{"id":4701,"date":"2020-03-16T10:14:45","date_gmt":"2020-03-16T10:14:45","guid":{"rendered":"https:\/\/sites.mitre.org\/aifails\/?page_id=4701"},"modified":"2020-07-13T08:38:40","modified_gmt":"2020-07-13T12:38:40","slug":"you-call-this-artificial-intelligence","status":"publish","type":"page","link":"https:\/\/sites.mitre.org\/aifails\/you-call-this-artificial-intelligence\/","title":{"rendered":"You Call This Artificial \u201cIntelligence\u201d? AI Meets the Real World"},"content":{"rendered":"\n<p>[et_pb_section fb_built=&#8221;1&#8243; specialty=&#8221;on&#8221; _builder_version=&#8221;4.0.5&#8243;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_sidebar area=&#8221;et_pb_widget_area_41&#8243; admin_label=&#8221;You Call This AI&#8221; _builder_version=&#8221;4.4.1&#8243; min_height=&#8221;200px&#8221; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;||0px||false|false&#8221;][\/et_pb_sidebar][\/et_pb_column][et_pb_column type=&#8221;3_4&#8243; specialty_columns=&#8221;3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_row_inner _builder_version=&#8221;4.0.3&#8243; custom_padding=&#8221;||0px||false|false&#8221;][et_pb_column_inner saved_specialty_column_type=&#8221;3_4&#8243; _builder_version=&#8221;4.0.3&#8243;][et_pb_text admin_label=&#8221;You Call This Artificial \u201cIntelligence\u201d? &#8221; _builder_version=&#8221;4.4.8&#8243; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221;]<\/p>\n<h1><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-6433 size-full alignleft\" src=\"https:\/\/sites.mitre.org\/aifails\/wp-content\/uploads\/sites\/15\/2020\/04\/icon_intelligence.png\" alt=\"\" width=\"135\" height=\"121\" \/>You Call This Artificial \u201cIntelligence\u201d? AI Meets the Real World<\/h1>\n<p>\u200bAI systems can perform specific, defined tasks so well that their capability can appear superhuman. For instance, AI can recognize common images and objects better than human beings, AI can sift through large amounts of data faster than human beings, and AI can master more languages than human beings.<a class=\"reference\" href=\".\/references\/#f.1\" target=\"_blank\" rel=\"noopener noreferrer\">1<\/a> However, it is important to remember that an AI\u2019s success is task specific and AI\u2019s ability to complete a task \u2013 such as recognizing images \u2013 is contingent on the data it receives and the environment it operates in. Because of this, sometimes AI applications are fooled in ways that humans never would be, particularly if these systems encounter situations beyond their abilities. The examples below describe situations where environmental factors exceeded AI\u2019s \u201csuperhuman\u201d capabilities and invalidated any contingency planning that developers or deployers introduced.<\/p>\n<p>&nbsp;[\/et_pb_text][et_pb_text admin_label=&#8221;Fails&#8221; _builder_version=&#8221;4.4.8&#8243; custom_margin=&#8221;||0px||false|false&#8221; custom_padding=&#8221;5px||0px||false|false&#8221;]<\/p>\n<div id=\"callAI\">\n\u00a0\n<\/div>\n<h5>Explore the Three Fails in This Category:<\/h5>\n<p>[\/et_pb_text][et_pb_tabs active_tab_background_color=&#8221;#a0ddf3&#8243; inactive_tab_background_color=&#8221;#e5e7e8&#8243; active_tab_text_color=&#8221;#000000&#8243; admin_label=&#8221;Fail Why and Examples&#8221; module_class=&#8221;icon-tabs&#8221; _builder_version=&#8221;4.4.8&#8243; tab_text_color=&#8221;#000000&#8243; body_text_color=&#8221;#000000&#8243; tab_font_size=&#8221;15px&#8221; tab_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;|||0px|false|false&#8221; custom_padding=&#8221;|||0px|false|false&#8221;][et_pb_tab title=&#8221;Sensing is Believing&#8221; _builder_version=&#8221;4.4.8&#8243; tab_line_height=&#8221;1em&#8221;]<\/p>\n<div style=\"padding: 0px 0px 15px 0px;margin: 0px 0px 0px 0px\">\n<h3>Sensing is Believing<\/h3>\n<p>When sensors are faulty, or the code that interprets the data is faulty, the result can be extremely damaging.