Chapter 1 - References

  •   https://www.engadget.com/mcdonalds-ibm-ai-food-orders-131806578.html

  •   https://www.hospitalitynet.org/news/4100264.html

  •   https://www.theguardian.com/football/2022/jul/01/fifa-ai-powered-technology-var-offside-world-cup

  •   https://news.pg.com/news-releases/news-details/2017/Olay-Unveils-Global-Skin-Analysis-Platform-Olay-Skin-Advisor--The-First-Of-Its-Kind-Application-of-Deep-Learning-in-the-Beauty-Industry/default.aspx

  •   https://www.cnbc.com/2017/05/21/hersheys-pennsylvania-twizzler-factory-uses-microsoft-artificial-intelligence.html

  •   https://www.cbinsights.com/research/artificial-intelligence-earnings-calls/

  •   Samuel, Arthur L. "Some studies in machine learning using the game of checkers." IBM Journal of research and development 44.1.2 (2000): 206-226.

  •   https://www.businessinsider.com/the-documentary-about-google-deepminds-alphago-algorithm-is-now-available-on-netflix-2018-1

  •   https://ai.googleblog.com/2022/06/minerva-solving-quantitative-reasoning.html

  •   https://www.fda.gov/medical-devices/software-medical-device-samd/artificial-intelligence-and-machine-learning-aiml-enabled-medical-devices

  •   https://www.wired.com/story/russia-ukraine-war-ai-surveillance/

  •   https://fortune.com/2022/02/16/deepmind-ai-nuclear-fusion-reactor-control/

  •   Salem, Maha, et al. "Would you trust a (faulty) robot? Effects of error, task type and personality on human-robot cooperation and trust." 2015 10th ACM/IEEE International Conference on Human-Robot Interaction (HRI). IEEE, 2015.

  •   Robinette, Paul, et al. "Overtrust of robots in emergency evacuation scenarios." 2016 11th ACM/IEEE international conference on human-robot interaction (HRI). IEEE, 2016.

  •   https://www.nature.com/articles/s42256-021-00307-0

  •   https://www.technologyreview.com/2021/07/30/1030329/machine-learning-ai-failed-covid-hospital-diagnosis-pandemic/

  •   https://www.newyorker.com/business/currency/cautiously-welcoming-our-new-computer-overlords

  •   https://www.youtube.com/watch?v=W4jWAwUb63c

  •   https://fortune.com/longform/ibm-watson-health-business-strategy/

  •   https://slate.com/technology/2022/01/ibm-watson-health-failure-artificial-intelligence.html

  •   https://fortune.com/2015/09/10/ibm-watson-health/

  •   https://fortune.com/longform/ibm-watson-health-business-strategy/

  •   https://slate.com/technology/2022/01/ibm-watson-health-failure-artificial-intelligence.html

  •   https://newsroom.ibm.com/2022-01-21-Francisco-Partners-to-Acquire-IBMs-Healthcare-Data-and-Analytics-Assets

  •   https://www.bbc.com/news/uk-scotland-highlands-islands-57854318

  •   https://www.nytimes.com/2021/07/18/technology/google-maps-hike-danger.html

  •   https://www.wbur.org/hereandnow/2016/06/01/hikers-gps-smartphones

  •   https://www.dw.com/en/saudi-arabia-grants-citizenship-to-robot-sophia/a-41150856

  •   https://www.un.org/en/desa/un-robot-sophia-joins-meeting-artificial-intelligence-and-sustainable-development

  •   https://www.nytimes.com/2017/05/23/business/google-deepmind-alphago-go-champion-defeat.html

  •   https://pnw.ai/article/america-needs-ai-literacy-now/72515409

  •   https://www.washingtonpost.com/technology/2022/06/11/google-ai-lamda-blake-lemoine/

  •   Pearl, Judea, and Dana Mackenzie. The book of why: the new science of cause and effect. Basic books, 2018.

  •   https://www.scientificamerican.com/article/ai-learns-what-an-infant-knows-about-the-physical-world/

  •   https://www.theverge.com/2020/9/18/21445168/tesla-driver-sleeping-police-charged-canada-autopilot

  •   https://www.nytimes.com/2021/12/07/business/tesla-video-game-driving.html

  •   https://www.cnbc.com/2022/08/19/youtube-removes-video-by-tesla-investors-using-kids-in-fsd-beta-test.html

  •   https://gizmodo.com/james-corden-late-show-tesla-autopilot-self-driving-1849490806

  •   https://www.bbc.com/news/technology-61155735

  •   https://vervetimes.com/baidu-and-pony-ai-become-first-robotaxi-services-to-operate-without-safety-drivers-in-beijing/

  •   https://www.theatlantic.com/international/archive/2018/01/trump-foreign-policy/549671/

  •   https://medium.com/@RPublicService/feds-at-work-right-hand-men-to-the-pentagons-top-officials-ca99b6c93fbf

  •   https://www.vanityfair.com/news/2018/04/inside-trumpworld-allies-fear-the-boss-could-go-postal-and-fire-mueller

  • https://cifar.ca/ai/#:~:text=Canada%20is%20a%20global%20AI%20leader&text=Launched%20in%202017%2C%20Canada's%20national,of%20Canada's%20thriving%20AI%20ecosystem.

  •   https://www.nscai.gov/commissioners/

  •   https://www.propublica.org/article/how-mckinsey-is-making-100-million-and-counting-advising-on-the-governments-bumbling-coronavirus-response

  •   https://www.nscai.gov/about/charter/#:~:text=The%20Commission%20estimates%20an%20annual,and%20execution%20of%20its%20mission.

