{
  "_meta": {
    "name": "TopAIThreats.com Citation Index",
    "description": "Machine-readable index of all citable entities with canonical citation formats.",
    "version": "1.0",
    "generated": "2026-04-17T02:38:07.493Z",
    "total_entities": 369,
    "url": "https://topaithreats.com",
    "license": "CC BY 4.0"
  },
  "incidents": [
    {
      "cite_id": "INC-26-0097",
      "type": "incident",
      "title": "Oracle Cuts 20,000–30,000 Jobs to Fund $50B AI Infrastructure Push (2026)",
      "url": "https://topaithreats.com/incidents/INC-26-0097-oracle-ai-infrastructure-mass-layoffs/",
      "date_occurred": "2026-03-31",
      "last_updated": "2026-04-09",
      "severity": "critical",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Oracle Cuts 20,000–30,000 Jobs to Fund $50B AI Infrastructure Push (2026)\" (INC-26-0097), https://topaithreats.com/incidents/INC-26-0097-oracle-ai-infrastructure-mass-layoffs/, last updated 2026-04-09."
    },
    {
      "cite_id": "INC-26-0074",
      "type": "incident",
      "title": "Claude Mythos Model Leak — CMS Error Exposes Draft Blog Describing 'Unprecedented Cybersecurity Risks'",
      "url": "https://topaithreats.com/incidents/INC-26-0074-claude-mythos-model-leak/",
      "date_occurred": "2026-03-27",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Claude Mythos Model Leak — CMS Error Exposes Draft Blog Describing 'Unprecedented Cybersecurity Risks'\" (INC-26-0074), https://topaithreats.com/incidents/INC-26-0074-claude-mythos-model-leak/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0015",
      "type": "incident",
      "title": "TeamPCP Compromises LiteLLM via Poisoned Trivy Security Scanner",
      "url": "https://topaithreats.com/incidents/INC-26-0015-litellm-supply-chain-compromise/",
      "date_occurred": "2026-03-24",
      "last_updated": "2026-03-29",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"TeamPCP Compromises LiteLLM via Poisoned Trivy Security Scanner\" (INC-26-0015), https://topaithreats.com/incidents/INC-26-0015-litellm-supply-chain-compromise/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0059",
      "type": "incident",
      "title": "OpenAI Shuts Down Sora Video Generator — Celebrity Deepfakes and $15M/Day Losses",
      "url": "https://topaithreats.com/incidents/INC-26-0059-sora-shutdown-deepfakes-losses/",
      "date_occurred": "2026-03-24",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"OpenAI Shuts Down Sora Video Generator — Celebrity Deepfakes and $15M/Day Losses\" (INC-26-0059), https://topaithreats.com/incidents/INC-26-0059-sora-shutdown-deepfakes-losses/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0094",
      "type": "incident",
      "title": "White House AI Framework Calls on Congress to Preempt State AI Laws, Leverages Federal Funding",
      "url": "https://topaithreats.com/incidents/INC-26-0094-trump-ai-state-law-preemption/",
      "date_occurred": "2026-03-20",
      "last_updated": "2026-04-06",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"White House AI Framework Calls on Congress to Preempt State AI Laws, Leverages Federal Funding\" (INC-26-0094), https://topaithreats.com/incidents/INC-26-0094-trump-ai-state-law-preemption/, last updated 2026-04-06."