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<div class=\"example-callout\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4030 size-full alignleft\" src=\"https:\/\/sites.mitre.org\/aifails\/wp-content\/uploads\/sites\/15\/2020\/03\/icon_example_robot-002.png\" alt=\"\" width=\"100\" height=\"83\" \/><\/p>\n<h3>Examples<\/h3>\n<p>When the battery died on early versions of \u201csmart\u201d thermostats, houses got really, really cold.<a class=\"reference\" href=\".\/references\/#4.2\" target=\"_blank\" rel=\"noopener noreferrer\">2<\/a> Later versions had appropriate protections built into the code to ensure this wouldn\u2019t happen.<\/p>\n<p>A preliminary analysis of the Boeing 737 MAX airline crashes found that a faulty sensor \u201cerroneously reported that the airplane was stalling\u2026 which triggered an automated system\u2026 to point the aircraft\u2019s nose down,\u201d when the aircraft was not actually stalling.<a class=\"reference\" href=\".\/references\/#4.3\" target=\"_blank\" rel=\"noopener noreferrer\">3<\/a> Boeing subsequently included the safety features that would have alerted pilots to the disagreement between working sensors and the failed sensor to all models.<\/p>\n<p>A woman discovered that any person\u2019s fingerprint could unlock her phone\u2019s \u201cvault-like security\u201d after she had fitted the phone with a $3 screen protector. Customers were told to avoid logging in through fingerprint until the vendor could fix the code.<a class=\"reference\" href=\".\/references\/#4.4\" target=\"_blank\" rel=\"noopener noreferrer\">4<\/a><\/p>\n<\/div>\n<h3>Why is this a fail?<\/h3>\n<p>Humans use sight, smell, hearing, taste, and touch to perceive and make sense of the world. These senses work in tandem and can serve as backups for one another; for instance, you might smell smoke before you see it. But human senses and processing aren\u2019t perfect; they can be influenced, be confused, or degrade.<\/p>\n<p>&nbsp;<\/p>\n<h3>What happens when things fail?<\/h3>\n<p>Similar to humans, some automated systems rely on sensors to get data about their operating environments and rely on code to process and act on that data. And like human senses, these sensors and the interpretation of their readings are imperfect and can be <em>influenced<\/em> by the composition or labelling of the training dataset, can get <em>confused<\/em> by erroneous or unexpected inputs, and can <em>degrade<\/em> as parts get older. AI applications tend to break if we haven\u2019t included redundancy, guardrails to control behavior, or code to gracefully deal with programming errors.<\/p>\n<p>We can learn from a long history of research on sensor failure, for example in the automobile, power production, manufacturing, and aviation industries. In the latter case research findings have led to certification requirements like triple redundancy for any parts on an aircraft necessary for flight.<a class=\"reference\" href=\".