  •   https://trumpwhitehouse.archives.gov/articles/promoting-use-trustworthy-artificial-intelligence-government/

  •   https://forallsecure.com/blog/unleashing-the-mayhem-crs

  •   https://www.darpa.mil/news-events/2016-08-04

  •   https://twitter.com/perribus/status/1329813569869852679

  •   https://www.npr.org/2022/03/16/1087062648/deepfake-video-zelenskyy-experts-war-manipulation-ukraine-russia

  •   VII, Tom Murphy. "The first level of super mario bros. is easy with lexicographic." (2013).

  •   https://www.defenseone.com/technology/2021/12/air-force-targeting-ai-thought-it-had-90-success-rate-it-was-more-25/187437/

  •   https://www.ajl.org/drag-vs-ai#:~:text=%23DRAGVSAI%20is%20a%20hands%2Don,artificial%20intelligence%2C%20and%20algorithmic%20harms.

  •   https://www.nytimes.com/2021/09/28/technology/facebook-ivermectin-coronavirus-misinformation.html

  •   https://www.nbcnews.com/tech/tech-news/ivermectin-demand-drives-trump-telemedicine-website-rcna1791

  •   https://www.theguardian.com/technology/2016/mar/24/tay-microsofts-ai-chatbot-gets-a-crash-course-in-racism-from-twitter

  •   https://www.bloomberg.com/news/articles/2022-08-08/meta-s-ai-chatbot-repeats-election-and-anti-semitic-conspiracies

  •   https://www.armed-services.senate.gov/press-releases/inhofe-reed-praise-senate-passage-of-national-defense-authorization-act-of-fiscal-year-2021

  •   https://www.forbes.com/sites/markminevich/2022/03/23/ai-visionary-and-leader-dr-jane-pinelis-of-the-us-department-of-defense/?sh=5b121a4b5aa5

  •   Baer, Gregory. Life: The Odds-And How to Improve Them. Perseus Books Group, 2003.

  •   https://www.foxbusiness.com/politics/biden-defense-chief-china-pacing-amid-ascendancy

  •   https://cset.georgetown.edu/publication/robot-hacking-games/

  •   https://breakingdefense.com/2021/11/china-invests-in-artificial-intelligence-to-counter-us-joint-warfighting-concept-records/

  •   https://tianchi.aliyun.com/competition/entrance/531853/introduction

  •   https://tianchi.aliyun.com/competition/entrance/531853/introduction

  •   https://perma.cc/X9KQ-4B9L

  •   https://breakingdefense.com/2021/11/china-invests-in-artificial-intelligence-to-counter-us-joint-warfighting-concept-records/

  •   Chen, Yuefeng, et al. "Unrestricted adversarial attacks on imagenet competition." arXiv preprint arXiv:2110.09903 (2021).

  •   https://www.gov.uk/government/publications/defence-artificial-intelligence-strategy/defence-artificial-intelligence-strategy#strengthen-the-uks-defence-and-security-ai-ecosystem

  •   https://www.nytimes.com/interactive/2021/12/20/technology/china-facebook-twitter-influence-manipulation.html

  •   https://www.nytimes.com/interactive/2021/06/22/technology/xinjiang-uyghurs-china-propaganda.html

  •   https://cset.georgetown.edu/publication/hacking-ai/

  •   https://www-msnbc-com.cdn.ampproject.org/c/s/www.msnbc.com/msnbc/amp/shows/reidout/blog/rcna48322

  •   https://www.forbes.com/sites/erictegler/2022/03/16/the-vulnerability-of-artificial-intelligence-systems-may-explain-why-they-havent-been-used-extensively-in-ukraine/?sh=1f685d7637d5

  •   https://www.cyberscoop.com/shields-up-easterly-inglis-op-ed/

  •   https://pubs.rsna.org/doi/full/10.1148/ryai.2021210011

  •   NSCAI Report

Chapter 2 - References

  •   https://qz.com/1034972/the-data-that-changed-the-direction-of-ai-research-and-possibly-the-world/

  •   Domingos, Pedro. "A few useful things to know about machine learning." Communications of the ACM 55.10 (2012): 78-87.

  •   https://www.nytimes.com/2015/12/11/science/an-advance-in-artificial-intelligence-rivals-human-vision-abilities.html

  •   https://qz.com/1034972/the-data-that-changed-the-direction-of-ai-research-and-possibly-the-world/

  •   https://media.utoronto.ca/media-releases/u-of-t-neural-networks-start-up-acquired-by-google/

  •   https://www.wired.com/story/secret-auction-race-ai-supremacy-google-microsoft-baidu/

  •   https://techcrunch.com/2016/10/25/clarifai-raises-30m-to-give-developers-visual-search-capabilities/

  •   https://www.prnewswire.com/news-releases/metamind-launches-state-of-the-art-ai-platform-bringing-automated-predictions-and-smarter-decision-making-to-businesses-300005387.html

  •   https://techcrunch.com/2016/04/04/saleforce-acquires-metamind/

  •   http://karpathy.github.io/2014/09/02/what-i-learned-from-competing-against-a-convnet-on-imagenet/

  •   Y. LeCun, B. Boser, J. S. Denker, D. Henderson, R. E. Howard, W. Hubbard, and L. D. Jackel. Backpropagation applied to handwritten zip code recognition. Neural Computation, 1(4):541-551, Winter 1989.

