Back to the MIT repository
4. Malicious Actors & Misuse2 - Post-deployment

Violence/armed conflict

Violence/armed conflict - Use or misuse of a technology system to incite, facilitate or conduct cyberattacks, security breaches, lethal, biological and chemical weapons development, resulting in violence and armed conflict.

Source: MIT AI Risk Repositorymit977

ENTITY

1 - Human

INTENT

1 - Intentional

TIMING

2 - Post-deployment

Risk ID

mit977

Domain lineage

4. Malicious Actors & Misuse

223 mapped risks

4.2 > Cyberattacks, weapon development or use, and mass harm

Mitigation strategy

1. Implement rigorous governance and assurance frameworks for all technology systems involved in high-consequence domains such as defense, biosecurity, and critical infrastructure. This must include mandatory human-in-the-loop protocols to mitigate automation bias and decision-time compression, continuous re-assessment of system behavior and data integrity (change management), and strict adherence to international law and ethical guidelines concerning the use of force and non-proliferation. 2. Establish and enforce stringent, layered network access controls, prioritizing Privileged Access Management (PAM) solutions and mandatory Multi-Factor Authentication (MFA) across all high-value assets and administrative accounts. Furthermore, utilize modern operating systems to enforce signed software execution policies and application whitelisting to prevent unauthorized code injection, system tampering, and the establishment of malicious persistence. 3. Develop and continuously exercise a comprehensive incident response and system recovery plan specifically designed for complex cyber-physical or technology-facilitated attacks. This plan must integrate continuous monitoring and real-time threat detection capabilities across the IT ecosystem, provide for immediate containment and eradication of malicious presence, and ensure the capacity for secure, offline reconstitution of critical data and systems from encrypted backups.