Skip to content
Longterm Wiki

AI Cyber Damage: Bounding the Tail

ai-cyber-damage-bounding-tailanalysisPath: /knowledge-base/models/ai-cyber-damage-bounding-tail/
E2520Entity ID (EID)
← Back to page0 backlinksUpdated: 2026-05-05
Page Recorddatabase.json — merged from MDX frontmatter + Entity YAML + computed metrics at build time
{
  "id": "ai-cyber-damage-bounding-tail",
  "wikiId": "E2520",
  "path": "/knowledge-base/models/ai-cyber-damage-bounding-tail/",
  "filePath": "knowledge-base/models/ai-cyber-damage-bounding-tail.mdx",
  "title": "AI Cyber Damage: Bounding the Tail",
  "quality": null,
  "readerImportance": null,
  "researchImportance": null,
  "tacticalValue": null,
  "contentFormat": "article",
  "causalLevel": null,
  "lastUpdated": "2026-05-05",
  "dateCreated": "2026-05-04",
  "summary": null,
  "description": "Probability-weighted synthesis answer to \"How likely is AI-enabled cyber damage to exceed 10% of global GDP by year Y?\" — pulls from damage estimates, insurance market signals, tail-risk catalog, actor incentives, and incident base rates.",
  "ratings": null,
  "category": "models",
  "subcategory": "analysis-models",
  "clusters": [
    "cyber",
    "ai-safety"
  ],
  "metrics": {
    "wordCount": 5975,
    "tableCount": 12,
    "diagramCount": 0,
    "internalLinks": 60,
    "externalLinks": 34,
    "footnoteCount": 24,
    "bulletRatio": 0.13,
    "sectionCount": 18,
    "hasOverview": false,
    "structuralScore": 11
  },
  "suggestedQuality": 73,
  "updateFrequency": null,
  "evergreen": true,
  "wordCount": 5975,
  "unconvertedLinks": [
    {
      "text": "\"Cybersecurity Almanac 2025\"",
      "url": "https://cybersecurityventures.com/cybersecurity-almanac-2025/",
      "resourceId": "80257f9133e98385",
      "resourceTitle": "Cybersecurity Ventures projects"
    },
    {
      "text": "\"Cybercrime To Cost The World \\$12.2 Trillion Annually By 2031\"",
      "url": "https://cybersecurityventures.com/official-cybercrime-report-2025/",
      "resourceId": "74c5d3685f69baea",
      "resourceTitle": "Cybercrime To Cost The World $12.2 Trillion Annually By 2031"
    },
    {
      "text": "\"Measuring the Cost of Cybercrime\"",
      "url": "https://cseweb.ucsd.edu/~savage/papers/WEIS2012.pdf",
      "resourceId": "26d7fd4e9cdacd01"
    },
    {
      "text": "\"Measuring the Changing Cost of Cybercrime\"",
      "url": "https://weis2019.econinfosec.org/wp-content/uploads/sites/6/2019/05/WEIS_2019_paper_25.pdf",
      "resourceId": "8e8f6ccd300955d5",
      "resourceTitle": "(PDF)"
    },
    {
      "text": "\"Examining the Costs and Causes of Cyber Incidents\"",
      "url": "https://academic.oup.com/cybersecurity/article/2/2/121/2525524",
      "resourceId": "4d92485f5e3f9076",
      "resourceTitle": "Examining the Costs and Causes of Cyber Incidents"
    },
    {
      "text": "\"The Untold Story of NotPetya, the Most Devastating Cyberattack in History\"",
      "url": "https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/",
      "resourceId": "e440b4ac304165e0",
      "resourceTitle": "The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED"
    },
    {
      "text": "\"Lloyd's systemic risk scenario reveals global economy exposed to \\$3.5trn from major cyber attack\"",
      "url": "https://www.lloyds.com/insights/media-centre/press-releases/lloyds-systemic-risk-scenario-reveals-global-economy-exposed-to-3.5trn-from-major-cyber-attack",
      "resourceId": "4448515b451cdfa2",