  •   Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Delving deep into rectifiers: Surpassing human-level performance on imagenet classification. 2015 IEEE International Conference on Computer Vision (ICCV), pages 1026–1034, 2015

  •   Hendrycks, Dan, et al. "Natural adversarial examples." arXiv preprint arXiv:1907.07174 (2019).

  •   https://www.theverge.com/2017/10/24/16533534/delphi-nutonomy-acquisition-450-million-self-driving

  •   System Initiative on Shaping the Future of Mobility. "Reshaping urban mobility with autonomous vehicles: Lessons from the city of boston." World Economic Forum, 2018.

  •   https://www.wired.com/story/snow-ice-pose-vexing-obstacle-self-driving-cars/

  •   Reshaping urban mobility with autonomous vehicles: Lessons from the city of boston." World Economic Forum Report, 2018

  •   https://www.bloomberg.com/news/features/2016-08-18/uber-s-first-self-driving-fleet-arrives-in-pittsburgh-this-month-is06r7on

  •   https://www.cnet.com/roadshow/news/burger-king-ad-free-whopper-tesla-autopilot-smart-car/

  •   https://www.vice.com/en/article/5d3dw5/the-least-safe-day-rollout-of-gun-detecting-ai-scanners-in-schools-has-been-a-cluster-emails-show

  •   Nguyen, Anh, Jason Yosinski, and Jeff Clune. "Deep neural networks are easily fooled: High confidence predictions for unrecognizable images." Proceedings of the IEEE conference on computer vision and pattern recognition. 2015.

  •   Baker, Nicholas, et al. "Deep convolutional networks do not classify based on global object shape." PLoS computational biology 14.12 (2018): e1006613.

  •   https://www.bbc.com/news/54467384

  •   https://www.today.com/food/facebook-blocked-ad-onions-being-overtly-sexual-t193666

  •   https://fortune.com/2020/11/28/facebooks-ai-is-mistakenly-banning-some-small-business-ads/

  •   https://www.theguardian.com/technology/2018/dec/04/images-of-jesus-superheroes-caught-up-tumblr-porn-ban

  •   https://www.polygon.com/2018/12/4/18125997/tumblr-nsfw-guidelines-flagging-algorithm

  •   https://gizmodo.com/british-cops-want-to-use-ai-to-spot-porn-but-it-keeps-m-1821384511

  •   https://www.theverge.com/23327809/twitter-onlyfans-child-sexual-content-problem-elon-musk

  •   https://www.theverge.com/2020/11/13/21562596/facebook-ai-moderation

  •   https://www.theverge.com/2020/11/13/21562596/facebook-ai-moderation

  •   Lattman, Peter. "The origins of Justice Stewart’s “I know it when I see it.”." Wall Street Journal (2007).

  •   https://www.theverge.com/2017/8/4/16093872/facebook-ai-translations-artificial-intelligence

  •   https://engineering.fb.com/2017/08/03/ml-applications/transitioning-entirely-to-neural-machine-translation/

  •   Israeli police arrest Palestinian for 'good morning' Facebook post | The Times of Israel;

  •   https://www.spanishdict.com/compare/registrar/buscar

  •   https://ecf.ksd.uscourts.gov/cgi-bin/show_public_doc?2017cr40100-24

  •   https://www.theguardian.com/world/2017/oct/13/chinas-wechat-app-translates-black-foreigner-to-n-word

  •   https://arstechnica.com/tech-policy/2020/04/big-tits-bing-disables-trending-feature-after-inappropriate-results/

  •   https://www.japantimes.co.jp/news/2020/02/07/business/tech/google-maps-marks-15-year-milestone-new-features/

  •   https://www.bloomberg.com/news/articles/2019-04-10/google-flips-the-switch-on-its-next-big-money-maker-maps

  •   https://blog.google/products/maps/google-maps-101-how-ai-helps-predict-traffic-and-determine-routes/

  •   https://www.theverge.com/2020/2/3/21120463/google-maps-traffic-jams-99-phones-little-red-wagon-simon-weckert

  •   https://venturebeat.com/2015/04/24/an-android-is-peeing-on-the-apple-logo-in-google-maps/

  •   https://money.cnn.com/2015/04/24/technology/android-peeing-on-apple-google-maps/index.html?iid=EL

  •   https://www.wsj.com/articles/google-maps-littered-with-fake-business-listings-harming-consumers-and-competitors-11561042283

  •   https://www.mcafee.com/enterprise/en-us/assets/brochures/br-research-notes-on-experiments-conducted.pdf

  •   https://www.wired.com/story/tesla-model-x-autopilot-phantom-images/

  •   Hosseini, Hossein, and Radha Poovendran. "Semantic adversarial examples." Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops. 2018.

  •   Rosenfeld, Amir, Richard Zemel, and John K. Tsotsos. "The elephant in the room." arXiv preprint arXiv:1808.03305 (2018).

  •   Engstrom, Logan, et al. "Exploring the landscape of spatial robustness." International Conference on Machine Learning. PMLR, 2019.

  •   https://www.fda.gov/news-events/fda-voices/fdas-comprehensive-effort-advance-new-innovations-initiatives-modernize-innovation

Chapter 3 - References

  •   Szegedy, Christian, et al. "Intriguing properties of neural networks. ICLR. 2014." arXiv preprint arXiv:1312.6199 (2014).

  •   https://careers.google.com/benefits/

  •   https://www.seriouseats.com/lunch-at-google-insanely-awesome-as-you-thought

  •   https://research.google/locations/accra/

  •   https://research.google/locations/zurich/

  •   Wu, Zuxuan, et al. "Making an invisibility cloak: Real world adversarial attacks on object detectors." European Conference on Computer Vision. Springer, Cham, 2020.