    },
    {
      "cite_id": "INC-26-0043",
      "type": "incident",
      "title": "Meta Internal AI Agent Causes Sev-1 Data Exposure and VP Agent Mass-Deletes Emails Ignoring Stop Commands",
      "url": "https://topaithreats.com/incidents/INC-26-0043-meta-sev1-ai-agent-data-exposure/",
      "date_occurred": "2026-03-18",
      "last_updated": "2026-03-29",
      "severity": "critical",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Meta Internal AI Agent Causes Sev-1 Data Exposure and VP Agent Mass-Deletes Emails Ignoring Stop Commands\" (INC-26-0043), https://topaithreats.com/incidents/INC-26-0043-meta-sev1-ai-agent-data-exposure/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0065",
      "type": "incident",
      "title": "Danny Bones — First AI Slopaganda Influencer Funded by Political Party (UK)",
      "url": "https://topaithreats.com/incidents/INC-26-0065-danny-bones-ai-slopaganda/",
      "date_occurred": "2026-03-12",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Danny Bones — First AI Slopaganda Influencer Funded by Political Party (UK)\" (INC-26-0065), https://topaithreats.com/incidents/INC-26-0065-danny-bones-ai-slopaganda/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0047",
      "type": "incident",
      "title": "Federal Judge Orders UnitedHealth to Disclose nH Predict AI Denial Algorithm with Alleged 90% Error Rate",
      "url": "https://topaithreats.com/incidents/INC-26-0047-unitedhealth-nh-predict-court-order/",
      "date_occurred": "2026-03-09",
      "last_updated": "2026-03-29",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Federal Judge Orders UnitedHealth to Disclose nH Predict AI Denial Algorithm with Alleged 90% Error Rate\" (INC-26-0047), https://topaithreats.com/incidents/INC-26-0047-unitedhealth-nh-predict-court-order/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0072",
      "type": "incident",
      "title": "Operation Alice — 373K Dark Web CSAM Sites Taken Down Across 23 Countries",
      "url": "https://topaithreats.com/incidents/INC-26-0072-operation-alice-csam-takedown/",
      "date_occurred": "2026-03-09",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Operation Alice — 373K Dark Web CSAM Sites Taken Down Across 23 Countries\" (INC-26-0072), https://topaithreats.com/incidents/INC-26-0072-operation-alice-csam-takedown/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0091",
      "type": "incident",
      "title": "Workday AI Hiring Bias Class Action — African-American Applicant Rejected Dozens of Times Across Employers",
      "url": "https://topaithreats.com/incidents/INC-26-0091-workday-ai-hiring-bias-class-action/",
      "date_occurred": "2026-03-07",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Workday AI Hiring Bias Class Action — African-American Applicant Rejected Dozens of Times Across Employers\" (INC-26-0091), https://topaithreats.com/incidents/INC-26-0091-workday-ai-hiring-bias-class-action/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0095",
      "type": "incident",
      "title": "OpenAI Robotics Lead Resigns Over Pentagon Deal, Citing Surveillance and Lethal Autonomy Concerns",
      "url": "https://topaithreats.com/incidents/INC-26-0095-openai-kalinowski-resignation/",
      "date_occurred": "2026-03-07",
      "last_updated": "2026-04-06",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"OpenAI Robotics Lead Resigns Over Pentagon Deal, Citing Surveillance and Lethal Autonomy Concerns\" (INC-26-0095), https://topaithreats.com/incidents/INC-26-0095-openai-kalinowski-resignation/, last updated 2026-04-06."
