On Purpose - Pre-Deployment
Vulnerabilities that can be exploited in AI systems, software development toolchains, and hardware, resulting in unauthorized access, data and privacy breaches, or system manipulation causing unsafe outputs or behavior.
"During the pre-deployment development stage, software may be subject to sabotage by someone with necessary access (a programmer, tester, even janitor) who for a number of possible reasons may alter software to make it unsafe. It is also a common occurrence for hackers (such as the organization Anonymous or government intelligence agencies) to get access to software projects in progress and to modify or steal their source code. Someone can also deliberately supply/train AI with wrong/unsafe datasets."(p. 144)
Other risks from Yampolskiy (2016) (7)
On Purpose - Post Deployment
4.3 Fraud, scams, and targeted manipulationBy Mistake - Pre-Deployment
7.1 AI pursuing its own goals in conflict with human goals or valuesBy Mistake - Post-Deployment
7.3 Lack of capability or robustnessEnvironment - Pre-Deployment
7.0 AI System Safety, Failures & LimitationsEnvironment - Post-Deployment
7.0 AI System Safety, Failures & LimitationsIndependently - Pre-Deployment
7.0 AI System Safety, Failures & Limitations