  •   Sharif, Mahmood, et al. "Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition." Proceedings of the 2016 acm sigsac conference on computer and communications security. 2016.

  •  https://www.nytimes.com/2018/05/10/technology/alexa-siri-hidden-command-audio-attacks.html

  • Carlini, Nicholas, and David Wagner. "Audio adversarial examples: Targeted attacks on speech-to-text." 2018 IEEE security and privacy workshops (SPW). IEEE, 2018.

  •   Morris, John X., et al. "Textattack: A framework for adversarial attacks, data augmentation, and adversarial training in nlp." arXiv preprint arXiv:2005.05909 (2020).

  •   https://cset.georgetown.edu/publication/exploring-clusters-of-research-in-three-areas-of-ai-safety/

  •   https://neurips.cc/Conferences/2007/

  •   https://web.archive.org/web/20090411064558/http://mls-nips07.first.fraunhofer.de/

  •   https://analyticsindiamag.com/imagenet-and-variants/

  •   https://en.wikipedia.org/wiki/Batch_normalization

  •   https://openai.com/blog/microsoft/

  •   See acknowledgements  https://proceedings.neurips.cc/paper/2014/file/5ca3e9b122f61f8f06494c97b1afccf3-Paper.pdf

  •   https://fortune.com/40-under-40/2019/ian-goodfellow/

  •   https://events.technologyreview.com/video/watch/ian-goodfellow-google-brain-innovator/

  •   https://www.acm.org/media-center/2019/march/turing-award-2018

  •   https://icml.cc/virtual/2022/20803

  •   Ilyas, Andrew, et al. "Adversarial examples are not bugs, they are features." Advances in neural information processing systems 32 (2019).

  •   Goodfellow, Ian J., Jonathon Shlens, and Christian Szegedy. "Explaining and harnessing adversarial examples." arXiv preprint arXiv:1412.6572 (2014).

  •   Finlayson, Samuel G., et al. "Adversarial attacks on medical machine learning." Science 363.6433 (2019): 1287-1289.

  •   Hussain, Shehzeen, et al. "WaveGuard: Understanding and Mitigating Audio Adversarial Examples." 30th USENIX Security Symposium

  •   Brown, Tom B., et al. "Adversarial patch." arXiv preprint arXiv:1712.09665 (2017).

  •   https://www.theverge.com/2017/11/2/16597276/google-ai-image-attacks-adversarial-turtle-rifle-3d-printed

  •   https://www.louislegrand.fr/le-lycee/presentation/

  •   https://venturebeat.com/2014/09/06/google-shows-its-deep-learning-systems-are-doing-just-fine-thank-you-very-much/

  •   https://arxiv.org/abs/1605.07277

  •   Papernot, Nicolas, Patrick McDaniel, and Ian Goodfellow. "Transferability in machine learning: from phenomena to black-box attacks using adversarial samples." arXiv preprint arXiv:1605.07277 (2016).

  •   Albert, Kendra, et al. "Ethical Testing in the Real World: Evaluating Physical Testing of Adversarial Machine Learning." arXiv preprint arXiv:2012.02048 (2020)

  •   Yu, Honggang, et al. "CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples." NDSS. 2020.

  •   https://www.washingtonpost.com/technology/2022/06/15/tesla-autopilot-crashes/

  •   https://www.usenix.org/conference/woot15/workshop-program/presentation/vaidya

  •   https://www.theverge.com/2017/9/16/16318694/south-park-amazon-alexa-google-home

  •   https://www.engadget.com/ai-controls-us-military-aircraft-142844768.html

  •   https://warontherocks.com/2019/07/russian-ai-enabled-combat-coming-to-a-city-near-you/

  •   https://www.nytimes.com/2021/09/18/world/middleeast/iran-nuclear-fakhrizadeh-assassination-israel.html

  •   https://www.defensenews.com/artificial-intelligence/2022/08/17/russia-military-to-develop-weapons-using-artificial-intelligence/

Chapter 4 - References

  •    https://www.tiktok.com/@sarahndom/video/6988270489290411269

  •   https://twitter.com/SebastianDeri/status/1423768044610854913

  •    https://twitter.com/VladChituc/status/1423769145548713987

  •   https://blog.prolific.co/we-recently-went-viral-on-tiktok-heres-what-we-learned/

  •   https://trends.google.com/trends/explore?date=2020-08-25%202021-07-31&geo=US&q=prolific%20surveys

  •   https://www.theverge.com/2021/9/24/22688278/tiktok-science-study-survey-prolific

  •   Kumar, Ram Shankar Siva, et al. "Adversarial machine learning-industry perspectives." 2020 IEEE Security and Privacy Workshops (SPW). IEEE, 2020

  •   Grosse, Kathrin, et al. "" Why do so?"--A Practical Perspective on Machine Learning Security." arXiv preprint arXiv:2207.05164 (2022).

