The Malicious Use of AI Report
webOriginally published in 2018 by a coalition including Future of Humanity Institute, OpenAI, and Center for a New American Security; considered a foundational document on AI misuse risks and dual-use concerns.
Metadata
Importance: 72/100organizational reportanalysis
Summary
A report examining how AI technologies can be exploited by malicious actors across cybersecurity, physical security, and political domains. It analyzes near-term threats from AI misuse and offers recommendations for researchers, policymakers, and industry to mitigate these risks.
Key Points
- •Identifies three major threat domains: digital security (cyberattacks), physical security (autonomous weapons, drones), and political security (disinformation, surveillance).
- •Argues that AI lowers the cost and expertise required for malicious actors to conduct sophisticated attacks at scale.
- •Recommends dual-use research norms, responsible disclosure practices, and proactive engagement between AI researchers and security communities.
- •Highlights that AI can automate and scale social engineering, spear-phishing, and fake media generation for influence operations.
- •Calls for policymakers to anticipate and prepare for AI-enabled threats rather than react after harms occur.
Cited by 1 page
| Page | Type | Quality |
|---|---|---|
| CSER (Centre for the Study of Existential Risk) | Organization | 58.0 |
Cached Content Preview
HTTP 200Fetched Apr 9, 20261 KB
Malicious AI Report | Cybersecurity Threats & AI Risk Analysis The Malicious Use of Artificial Intelligence Forecasting, Prevention, and Mitigation Read the Report Read HTML Version Download the Full Report (pdf) Download About the Report Authors The report was written by 26 authors from 14 institutions, spanning academia, civil society, and industry. Process The report builds on a 2 day workshop held in Oxford, UK, in February 2017. More information can be found in Appendix A of the report. Feedback We welcome questions and comments about the report. Please see the author page for email addresses of the corresponding authors.
Resource ID:
5fde590180ca07a6 | Stable ID: sid_mQ7qNzDygN