    },
    {
      "cite_id": "INC-26-0042",
      "type": "incident",
      "title": "North Korean IT Worker Deepfake Fraud Network Generates $500M Annually for WMD Programs — OFAC Sanctions Imposed",
      "url": "https://topaithreats.com/incidents/INC-26-0042-dprk-deepfake-it-worker-fraud/",
      "date_occurred": "2026-03",
      "last_updated": "2026-03-29",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"North Korean IT Worker Deepfake Fraud Network Generates $500M Annually for WMD Programs — OFAC Sanctions Imposed\" (INC-26-0042), https://topaithreats.com/incidents/INC-26-0042-dprk-deepfake-it-worker-fraud/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0051",
      "type": "incident",
      "title": "Judge Orders OpenAI to Disclose 20 Million Chat Logs as Copyright Litigation Escalates",
      "url": "https://topaithreats.com/incidents/INC-26-0051-openai-copyright-chat-logs-ordered/",
      "date_occurred": "2026-03",
      "last_updated": "2026-03-29",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Judge Orders OpenAI to Disclose 20 Million Chat Logs as Copyright Litigation Escalates\" (INC-26-0051), https://topaithreats.com/incidents/INC-26-0051-openai-copyright-chat-logs-ordered/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0066",
      "type": "incident",
      "title": "ACLU Files Complaint — HireVue AI Discriminated Against Deaf Indigenous Worker in Promotion Decision",
      "url": "https://topaithreats.com/incidents/INC-26-0066-hirevue-deaf-indigenous-discrimination/",
      "date_occurred": "2026-03",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"ACLU Files Complaint — HireVue AI Discriminated Against Deaf Indigenous Worker in Promotion Decision\" (INC-26-0066), https://topaithreats.com/incidents/INC-26-0066-hirevue-deaf-indigenous-discrimination/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0075",
      "type": "incident",
      "title": "Canada Immigration AI Hallucinated Job Duties — PhD Immunologist Denied Permanent Residency",
      "url": "https://topaithreats.com/incidents/INC-26-0075-canada-immigration-ai-hallucinated-duties/",
      "date_occurred": "2026-03",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Canada Immigration AI Hallucinated Job Duties — PhD Immunologist Denied Permanent Residency\" (INC-26-0075), https://topaithreats.com/incidents/INC-26-0075-canada-immigration-ai-hallucinated-duties/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0086",
      "type": "incident",
      "title": "North Korea 'AI Fake Applicant' Campaign — Deepfake Video Interviews to Infiltrate Western Companies",
      "url": "https://topaithreats.com/incidents/INC-26-0086-nk-deepfake-job-interviews/",
      "date_occurred": "2026-03",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"North Korea 'AI Fake Applicant' Campaign — Deepfake Video Interviews to Infiltrate Western Companies\" (INC-26-0086), https://topaithreats.com/incidents/INC-26-0086-nk-deepfake-job-interviews/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0087",
      "type": "incident",
      "title": "Context Hub Documentation Poisoning — AI Coding Assistants Write Malicious Code 100% of Time from Poisoned Docs",
      "url": "https://topaithreats.com/incidents/INC-26-0087-context-hub-documentation-poisoning/",
      "date_occurred": "2026-03",
      "last_updated": "2026-03-29",
      "severity": "medium",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Context Hub Documentation Poisoning — AI Coding Assistants Write Malicious Code 100% of Time from Poisoned Docs\" (INC-26-0087), https://topaithreats.com/incidents/INC-26-0087-context-hub-documentation-poisoning/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0089",
      "type": "incident",
      "title": "Claude Code 'Claudy Day' Vulnerability Chain — Silent Data Exfiltration via Prompt Injection",
      "url": "https://topaithreats.com/incidents/INC-26-0089-claude-claudy-day-vulnerabilities/",
      "date_occurred": "2026-03",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Claude Code 'Claudy Day' Vulnerability Chain — Silent Data Exfiltration via Prompt Injection\" (INC-26-0089), https://topaithreats.com/incidents/INC-26-0089-claude-claudy-day-vulnerabilities/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0096",
      "type": "incident",
      "title": "Alibaba ROME AI Agent Autonomously Mines Cryptocurrency and Opens SSH Tunnel",
      "url": "https://topaithreats.com/incidents/INC-26-0096-alibaba-rome-agent-crypto-mining/",
      "date_occurred": "2026-03",
      "last_updated": "2026-04-07",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Alibaba ROME AI Agent Autonomously Mines Cryptocurrency and Opens SSH Tunnel\" (INC-26-0096), https://topaithreats.com/incidents/INC-26-0096-alibaba-rome-agent-crypto-mining/, last updated 2026-04-07."