  •   https://www.ft.com/content/f77b7979-c943-4b9d-b7b7-7953b63bea7e

  •   https://www.dailydot.com/debug/unity-deempind-ai/

  •   https://www.fool.com/earnings/call-transcripts/2022/05/11/unity-software-inc-u-q1-2022-earnings-call-transcr/

  •   https://www.fool.com/earnings/call-transcripts/2022/05/11/unity-software-inc-u-q1-2022-earnings-call-transcr/

  •   https://www.gartner.com/smarterwithgartner/how-to-create-a-business-case-for-data-quality-improvement

  •   https://proceedings.neurips.cc/paper/2015/file/86df7dcfd896fcaf2674f757a2463eba-Paper.pdf

  •   https://www.vice.com/en/article/88apnv/underpaid-workers-are-being-forced-to-train-biased-ai-on-mechanical-turk

  •   https://electrek.co/2021/02/08/tesla-looks-hire-data-labelers-feed-autopilot-neural-nets-images-gigafactory-new-york/

  •   https://www.reuters.com/article/us-facebook-ai/facebook-labels-posts-by-hand-posing-privacy-questions-idUSKCN1SC01T

  •   Silicon Valley Is Listening To Your Most Intimate Moments - Ventured (siliconbaypartners.com)

  •   https://arxiv.org/abs/2103.14749

  •   https://excavating.ai/

  •   https://www.artsy.net/article/artsy-editorial-online-image-database-will-remove-600-000-pictures-art-project-revealed-systems-racist-bias

  •   https://electrek.co/2022/06/29/tesla-lets-go-hundreds-autopilot-data-labelers-closes-san-mateo-office/

  •   https://arxiv.org/pdf/2105.05241.pdf

  •  https://towardsdatascience.com/dirty-secrets-of-bookcorpus-a-key-dataset-in-machine-learning-6ee2927e8650

  •   https://www.nytimes.com/2018/11/18/technology/artificial-intelligence-language.html

  •   https://twitter.com/klivdahl/status/1475655863289495559

  •   https://www.cnbc.com/2021/12/29/amazons-alexa-told-a-child-to-do-a-potentially-lethal-challenge.html

  •   https://ourcommunitynow.com/news-national/watch-out-parentsthe-viral-outlet-challenge-has-kids-doing-the-unthinkable

  •   https://itwire.com/home-it/how-a-google-search-could-end-up-endangering-a-life.html

  •   https://support.google.com/websearch/answer/9351707?hl=en#zippy=%2Cour-policies-for-featured-snippets%2Chow-to-report-a-featured-snippet%2Cwhy-featured-snippets-may-be-removed

  •   What happens when a user clicks a featured snippet? https://developers.google.com/search/docs/advanced/appearance/featured-snippets?visit_id=637778919680386649-1342753026&rd=1

  •   https://searchengineland.com/bing-why-googles-wrong-in-its-accusations-63279

  •  https://searchengineland.com/google-bing-is-cheating-copying-our-search-results-62914

  •   https://www.wsj.com/articles/SB10001424052748704124504576118510340787364

  •   https://www.bbc.com/news/technology-12343597

  •   https://searchengineland.com/wait-wait-dont-tell-me-i-search-google-so-does-bing-64501

  •   https://money.cnn.com/2009/04/22/technology/yahoo-search.fortune/?postversion=2009042212

  •   https://searchengineland.com/google-bing-is-cheating-copying-our-search-results-62914

  •   https://searchengineland.com/google-bing-is-cheating-copying-our-search-results-62914

  •   https://www.wsj.com/articles/lyrics-site-genius-com-accuses-google-of-lifting-its-content-11560677400

  •   https://variety.com/2020/digital/news/genius-loses-google-lyrics-lawsuit-1234731843/

  •   https://www.musicbusinessworldwide.com/google-partner-lyricfind-responds-to-genius-lyric-lifting-accusation/

  •   https://www.vice.com/en/article/pkgbwm/chinese-woman-fake-russian-history-wikipedia

  •   Attacks against machine learning — an overview (elie.net)

  •   https://slate.com/technology/2022/07/men-period-tracking-apps-abortion.html

  •   https://trackthis.link/

  •   https://bengrosser.com/projects/go-rando/

  •   https://github.com/BillDietrich/fake_contacts

  •   https://www.cnet.com/culture/teens-have-figured-out-how-to-mess-with-instagrams-tracking-algorithm/

  •   https://www.bloomberg.com/news/articles/2022-03-04/ukraine-s-hacker-army-said-to-be-helped-by-400-000-supporters

  •   https://www.nationaldefensemagazine.org/articles/2021/3/3/mumbai-incident-spotlights-chinas-cyber-capabilities

  •   https://www.nytimes.com/2021/07/19/technology/china-hacking-us.html

  •   Carlini, Nicholas. "Poisoning the Unlabeled Dataset of {Semi-Supervised} Learning." 30th USENIX Security Symposium (USENIX Security 21). 2021.

  •   Kaspersky denies faking antivirus info to thwart rivals | Computerworld

  •   https://arxiv.org/abs/1703.04730 (For a short talk on the paper, see https://vimeo.com/237274831; part about adversarial example comes towards the end, 12:29)

  •   http://www.cs.cmu.edu/~alina/cv/resume.pdf

  •   http://www2.technologyreview.com/tr35/profile.aspx?TRID=1083

  •   https://www.ccs.neu.edu/home/alina/

  •   https://news.northeastern.edu/2019/02/11/northeastern-has-the-most-beautiful-building-in-boston/

  •   https://www.usenix.org/system/files/sec19-demontis.pdf

  •   https://developers.google.com/machine-learning/guides/rules-of-ml

Chapter 5 - References

  •   https://www.youtube.com/watch?t=1617&v=dEv99vxKjVI&feature=youtu.be

  •   https://hbr.org/2022/01/how-to-sell-your-ideas-up-the-chain-of-command

  •   https://twitter.com/nsa_csdirector/status/1437233496351723523

  •   Papernot, N., McDaniel, P., Goodfellow, I., Jha, S., Celik, Z. B., and Swami, A. Practical black-box attacks against machine learning. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ASIA CCS ’17, pp. 506–519, New York, NY, USA, 2017. ACM. ISBN 978-1-4503-4944-4. doi: 10.1145/3052973.3053009. URL http://doi.acm. org/10.1145/3052973.3053009.