\/references\/#4.5\" target=\"_blank\" rel=\"noopener noreferrer\">5<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<table style=\"border: 5px solid #336699\">\n<tbody>\n <tr>\n  <th class=\"lessonshdr\" colspan=\"4\"><\/th>\n <\/tr>\n <tr>\n  <th class=\"lessons2hdr\" colspan=\"4\"><\/th>\n <\/tr>\n <tr>\n  <th class=\"categoryhdr1\"><\/th>\n  <th class=\"categoryhdr2\"><\/th>\n  <th class=\"categoryhdr3\"><\/th>\n  <th class=\"categoryhdr4\"><\/th>\n <\/tr>\n <tr>\n  <td class=\"inactive\"><a class=\"popmake-3347\" href=\"#\">Hold AI to a Higher Standard<\/a><\/td>\n  <td class=\"inactive\"><a class=\"popmake-3405\" href=\"#\">Involve the Communities Affected by the AI <\/a><\/td>\n  <td class=\"active\"><a class=\"popmake-3421\" href=\"#\">Make Our Assumptions Explicit<\/a><\/td>\n  <td class=\"active\"><a class=\"popmake-2906\" href=\"#\">Monitor the AI&#8217;s Impact and Establish Layers of Accountability<\/a><\/td>\n <\/tr>\n <tr>\n  <td class=\"inactive\"><a class=\"popmake-3096\" href=\"#\">It&#8217;s OK to Say No to Automation<\/a><\/td>\n  <td class=\"active\"><a class=\"popmake-3409\" href=\"#\">Plan to Fail<\/a><\/td>\n  <td class=\"inactive\"><a class=\"popmake-3450\" href=\"#\">Try Human-AI Couples Counseling<\/a><\/td>\n  <td class=\"inactive\"><a class=\"popmake-3552\" href=\"#\">Envision Safeguards for AI Advocates<\/a><\/td>\n <\/tr>\n <tr>\n  <td class=\"active\"><a class=\"popmake-3393\" href=\"#\">AI Challenges are Multidisciplinary, so They Require a Multidisciplinary Team<\/a><\/td>\n  <td class=\"active\"><a class=\"popmake-3414\" href=\"#\">Ask for Help: Hire a Villain<\/a><\/td>\n  <td class=\"active\"><a class=\"popmake-4413\" href=\"#\">Offer the User Choices<\/a><\/td>\n  <td class=\"active\"><a class=\"popmake-3146\" href=\"#\">Require Objective, Third-party Verification and Validation\u00a0<\/a><\/td>\n <\/tr>\n <tr style=\"border-bottom: 5px solid #336699\">\n  <td class=\"inactive\"><a class=\"popmake-4415\" href=\"#\">Incorporate Privacy, Civil Liberties, and Security from the Beginning<\/a><\/td>\n  <td class=\"active\"><a class=\"popmake-3417\" href=\"#\">Use Math to Reduce Bad Outcomes Caused by Math<\/a><\/td>\n  <td class=\"inactive\"><a class=\"popmake-3103\" href=\"#\">Promote Better Adoption through Gameplay<\/a><\/td>\n  <td class=\"inactive\"><a class=\"popmake-3199\" href=\"#\">Entrust Sector-specific Agencies to Establish AI Standards for Their Domains\u00a0<\/a><\/td>\n <\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_tab][et_pb_tab title=&#8221;Insecure AI &#8221; _builder_version=&#8221;4.4.8&#8243; tab_line_height=&#8221;1em&#8221;]<\/p>\n<div style=\"padding: 0px 0px 15px 0px;margin: 0px 0px 0px 0px\">\n<h3>Insecure AI<\/h3>\n<p>When AI\u2019s software and information technology (IT) architecture are not hardened against cybersecurity threats, users and systems are vulnerable to accidental or malicious interference.<\/p>\n<\/div>\n<div class=\"example-callout\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4030 size-full alignleft z-index40\" src=\"https:\/\/sites.mitre.org\/aifails\/wp-content\/uploads\/sites\/15\/2020\/03\/icon_example_robot-002.png\" alt=\"\" width=\"100\" height=\"83\" \/><\/p>\n<h3>Examples<\/h3>\n<p>Responding to what it thought were explicit commands but was actually background noise, an Amazon Echo recorded a family\u2019s private conversation and sent it to a random user.<a class=\"reference\" href=\".\/references\/#5.2\" target=\"_blank\" rel=\"noopener noreferrer\">2<\/a> This is one way in which users can unknowingly cause data spills.<\/p>\n<p>HIS Group, a Japanese hotel chain, installed in-room cameras with facial recognition and speech recognition to cater to guest\u2019s needs. Hackers were able to remotely view video streams.<a class=\"reference\" href=\".\/references\/#5.3\" target=\"_blank\" rel=\"noopener noreferrer\">3<\/a> This is one way purchasers can unintentionally create situations that attract malicious behavior.