      "resourceTitle": "Lloyd's Systemic Risk Scenario: Global Economy Exposed to $3.5trn from Major Cyber Attack"
    },
    {
      "text": "\"Impact of AI on cyber threat from now to 2027\"",
      "url": "https://www.ncsc.gov.uk/report/impact-ai-cyber-threat-now-2027",
      "resourceId": "f6942e01c3eb0174",
      "resourceTitle": "Impact of AI on Cyber Threat from Now to 2027 – NCSC Assessment"
    },
    {
      "text": "\"People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection\"",
      "url": "https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-038a",
      "resourceId": "b4170ac67eaac201",
      "resourceTitle": "PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure | CISA"
    },
    {
      "text": "\"Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security\"",
      "url": "https://www.defense.gov/News/Speeches/Speech/Article/606635/",
      "resourceId": "092f835a0bcd5180",
      "resourceTitle": "U.S. Department of Defense Speech (Article 606635)"
    },
    {
      "text": "\"Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations\"",
      "url": "https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-352a",
      "resourceId": "44641f4cd251731b",
      "resourceTitle": "CISA Advisory AA20-352A: Advanced Persistent Threat Compromise of Government Agencies via SolarWinds Supply Chain"
    },
    {
      "text": "SEC Form 10-K for fiscal 2020",
      "url": "https://www.sec.gov/Archives/edgar/data/1739942/000162828021003796/swi-20201231.htm",
      "resourceId": "d9756fdab6d6822b"
    },
    {
      "text": "2024 Form 10-K",
      "url": "https://www.unitedhealthgroup.com/content/dam/UHG/PDF/investors/2024/UNH-Q4-2024-Form-10-K.pdf",
      "resourceId": "df88cde4ef339524"
    },
    {
      "text": "\"HHS Statement Regarding the Cyberattack on Change Healthcare\"",
      "url": "https://www.hhs.gov/about/news/2024/03/05/hhs-statement-regarding-cyberattack-change-healthcare.html",
      "resourceId": "0c873606820b1554"
    },
    {
      "text": "\"Helping our customers through the CrowdStrike outage\"",
      "url": "https://blogs.microsoft.com/blog/2024/07/20/helping-our-customers-through-the-crowdstrike-outage/",
      "resourceId": "da77a02884b55432",
      "resourceTitle": "Helping our customers through the CrowdStrike outage - The Official Microsoft Blog"
    },
    {
      "text": "\"CrowdStrike to Cost Fortune 500 \\$5.4B\"",
      "url": "https://www.parametrixinsurance.com/in-the-news/crowdstrike-to-cost-fortune-500-5-4-billion-insured-loss-range-of-540-million-to-1-08-billion",
      "resourceId": "94a87516e9dc9ba3",
      "resourceTitle": "CrowdStrike to Cost Fortune 500 $5.4b; Insured Loss Range of $0.54b - $1.08b"
    },
    {
      "text": "\"Falcon Content Update Preliminary Post Incident Report\"",
      "url": "https://www.crowdstrike.com/falcon-content-update-remediation-and-guidance-hub/",
      "resourceId": "ae544c4fec19cff7",
      "resourceTitle": "Falcon Content Update Remediation and Guidance Hub | CrowdStrike"
    },
    {
      "text": "\"Rebooting Growth\"",
      "url": "https://www.howdengroup.com/us-en/rebooting-growth-howdens-2025-cyber-insurance-report",
      "resourceId": "d12cb04f0eb7308c",
      "resourceTitle": "www.howdengroup.com"
    },
    {
      "text": "\"Global Cyber Insurance Market Reaches \\$16.6 Billion in 2024\"",
      "url": "https://riskandinsurance.com/global-cyber-insurance-market-reaches-16-6-billion-in-2024/",
      "resourceId": "e723d5ae3788c5df",
      "resourceTitle": "Global Cyber Insurance Market Reaches $16.6 Billion in 2024 - Risk & Insurance : Risk & Insurance"