  •   See Section 3 of http://proceedings.mlr.press/v80/athalye18a/athalye18a.pdf

  •   See Section 3 of http://proceedings.mlr.press/v80/athalye18a/athalye18a.pdf

  •   https://resources.mpi-inf.mpg.de/d2/orekondy/predpoison/

  •   https://www.vice.com/en/article/43k453/this-real-time-strategy-game-is-just-13-kilobytes

  •   https://js13kgames.com/entries/yet-another-moba

  •   https://nicholas.carlini.com/writing/2020/digital-logic-game-of-life.html

  •   https://nicholas.carlini.com/writing/2019/3d-renderer-javascript.html

  •   “Because it is possible” mentioned in “3D Shadow Rendering” under 2019 in https://nicholas.carlini.com/writing and in 3rd paragaph of https://nicholas.carlini.com/writing/2020/digital-logic-game-of-life.html

  •   https://github.com/carlini?tab=repositories

  •   https://cypherpunks.venona.com/date/1995/09/msg01127.html

  •   https://www.nytimes.com/1995/09/19/us/software-security-flaw-puts-shoppers-on-internet-at-risk.html

  •   https://nicholas.carlini.com/writing/2019/advex_papers.txt (accessed on 12/5/2021; 4279 papers collected; bulk of them are adversarial examples); 4000 days =

  •   See section 3.3 page 3; “A cottage industry has sprung up generating various ad-hoc defenses to specific adversarial attacks. Time and time again, these defenses have been repeatedly broken, often extremely quickly” https://people.csail.mit.edu/madry/6.883-Spring18/files/lecture_11.pdf

  •   “I get the feeling that people vastly over-estimate the difficulty of breaking published defenses. “ in concluding thoughts sections https://nicholas.carlini.com/writing/2020/screen-recording-breaking-adversarial-example-defense.html

  •   1902.02322.pdf (arxiv.org)

  •   https://iclr.cc/archive/www/doku.php%3Fid=iclr2018:main.html

  •   See https://www.wired.com/story/ai-has-a-hallucination-problem-thats-proving-tough-to-fix/

  •   Commit date is Feb 1st  https://github.com/anishathalye/obfuscated-gradients/commit/b161a13c3ff065573ee7b01f6dd7a719b0c4ae18

  •   Quote from https://www.wired.com/story/ai-has-a-hallucination-problem-thats-proving-tough-to-fix/

  •   https://twitter.com/chrisvelazco/status/1081330848262062080

  •   http://web.archive.org/web/20210805191220/https://www.apple.com/child-safety/

  •   https://twitter.com/senblumenthal/status/1423397902672662529

  •   https://www.apple.com/child-safety/pdf/CSAM_Detection_Technical_Summary.pdf

  •   “The threshold is set to provide an extremely high level of accuracy and ensures less than a one in one trillion chance per year of incorrectly flagging a given account" http://web.archive.org/web/20210805191220/https://www.apple.com/child-safety/

  •   Dan Boneh from Stanford verified the proof https://www.apple.com/child-safety/pdf/Apple_PSI_System_Security_Protocol_and_Analysis.pdf

  •   (In the video, the reporter mentions Google, Facebook and Microsoft does the same) https://www.wsj.com/articles/apple-executive-defends-tools-to-fight-child-porn-acknowledges-privacy-backlash-11628859600

  •   German government wants Tim Cook to reconsider CSAM plans | AppleInsider

  •   https://www.macrumors.com/2021/08/13/federighi-confusion-around-child-safety-details/

  •   https://www.macrumors.com/2021/08/09/apple-faq-csam-detection-messages-scanning/

  •   https://rottenoomocha.fandom.com/wiki/Asuha_Tohara

  •   Text of post [P] AppleNeuralHash2ONNX: Reverse-Engineered Apple NeuralHash, in ONNX and Python : MachineLearning (reddit.com)

  •   See “View Discussion in 5 other communities” [P] AppleNeuralHash2ONNX: Reverse-Engineered Apple NeuralHash, in ONNX and Python : MachineLearning (reddit.com)

  •   https://www.theregister.com/2021/08/18/apples_csam_hashing/

  •   https://www.theregister.com/2021/08/18/apples_csam_hashing/

  •   https://techcrunch.com/2021/08/18/apples-csam-detection-tech-is-under-fire-again/  

  •   https://www.recordedfuture.com/china-pla-unit-purchasing-antivirus-exploitation/

  •   https://www.federalregister.gov/documents/2020/01/06/2019-27649/addition-of-software-specially-designed-to-automate-the-analysis-of-geospatial-imagery-to-the-export

  •   https://www.militarytimes.com/opinion/commentary/2020/02/06/the-iraq-war-has-cost-the-us-nearly-2-trillion/

  •   https://www.theguardian.com/us-news/2021/oct/18/colin-powell-un-security-council-iraq

  •   9/11 and the reinvention of the US intelligence community (brookings.edu)

  •   https://www.govinfo.gov/content/pkg/GPO-911REPORT/pdf/GPO-911REPORT.pdf

  •    https://www.nytimes.com/2005/07/28/politics/fbis-translation-backlog-grows.html

  •   https://federalnewsnetwork.com/big-data/2018/09/nga-looks-to-stay-ahead-of-sheer-volume-of-satellite-imagery-data/