<\/p>\n<\/div>\n<h3>Why is this a fail?<\/h3>\n<p>AI\u2019s software and IT architecture are as vulnerable to cybersecurity threats as other connected technologies \u2013 and potentially vulnerable in new ways as well (see more in the &#8220;AI Pwned&#8221; Fail). Just deploying an AI into the world introduces it as a new attack surface (i.e., something to attack).<a class=\"reference\" href=\".\/references\/#5.4\" target=\"_blank\" rel=\"noopener noreferrer\">4<\/a> Even the most secure AI can face continuous attacks that aim to expose, alter, disable, destroy, or gain unauthorized access to it. Therefore, we must design all software systems in a way that makes cyber protections and privacy considerations inherent to the design from the beginning.<a class=\"reference\" href=\".\/references\/#5.5\" target=\"_blank\" rel=\"noopener noreferrer\">5<\/a><\/p>\n<blockquote>\n<p>AI systems often have access to potentially sensitive user information.<\/p>\n<\/blockquote>\n<h3><\/h3>\n<h3>What happens when things fail?<\/h3>\n<p>Smart devices \u2013 like internet-connected speakers, wireless door locks, and wireless implants \u2013 have increasingly been introduced into people\u2019s homes and even into their bodies, which makes the consequences of their being hacked especially terrifying.<a class=\"reference\" href=\".\/references\/#5.6\" target=\"_blank\" rel=\"noopener noreferrer\">6,<\/a><a class=\"reference\" href=\".\/references\/#5.7\" target=\"_blank\" rel=\"noopener noreferrer\">7,<\/a><a class=\"reference\" href=\".\/references\/#5.8\" target=\"_blank\" rel=\"noopener noreferrer\">8<\/a> Such systems are often networked because they rely on cloud resources to do some of the processing, or they communicate with other networked sensors. The market growth of these kind of products will make such devices more common.<\/p>\n<p>Another cybersecurity threat arises because AI systems often have access to potentially sensitive user information. For example, smart home devices have an unusual level of access, including contact lists, conversations, voice signatures, and times when someone is home. Any system that collects GPS data can recreate a detailed picture of someone\u2019s location and movement patterns.<a class=\"reference\" href=\".\/references\/#5.9\" target=\"_blank\" rel=\"noopener noreferrer\">9<\/a> Physical AI systems that provide critical capabilities, such as autonomous vehicles, could become targets for attacks that would put a person\u2019s safety at risk.<a class=\"reference\" href=\".\/references\/#5.a\" target=\"_blank\" rel=\"noopener noreferrer\">10<\/a> Finally, existing methods of de-identifying individuals from their personal data have been shown to be ineffective (although researchers are working on this challenge).<a class=\"reference\" href=\".\/references\/#5.b\" target=\"_blank\" rel=\"noopener noreferrer\">11<\/a> As organizations seek to collect more data for their algorithms, the rewards for stealing this information grow as well.<\/p>\n<p><a href=\"#_ednref1\" name=\"_edn1\" id=\"_edn1\"><\/a><\/p>\n<p>&nbsp;<\/p>\n<table style=\"border: 5px solid #336699\">\n<tbody>\n <tr>\n  <th class=\"lessonshdr\" colspan=\"4\"><\/th>\n <\/tr>\n <tr>\n  <th class=\"lessons2hdr\" colspan=\"4\"><\/th>\n <\/tr>\n <tr>\n  <th class=\"categoryhdr1\"><\/th>\n  <th class=\"categoryhdr2\"><\/th>\n  <th class=\"categoryhdr3\"><\/th>\n  <th class=\"categoryhdr4\"><\/th>\n <\/tr>\n <tr>\n  <td class=\"active\"><a class=\"popmake-3347\" href=\"#\">Hold AI to a Higher Standard<\/a><\/td>\n  <td class=\"inactive\"><a class=\"popmake-3405\" href=\"#\">Involve the Communities Affected by