    },
    {
      "cite_id": "INC-26-0029",
      "type": "incident",
      "title": "US Military AI Targeting Platform Fed Stale Data Contributes to Strike on Iranian Elementary School",
      "url": "https://topaithreats.com/incidents/INC-26-0029-us-military-ai-targeting-school-strike/",
      "date_occurred": "2026-02-28",
      "last_updated": "2026-04-02",
      "severity": "critical",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"US Military AI Targeting Platform Fed Stale Data Contributes to Strike on Iranian Elementary School\" (INC-26-0029), https://topaithreats.com/incidents/INC-26-0029-us-military-ai-targeting-school-strike/, last updated 2026-04-02."
    },
    {
      "cite_id": "INC-26-0027",
      "type": "incident",
      "title": "Block (Square) Cuts Approximately 4,000 Jobs as AI Replaces Customer Service Workforce",
      "url": "https://topaithreats.com/incidents/INC-26-0027-block-ai-mass-layoffs/",
      "date_occurred": "2026-02-26",
      "last_updated": "2026-04-02",
      "severity": "critical",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Block (Square) Cuts Approximately 4,000 Jobs as AI Replaces Customer Service Workforce\" (INC-26-0027), https://topaithreats.com/incidents/INC-26-0027-block-ai-mass-layoffs/, last updated 2026-04-02."
    },
    {
      "cite_id": "INC-26-0092",
      "type": "incident",
      "title": "Anthropic Removes Categorical Safety Pause Trigger from Responsible Scaling Policy",
      "url": "https://topaithreats.com/incidents/INC-26-0092-anthropic-rsp-safety-pledge-dropped/",
      "date_occurred": "2026-02-24",
      "last_updated": "2026-04-06",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Anthropic Removes Categorical Safety Pause Trigger from Responsible Scaling Policy\" (INC-26-0092), https://topaithreats.com/incidents/INC-26-0092-anthropic-rsp-safety-pledge-dropped/, last updated 2026-04-06."
    },
    {
      "cite_id": "INC-26-0003",
      "type": "incident",
      "title": "Tesla Autopilot involved in 13 fatal crashes, US regulator finds",
      "url": "https://topaithreats.com/incidents/INC-26-0003-tesla-autopilot-involved-in-13-fatal-crashes-us-regulator-fi/",
      "date_occurred": "2026-02-20",
      "last_updated": "2026-03-29",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Tesla Autopilot involved in 13 fatal crashes, US regulator finds\" (INC-26-0003), https://topaithreats.com/incidents/INC-26-0003-tesla-autopilot-involved-in-13-fatal-crashes-us-regulator-fi/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0004",
      "type": "incident",
      "title": "Individual jailed for online gambling fraud using stolen identities",
      "url": "https://topaithreats.com/incidents/INC-26-0004-individual-jailed-for-online-gambling-fraud-using-stolen-ide/",
      "date_occurred": "2026-02-20",
      "last_updated": "2026-02-20",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Individual jailed for online gambling fraud using stolen identities\" (INC-26-0004), https://topaithreats.com/incidents/INC-26-0004-individual-jailed-for-online-gambling-fraud-using-stolen-ide/, last updated 2026-02-20."
    },
    {
      "cite_id": "INC-26-0001",
      "type": "incident",
      "title": "Disrupting malicious uses of AI: June 2025 | OpenAI",
      "url": "https://topaithreats.com/incidents/INC-26-0001-disrupting-malicious-uses-of-ai-june-2025-openai/",
      "date_occurred": "2026-02-18",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Disrupting malicious uses of AI: June 2025 | OpenAI\" (INC-26-0001), https://topaithreats.com/incidents/INC-26-0001-disrupting-malicious-uses-of-ai-june-2025-openai/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0032",
      "type": "incident",
      "title": "OpenAI Dissolves Second Safety Team, Removes 'Safely' from Mission in IRS Filing, Restructures as Public Benefit Corporation",
      "url": "https://topaithreats.com/incidents/INC-26-0032-openai-governance-safety-crisis/",
      "date_occurred": "2026-02-11",
      "last_updated": "2026-04-03",
      "severity": "critical",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"OpenAI Dissolves Second Safety Team, Removes 'Safely' from Mission in IRS Filing, Restructures as Public Benefit Corporation\" (INC-26-0032), https://topaithreats.com/incidents/INC-26-0032-openai-governance-safety-crisis/, last updated 2026-04-03."