  •   https://www.washingtonpost.com/archive/lifestyle/magazine/1990/12/23/gaston-hall/83e9fb42-d6e7-4f7e-89af-bff0d7af2a2f/

  •   See Numbered Page 12; last line of the report. https://www.dni.gov/files/ODNI/documents/AIM-Strategy.pdf

  •   https://www.fedscoop.com/sue-gordon-ai-assurance-security/

  •   https://nationalsecurity.gmu.edu/sue-gordon/

  •   https://www.dni.gov/files/ODNI/documents/AIM-Strategy.pdf

  •   https://www.dni.gov/files/ODNI/documents/AIM-Strategy.pdf

  •   Page 2, under guiding principles https://www.dni.gov/files/ODNI/documents/AIM-Strategy.pdf

  •   https://www.dni.gov/files/ODNI/documents/AI_Ethics_Framework_for_the_Intelligence_Community_10.pdf

  •   https://federalnewsnetwork.com/artificial-intelligence/2020/03/despite-consensus-with-dod-odni-moving-ahead-with-its-own-ai-principles/

  •   https://www.wired.com/story/sue-gordon-us-intelligence-public-private-google-amazon/

  •   Carlini, Nicholas, and David Wagner. "Adversarial examples are not easily detected: Bypassing ten detection methods." Proceedings of the 10th ACM workshop on artificial intelligence and security. 2017.

  •   https://youtu.be/HhY95m-WD_E?t=3408

Chapter 6 - References

  •   https://futureoflife.org/2016/02/09/open-letter-autonomous-weapons-ai-robotics/

  •   https://theintercept.com/2016/10/17/how-israel-became-a-hub-for-surveillance-technology/

  •   https://www.reuters.com/article/iran-nuclear-scientist/iran-says-smart-satellite-controlled-machine-gun-killed-top-nuclear-scientist-idUSKBN28H13F

  •   https://www.nytimes.com/2021/09/18/world/middleeast/iran-nuclear-fakhrizadeh-assassination-israel.html

  •   https://www.reuters.com/article/iran-nuclear-scientist/iran-says-smart-satellite-controlled-machine-gun-killed-top-nuclear-scientist-idUSKBN28H13F

  •   https://www.youtube.com/watch?v=Lu_cDUSHeWc

  •   https://www.theverge.com/2017/9/4/16251226/russia-ai-putin-rule-the-world

  •   https://warontherocks.com/2019/07/russian-ai-enabled-combat-coming-to-a-city-near-you/

  •   https://apps.dtic.mil/sti/citations/AD1151522

  •   https://irp.fas.org/agency/dod/jason/ai-dod.pdf

  •   https://uvasrg.github.io/jason-spring-meeting-adversarial-machine-learning/

  •   https://irp.fas.org/agency/dod/jason/ai-dod.pdf (Appendix A)

  •   https://www.vox.com/21573433/michele-flournoy-secretary-of-defense-joe-biden-profile

  •   https://www.nytimes.com/2020/12/08/us/politics/michele-flournoy-defense-secretary.html

  •   https://cset.georgetown.edu/wp-content/uploads/Building-Trust-Through-Testing.pdf

  •   https://spectrum.ieee.org/artificial-intelligence-index

  •   https://oecd.ai/en/dashboards/policy-instruments/Emerging_technology_regulation

  •   https://www.acsac.org/2001/papers/110.pdf

  •   https://www.ieee-security.org/TC/SP2006/sp06hotel.html

  •   https://www.cl.cam.ac.uk/~rja14/Papers/econ_acsac2012.pdf

  •   https://www.hoover.org/research/flat-light

  •   https://fin.plaid.com/articles/what-is-pci/

  •   https://aibusiness.com/document.asp?doc_id=761881

  •   https://aibusiness.com/document.asp?doc_id=761881

  •   https://www.wired.com/story/trumps-salvo-against-china-targets-ai-firms/

  •   https://www.wired.com/story/baidu-breaks-ai-alliance-strained-us-china-ties/

  •   Nativi, S. and De Nigris, S., AI Standardisation Landscape: state of play and link to the EC proposal for an AI regulatory framework, EUR 30772 EN, Publications Office of the European Union, Luxembourg, 2021, ISBN 978-92-76-40325-8, doi:10.2760/376602, JRC125952.

  •   https://security.googleblog.com/2019/05/new-research-how-effective-is-basic.html#:~:text=We%20found%20that%20an%20SMS,and%2090%25%20of%20targeted%20attacks.

  •   https://www.jdsupra.com/legalnews/using-multi-factor-authentication-as-a-2167531/

  •   https://hbr.org/2020/04/the-case-for-ai-insurance

  •   Wolff, Josephine. Cyberinsurance Policy: Rethinking Risk in an Age of Ransomware, Computer Fraud, Data Breaches, and Cyberattacks. MIT Press, 2022.

  •   https://www.technologyreview.com/2022/05/13/1052223/guide-ai-act-europe/

  •   https://www.buzzfeednews.com/article/nicolenguyen/what-is-gdpr (see note under tweet by Aaron Levie)

  •   https://www.enforcementtracker.com/?insights (See Cumulative fines)

  •   https://venturebeat.com/ai/eu-proposes-strict-ai-rules-with-fines-up-to-6-for-violations/

  •   https://www.fda.gov/medical-devices/software-medical-device-samd/artificial-intelligence-and-machine-learning-aiml-enabled-medical-devices

  •   https://www.cnn.com/2021/10/13/politics/black-latinx-incarcerated-more/index.html

  •   https://naacp.org/resources/criminal-justice-fact-sheet

  •   https://www.usenix.org/conference/usenixsecurity21/presentation/severi

  •   https://www.eff.org/press/releases/researchers-targeting-ai-bias-sex-worker-advocate-and-global-internet-freedom

  •   https://www.wired.com/story/wrongful-arrests-ai-derailed-3-mens-lives/

  •   https://www.reuters.com/technology/exclusive-amazon-extends-moratorium-police-use-facial-recognition-software-2021-05-18/

  •   https://www.nytimes.com/2022/06/21/technology/microsoft-facial-recognition.html

  •   "Fairness through robustness: Investigating robustness disparity in deep learning." Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency. 2021.