the AI <\/a><\/td>\n  <td class=\"active\"><a class=\"popmake-3421\" href=\"#\">Make Our Assumptions Explicit<\/a><\/td>\n  <td class=\"active\"><a class=\"popmake-2906\" href=\"#\">Monitor the AI&#8217;s Impact and Establish Layers of Accountability<\/a><\/td>\n <\/tr>\n <tr>\n  <td class=\"inactive\"><a class=\"popmake-3096\" href=\"#\">It&#8217;s OK to Say No to Automation<\/a><\/td>\n  <td class=\"active\"><a class=\"popmake-3409\" href=\"#\">Plan to Fail<\/a><\/td>\n  <td class=\"inactive\"><a class=\"popmake-3450\" href=\"#\">Try Human-AI Couples Counseling<\/a><\/td>\n  <td class=\"inactive\"><a class=\"popmake-3552\" href=\"#\">Envision Safeguards for AI Advocates<\/a><\/td>\n <\/tr>\n <tr>\n  <td class=\"active\"><a class=\"popmake-3393\" href=\"#\">AI Challenges are Multidisciplinary, so They Require a Multidisciplinary Team<\/a><\/td>\n  <td class=\"active\"><a class=\"popmake-3414\" href=\"#\">Ask for Help: Hire a Villain<\/a><\/td>\n  <td class=\"inactive\"><a class=\"popmake-4413\" href=\"#\">Offer the User Choices<\/a><\/td>\n  <td class=\"active\"><a class=\"popmake-3146\" href=\"#\">Require Objective, Third-party Verification and Validation\u00a0<\/a><\/td>\n <\/tr>\n <tr style=\"border-bottom: 5px solid #336699\">\n  <td class=\"active\"><a class=\"popmake-4415\" href=\"#\">Incorporate Privacy, Civil Liberties, and Security from the Beginning<\/a><\/td>\n  <td class=\"active\"><a class=\"popmake-3417\" href=\"#\">Use Math to Reduce Bad Outcomes Caused by Math<\/a><\/td>\n  <td class=\"inactive\"><a class=\"popmake-3103\" href=\"#\">Promote Better Adoption through Gameplay<\/a><\/td>\n  <td class=\"inactive\"><a class=\"popmake-3199\" href=\"#\">Entrust Sector-specific Agencies to Establish AI Standards for Their Domains\u00a0<\/a><\/td>\n <\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_tab][et_pb_tab title=&#8221;AI Pwned&#8221; _builder_version=&#8221;4.4.8&#8243; tab_line_height=&#8221;1em&#8221;]<\/p>\n<div style=\"padding: 0px 0px 15px 0px;margin: 0px 0px 0px 0px\">\n<h3>AI Pwned<\/h3>\n<p>Malicious actors can fool an AI or get it to reveal protected information.<\/p>\n<p><em>Note: <\/em>\u201cPwned\u201d is a computer-slang term that means \u201cto own\u201d or to completely get the better of an opponent or rival.<a class=\"reference\" href=\".\/references\/#6.2\" target=\"_blank\" rel=\"noopener noreferrer\">2<\/a><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<div class=\"example-callout\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4030 size-full alignleft z-index40\" src=\"https:\/\/sites.mitre.org\/aifails\/wp-content\/uploads\/sites\/15\/2020\/03\/icon_example_robot-002.png\" alt=\"\" width=\"100\" height=\"83\" \/><\/p>\n<h3>Examples<\/h3>\n<p>Researchers created eyeglasses whose frames had a special pattern that defeats facial recognition algorithms by executing targeted (impersonation of another person) or untargeted (avoiding identification) attacks on the algorithms.<a class=\"reference\" href=\".\/references\/#6.3\" target=\"_blank\" rel=\"noopener noreferrer\">3<\/a> A human being would easily be able to identify the person correctly.<\/p>\n<p>Researchers explored a commercial facial recognition system that used a picture of a face as input, searched its database, and outputted the name of the person with the closest matching face (and a confidence score in that match). Over time, the researchers discovered information about the individual faces the system had been trained on \u2013 information they should not have had access to. They then built their own AI system that, when supplied with a person\u2019s name, returned an imperfect image of the person, revealing data that had never been made public and should not have been.