    },
    {
      "text": "\"Dealing with Cyber Accumulation Risk\"",
      "url": "https://www.munichre.com/en/insights/cyber/dealing-with-cyber-accumulation-risk.html",
      "resourceId": "e43fea648dfc578d",
      "resourceTitle": "Dealing with cyber accumulation risk | Munich Re"
    },
    {
      "text": "\"Cyber Risk Adjusted Rating (RAR) Index: 2026 update\"",
      "url": "https://www.ajg.com/gallagherre/news-and-insights/gallagherre-cyber-risk-adjusted-rating-rar-index-2026-update/",
      "resourceId": "a46e8aa4ff8ba7ce",
      "resourceTitle": "Gallagher Re Cyber Risk Adjusted Rating (RAR) Index: 2026 update | GallagherRe"
    },
    {
      "text": "\"Cyber Insurance: Risks and Trends 2025\"",
      "url": "https://www.munichre.com/en/insights/cyber/cyber-insurance-risks-and-trends-2025.html",
      "resourceId": "bda1f1d4700946d3",
      "resourceTitle": "Cyber Insurance: Risks and Trends 2025 – Munich Re"
    },
    {
      "text": "\"Beazley secures \\$300m cyber cat bond in Bermuda vehicle\"",
      "url": "https://www.royalgazette.com/reinsurance/business/article/20251217/beazley-secures-300m-cyber-cat-bond-in-bermuda-vehicle/",
      "resourceId": "f68fb2d4edd22ee1",
      "resourceTitle": "Beazley secures $300m cyber cat bond in Bermuda vehicle - The Royal Gazette | Bermuda News, Business, Sports, Events, & Community |"
    },
    {
      "text": "\"Catastrophe bond market records that were broken in 2025\"",
      "url": "https://www.artemis.bm/news/catastrophe-bond-market-records-that-were-broken-in-2025/",
      "resourceId": "0839466e138e4f18",
      "resourceTitle": "Catastrophe bond market records that were broken in 2025 - Artemis.bm"
    },
    {
      "text": "\"The Impact of AI on the Cyber Offense-Defense Balance and the Character of Cyber Conflict\"",
      "url": "https://arxiv.org/abs/2504.13371",
      "resourceId": "c947e471941dded3",
      "resourceTitle": "[2504.13371] The Impact of AI on the Cyber Offense-Defense Balance and the Character of Cyber Conflict"
    },
    {
      "text": "\"Anticipating AI's Impact on the Cyber Offense-Defense Balance\"",
      "url": "https://cset.georgetown.edu/publication/anticipating-ais-impact-on-the-cyber-offense-defense-balance/",
      "resourceId": "ced517a1cfe84c8b",
      "resourceTitle": "Anticipating AI's Impact"
    },
    {
      "text": "\"Tipping the Scales: Emerging AI Capabilities and the Cyber Offense-Defense Balance\"",
      "url": "https://www.cnas.org/press/press-release/new-cnas-report-examines-how-emerging-ai-capabilities-could-disrupt-the-cyber-offense-defense-balance",
      "resourceId": "187d75d58e1185d3",
      "resourceTitle": "Tipping the Scales: How Emerging AI Capabilities Could Disrupt the Cyber Offense-Defense Balance"
    },
    {
      "text": "\"Uplifted Attackers, Human Defenders: The Cyber Offense-Defense Balance for Trailing-Edge Organizations\"",
      "url": "https://arxiv.org/html/2508.15808",
      "resourceId": "6ea4eaed7244fb9a",
      "resourceTitle": "Uplifted Attackers, Human Defenders: The Cyber Offense-Defense Balance for Trailing-Edge Organizations"
    },
    {
      "text": "\"Strengthening cyber resilience as AI capabilities advance\"",
      "url": "https://openai.com/index/strengthening-cyber-resilience/",
      "resourceId": "e550a2466989b110",
      "resourceTitle": "Strengthening Cyber Resilience as AI Capabilities Advance"
    },
    {
      "text": "\"Disrupting the first reported AI-orchestrated cyber espionage campaign\"",
