Back to the MIT repository
4. Malicious Actors & Misuse2 - Post-deployment

Malicious use of AI

Just as AI can be used in many different fields, it is unfortunately also helpful in perpetrating digital crimes. AI-supported malware and hacking are already a reality.

Source: MIT AI Risk Repositorymit95

ENTITY

1 - Human

INTENT

1 - Intentional

TIMING

2 - Post-deployment

Risk ID

mit95

Domain lineage

4. Malicious Actors & Misuse

223 mapped risks

4.0 > Malicious use

Mitigation strategy

1. Implement strict technical and operational access controls, such as limiting dangerous AI model interactions to controlled cloud services with rigorous know-your-customer (KYC) screening, to mitigate unauthorized repurposing. 2. Establish and enforce a strict legal liability regime for developers of general-purpose AI systems, ensuring accountability for potential misuse and failures to encourage demonstrably safer development practices. 3. Mandate the integration of dual-use considerations into AI research and development norms, promoting a safety-oriented organizational culture and proactive technical defenses, including adversarial robustness and anomaly detection, against emerging AI-enabled threats.