<a class=\"reference\" href=\".\/references\/#6.4\" target=\"_blank\" rel=\"noopener noreferrer\">4<\/a> This kind of attack illustrates that the sensitive information used for training an AI may not be as well protected as desired.<\/p>\n<\/div>\n<h3>Why is this a fail?<\/h3>\n<p>Cyber-attacks that target AI systems are called \u201cadversarial AI.\u201d AI may not have the defenses to prevent malicious actors from fooling the algorithm into doing what they want, or from interfering with the data on which the model trains, all without making any changes to the algorithm or gaining access to the code. At the most basic level, adversaries present lots of input to the AI and monitor what it does in response, so that they can track how the model makes very specific decisions. Adversaries can then very slightly alter the input so that a human cannot tell the difference, but the AI has great confidence in its wrong conclusion.<a class=\"reference\" href=\".\/references\/#6.5\" target=\"_blank\" rel=\"noopener noreferrer\">5<\/a> Adversaries can also extract sensitive information about individual elements of the training sets<a class=\"reference\" href=\".\/references\/#6.6\" target=\"_blank\" rel=\"noopener noreferrer\">6<\/a> or adversaries can make assumptions about which data sources are used and then insert data to bias the learning process.<a class=\"reference\" href=\".\/references\/#6.7\" target=\"_blank\" rel=\"noopener noreferrer\">7<\/a><\/p>\n<p><a href=\"#_ednref1\" name=\"_edn1\"><\/a><\/p>\n<h3>What happens when things fail?<\/h3>\n<p>The results can have serious real-world consequences. Researchers have demonstrated examples of a self-driving car not \u201cseeing\u201d a stop sign<a class=\"reference\" href=\".\/references\/#6.8\" target=\"_blank\" rel=\"noopener noreferrer\">8<\/a> and Google Home interpreting a greeting as a command to unlock the front door.<a class=\"reference\" href=\".\/references\/#6.9\" target=\"_blank\" rel=\"noopener noreferrer\">9<\/a> Researchers have also documented a hacker\u2019s ability to identify and decipher an individual\u2019s healthcare records from a published database of de-identified names.<a class=\"reference\" href=\".\/references\/#6.a\" target=\"_blank\" rel=\"noopener noreferrer\">10<\/a><\/p>\n<p>Pwning an AI is particularly powerful because 1) it is invisible to humans, so it is hard to detect; 2) it scales, so that a method to fool one AI can often trick other AIs; and 3) it works.<a class=\"reference\" href=\".\/references\/#6.b\" target=\"_blank\" rel=\"noopener noreferrer\">11<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<table style=\"border: 5px solid #336699\">\n<tbody>\n <tr>\n  <th class=\"lessonshdr\" colspan=\"4\"><\/th>\n <\/tr>\n <tr>\n  <th class=\"lessons2hdr\" colspan=\"4\"><\/th>\n <\/tr>\n <tr>\n  <th class=\"categoryhdr1\"><\/th>\n  <th class=\"categoryhdr2\"><\/th>\n  <th class=\"categoryhdr3\"><\/th>\n  <th class=\"categoryhdr4\"><\/th>\n <\/tr>\n <tr>\n  <td class=\"active\"><a class=\"popmake-3347\" href=\"#\">Hold AI to a Higher Standard<\/a><\/td>\n  <td class=\"active\"><a class=\"popmake-3405\" href=\"#\">Involve the Communities Affected by the AI <\/a><\/td>\n  <td class=\"active\"><a class=\"popmake-3421\" href=\"#\">Make Our Assumptions Explicit<\/a><\/td>\n  <td class=\"active\"><a class=\"popmake-2906\" href=\"#\">Monitor the AI&#8217;s Impact and Establish Layers of Accountability<\/a><\/td>\n <\/tr>\n <tr>\n  <td class=\"inactive\"><a class=\"popmake-3096\" href=\"#\">It&#8217;s