      "url": "https://www.anthropic.com/news/disrupting-AI-espionage",
      "resourceId": "4ba107b71a0707f9",
      "resourceTitle": "first documented AI-orchestrated cyberattack"
    },
    {
      "text": "\"GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools\"",
      "url": "https://cloud.google.com/blog/topics/threat-intelligence/threat-actor-usage-of-ai-tools",
      "resourceId": "f5c89038a1d5f7ce",
      "resourceTitle": "GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools"
    },
    {
      "text": "\"LLM Agents can Autonomously Hack Websites\"",
      "url": "https://arxiv.org/abs/2402.06664",
      "resourceId": "1ff0ee673e2c63c1",
      "resourceTitle": "[2402.06664] LLM Agents can Autonomously Hack Websites"
    },
    {
      "text": "\"LLM Agents can Autonomously Exploit One-day Vulnerabilities\"",
      "url": "https://arxiv.org/abs/2404.08144",
      "resourceId": "6c39d224a4a74a56",
      "resourceTitle": "[2404.08144] LLM Agents can Autonomously Exploit One-day Vulnerabilities"
    },
    {
      "text": "\"Teams of LLM Agents can Exploit Zero-Day Vulnerabilities\"",
      "url": "https://arxiv.org/abs/2406.01637",
      "resourceId": "9daf5081c60538c2",
      "resourceTitle": "[2406.01637] Teams of LLM Agents can Exploit Zero-Day Vulnerabilities"
    }
  ],
  "unconvertedLinkCount": 34,
  "convertedLinkCount": 46,
  "backlinkCount": 0,
  "hallucinationRisk": {
    "level": "low",
    "score": 30,
    "factors": [
      "moderately-cited"
    ]
  },
  "entityType": "analysis",
  "redundancy": {
    "maxSimilarity": 18,
    "similarPages": [
      {
        "id": "catastrophic-cyber-tail-risk",
        "title": "Catastrophic Cyber Tail Risk",
        "path": "/knowledge-base/risks/catastrophic-cyber-tail-risk/",
        "similarity": 18
      },
      {
        "id": "cyberweapons",
        "title": "Cyberweapons",
        "path": "/knowledge-base/risks/cyberweapons/",
        "similarity": 17
      },
      {
        "id": "ai-cyber-damage-estimates",
        "title": "AI Cyber Damage Estimates",
        "path": "/knowledge-base/models/ai-cyber-damage-estimates/",
        "similarity": 15
      },
      {
        "id": "fraud-sophistication-curve",
        "title": "Fraud Sophistication Curve Model",
        "path": "/knowledge-base/models/fraud-sophistication-curve/",
        "similarity": 15
      },
      {
        "id": "cyber-offense",
        "title": "Cyber Offense",
        "path": "/knowledge-base/risks/cyber-offense/",
        "similarity": 15
      }
    ]
  },
  "coverage": {
    "passing": 5,
    "total": 13,
    "targets": {
      "tables": 24,
      "diagrams": 2,
      "internalLinks": 48,
      "externalLinks": 30,
      "footnotes": 18,
      "references": 18
    },
    "actuals": {
      "tables": 12,
      "diagrams": 0,
      "internalLinks": 60,
      "externalLinks": 34,
      "footnotes": 24,
      "references": 38,
      "quotesWithQuotes": 0,
      "quotesTotal": 0,
      "accuracyChecked": 0,
      "accuracyTotal": 0
    },
    "items": {
      "summary": "red",
      "schedule": "red",
      "entity": "green",
      "editHistory": "red",
      "overview": "red",
      "tables": "amber",
      "diagrams": "red",
      "internalLinks": "green",
      "externalLinks": "green",
      "footnotes": "green",
      "references": "green",
      "quotes": "red",
      "accuracy": "red"
    }
  },
  "recommendedScore": 19.87
}
External Links

No external links

Backlinks (0)

No backlinks

Longterm Wiki