys the landscape of
potential security threats from malicious uses of artificial intelligence
technologies, and proposes ways to better forecast, prevent, and
mitigate these threats. We analyze, but do not conclusively resolve,
the question of what the long-term equilibrium between attackers and
defenders will be. We focus instead on what sorts of attacks we are
likely to see soon if adequate defenses are not developed.
Read the full article at MaliciousAIReport
More from CNAS
-
Technology & National Security
CNAS Insights | Bridging Washington and Silicon ValleyThe recent friction between Anthropic and the Pentagon has made me reflect on the painful chasm that opened between Washington and Silicon Valley following leaks from Edward S...
By Anne Neuberger
-
Technology & National Security
The Geopolitics of 6G with Vivek Chilukuri, Michael Calabrese, and Lindsay GormanVivek Chilukuri, senior fellow and program director at the Center for a New American Security, joined POLITICO Policy Outlook to discuss the geopolitical implications of 6G, t...
By Vivek Chilukuri
-
Technology & National Security
Two Illegal Biolabs Reveal Gaps in U.S. BiosecurityThis article was originally published in Lawfare.Last month, law enforcement officials launched an investigation into a suspected biolab in the Las Vegas home of Chinese natio...
By Sam Howell
-
Technology & National Security
CNAS Insights | America’s AI Cyber Defense Gap Needs Congress to ActTwice in the past five months, the U.S. Congress has allowed the authorization for U.S. cyber threat intelligence sharing to lapse. In each case, it managed only short-term ex...
By Spencer Michaels, Janet Egan & Michael Daniel