  •   Xu, Han, et al. "To be robust or to be fair: Towards fairness in adversarial training." International Conference on Machine Learning. PMLR, 2021

  •   https://hbr.org/2019/12/the-ai-transparency-paradox

  •   https://www.washingtonpost.com/technology/2021/12/21/ces-covid/

  • https://ai.google/responsibilities/responsible-ai-practices/?category=security

  •   Cohen, Julie E. Between truth and power. Oxford University Press, 2019.

  •   https://www.forbes.com/sites/oliversmith/2018/05/02/the-gdpr-racket-whos-making-money-from-this-9bn-business-shakedown/?sh=6709f53634a2

  •   https://www.forbes.com/sites/oliversmith/2018/05/02/the-gdpr-racket-whos-making-money-from-this-9bn-business-shakedown/?sh=6709f53634a2

  •   https://standardscatalog.ul.com/Catalog.aspx https://www.iso.org/store.html

  •   https://www2.datainnovation.org/2021-aia-costs.pdf

  •   https://www.theverge.com/2013/11/23/5135258/nhtsa-tesla-star-safety-advertising-guidelines

  •   https://www.nytimes.com/2021/12/06/technology/tesla-autopilot-elon-musk.html

  •   https://calteches.library.caltech.edu/51/2/CargoCult.htm

  •   https://law.yale.edu/sites/default/files/area/center/isp/documents/algorithms_and_economic_justice_master_final.pdf (Page 39)

  •   Li, Tiffany C. "Algorithmic Destruction." SMU Law Review, Forthcoming (2022).

  •   https://www.ncsc.gov.uk/blog-post/introducing-our-new-machine-learning-security-principles

Chapter 7 - References

  •   https://www.washingtonpost.com/sf/business/2015/06/22/net-of-insecurity-part-3/

  •   Tetlock, Philip E., and Dan Gardner. Superforecasting: The art and science of prediction. Random House, 2016.

  •   https://www.ncsc.gov.uk/collection/machine-learning

  •   https://www.armed-services.senate.gov/imo/media/doc/22-36_05-03-2022.pdf

  •   https://www.nscai.gov/wp-content/uploads/2021/03/Full-Report-Digital-1.pdf (Page 52, under Adversarial AI)

  •   https://www.geekwire.com/2021/survey-suggests-84-of-americans-are-illiterate-about-ai-so-heres-a-quiz-to-test-your-own-ai-iq/

  •   https://hai.stanford.edu/summary-ai-provisions-national-defense-authorization-act-2022

  •   https://karpathy.medium.com/software-2-0-a64152b37c35

  •   https://lifelock.norton.com/learn/data-breaches/history-of-data-breaches

  •   https://www.mandiant.com/resources/apt1-exposing-one-of-chinas-cyber-espionage-units

  •   https://threatpost.com/2013-yahoo-breach-affected-all-3-billion-accounts/128259.

  •   https://www.nytimes.com/2017/10/03/technology/yahoo-hack-3-billion-users.html

  •   https://www.forbes.ru/biznes/475941-sboj-v-rabote-andeks-taksi-vyzval-probki-na-kutuzovskom-prospekte-moskvy

  •   https://www.theverge.com/2022/8/22/23317502/xiaolang-zhang-pleads-guilty-trade-secret-theft-xpeng-self-driving-car

  •   https://electrek.co/2019/07/11/tesla-engineer-autopilot-source-code-icloud/

  •   https://wccftech.com/amd-stolen-gpu-ip-exclusive/

  •   https://www.bloomberg.com/news/articles/2022-02-25/nvidia-is-investigating-cyber-attack-but-business-uninterrupted

  •   https://semianalysis.substack.com/p/nvidia-hacked-a-national-security?s=r

  •   Thompson, Ken. "Reflections on trusting trust." Communications of the ACM 27.8 (1984): 761-763.

  •   https://xkcd.com/2347/

  •   https://www.linuxfoundation.org/tools/census-ii-of-free-and-open-source-software--application-libraries/

  •   https://www.bleepingcomputer.com/news/security/dev-corrupts-npm-libs-colors-and-faker-breaking-thousands-of-apps/

  •   https://www.washingtonpost.com/technology/2021/12/20/log4j-hack-vulnerability-java/

  •   https://blog.checkpoint.com/2021/12/13/the-numbers-behind-a-cyber-pandemic-detailed-dive/

  •   https://healthitsecurity.com/news/41-states-settle-with-amca-over-2019-data-breach-affecting-21m-patients

  •   https://www.forbes.com/sites/forbescommunicationscouncil/2017/05/30/why-customers-dont-trust-e-commerce-what-we-can-do-better/?sh=701dfd4c1b2a

  •   https://cset.georgetown.edu/wp-content/uploads/CSET-AI-Accidents-An-Emerging-Threat.pdf

  •   https://www.bbc.co.uk/pressoffice/pressreleases/stories/2007/11_november/15/newsnight.shtml