OK to Say No to Automation<\/a><\/td>\n  <td class=\"active\"><a class=\"popmake-3409\" href=\"#\">Plan to Fail<\/a><\/td>\n  <td class=\"inactive\"><a class=\"popmake-3450\" href=\"#\">Try Human-AI Couples Counseling<\/a><\/td>\n  <td class=\"inactive\"><a class=\"popmake-3552\" href=\"#\">Envision Safeguards for AI Advocates<\/a><\/td>\n <\/tr>\n <tr>\n  <td class=\"active\"><a class=\"popmake-3393\" href=\"#\">AI Challenges are Multidisciplinary, so They Require a Multidisciplinary Team<\/a><\/td>\n  <td class=\"active\"><a class=\"popmake-3414\" href=\"#\">Ask for Help: Hire a Villain<\/a><\/td>\n  <td class=\"inactive\"><a class=\"popmake-4413\" href=\"#\">Offer the User Choices<\/a><\/td>\n  <td class=\"active\"><a class=\"popmake-3146\" href=\"#\">Require Objective, Third-party Verification and Validation\u00a0<\/a><\/td>\n <\/tr>\n <tr style=\"border-bottom: 5px solid #336699\">\n  <td class=\"active\"><a class=\"popmake-4415\" href=\"#\">Incorporate Privacy, Civil Liberties, and Security from the Beginning<\/a><\/td>\n  <td class=\"active\"><a class=\"popmake-3417\" href=\"#\">Use Math to Reduce Bad Outcomes Caused by Math<\/a><\/td>\n  <td class=\"inactive\"><a class=\"popmake-3103\" href=\"#\">Promote Better Adoption through Gameplay<\/a><\/td>\n  <td class=\"inactive\"><a class=\"popmake-3199\" href=\"#\">Entrust Sector-specific Agencies to Establish AI Standards for Their Domains\u00a0<\/a><\/td>\n <\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_tab][\/et_pb_tabs][\/et_pb_column_inner][\/et_pb_row_inner][\/et_pb_column][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; disabled_on=&#8221;off|off|off&#8221; _builder_version=&#8221;4.4.8&#8243; module_alignment=&#8221;center&#8221; global_module=&#8221;3880&#8243; saved_tabs=&#8221;all&#8221;][et_pb_fullwidth_code disabled_on=&#8221;off|off|off&#8221; admin_label=&#8221;Footer menu&#8221; _builder_version=&#8221;4.4.8&#8243; background_color=&#8221;#d5dde0&#8243; text_orientation=&#8221;center&#8221; module_alignment=&#8221;center&#8221; custom_padding=&#8221;10px||10px||false|false&#8221;]Add Your Experience! This site should be a community resource and would benefit from the addition of other examples and voices. You can write to us by clicking <a href=\"mailto:jrotner@mitre.org;rhodge@mitre.org;ldanley@mitre.org?subject=AI Fails website\">here<\/a>.[\/et_pb_fullwidth_code][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You Call This Artificial \u201cIntelligence\u201d? AI Meets the Real World \u200bAI systems can perform specific, defined tasks so well that their capability can appear superhuman. For instance, AI can recognize common images and objects better than human beings, AI can sift through large amounts of data faster than human beings, and AI can master more [&hellip;]<\/p>\n","protected":false},"author":142,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-4701","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/sites.mitre.org\/aifails\/wp-json\/wp\/v2\/pages\/4701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.mitre.org\/aifails\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.mitre.org\/aifails\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.mitre.org\/aifails\/wp-json\/wp\/v2\/users\/142"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.mitre.org\/aifails\/wp-json\/wp\/v2\/comments?post=4701"}],"version-history":[{"count":0,"href":"https:\/\/sites.mitre.org\/aifails\/wp-json\/wp\/v2\/pages\/4701\/revisions"}],"wp:attachment":[{"href":"https:\/\/sites.mitre.org\/aifails\/wp-json\/wp\/v2\/media?parent=4701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}