    },
    {
      "cite_id": "INC-26-0026",
      "type": "incident",
      "title": "Tumbler Ridge Mass Shooting — ChatGPT Used in Attack Planning",
      "url": "https://topaithreats.com/incidents/INC-26-0026-tumbler-ridge-mass-shooting-chatgpt/",
      "date_occurred": "2026-02-10",
      "last_updated": "2026-04-02",
      "severity": "critical",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Tumbler Ridge Mass Shooting — ChatGPT Used in Attack Planning\" (INC-26-0026), https://topaithreats.com/incidents/INC-26-0026-tumbler-ridge-mass-shooting-chatgpt/, last updated 2026-04-02."
    },
    {
      "cite_id": "INC-26-0061",
      "type": "incident",
      "title": "OpenClaw AI Agent Autonomously Retaliates Against Matplotlib Maintainer — First AI Retaliation Incident",
      "url": "https://topaithreats.com/incidents/INC-26-0061-openclaw-matplotlib-retaliation/",
      "date_occurred": "2026-02-10",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"OpenClaw AI Agent Autonomously Retaliates Against Matplotlib Maintainer — First AI Retaliation Incident\" (INC-26-0061), https://topaithreats.com/incidents/INC-26-0061-openclaw-matplotlib-retaliation/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0025",
      "type": "incident",
      "title": "Microsoft GRP-Obliteration: Single Prompt Reverses Safety Alignment Across 15 LLMs",
      "url": "https://topaithreats.com/incidents/INC-26-0025-grp-obliteration-safety-reversal/",
      "date_occurred": "2026-02-09",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Microsoft GRP-Obliteration: Single Prompt Reverses Safety Alignment Across 15 LLMs\" (INC-26-0025), https://topaithreats.com/incidents/INC-26-0025-grp-obliteration-safety-reversal/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0058",
      "type": "incident",
      "title": "Trump Shares Racist AI-Generated Deepfake of Obamas — Remains Online 12 Hours",
      "url": "https://topaithreats.com/incidents/INC-26-0058-trump-deepfake-obamas/",
      "date_occurred": "2026-02-05",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Trump Shares Racist AI-Generated Deepfake of Obamas — Remains Online 12 Hours\" (INC-26-0058), https://topaithreats.com/incidents/INC-26-0058-trump-deepfake-obamas/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0078",
      "type": "incident",
      "title": "International AI Safety Report 2026 — 100+ Experts Warn of Escalating Risks, Safeguards 'Will Likely Fail'",
      "url": "https://topaithreats.com/incidents/INC-26-0078-international-ai-safety-report-2026/",
      "date_occurred": "2026-02-03",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"International AI Safety Report 2026 — 100+ Experts Warn of Escalating Risks, Safeguards 'Will Likely Fail'\" (INC-26-0078), https://topaithreats.com/incidents/INC-26-0078-international-ai-safety-report-2026/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0006",
      "type": "incident",
      "title": "AI Recommendation Poisoning via 'Summarize with AI' Buttons (31 Companies)",
      "url": "https://topaithreats.com/incidents/INC-26-0006-ai-recommendation-poisoning-summarize-buttons/",
      "date_occurred": "2026-02",
      "last_updated": "2026-03-07",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"AI Recommendation Poisoning via 'Summarize with AI' Buttons (31 Companies)\" (INC-26-0006), https://topaithreats.com/incidents/INC-26-0006-ai-recommendation-poisoning-summarize-buttons/, last updated 2026-03-07."
    },
    {
      "cite_id": "INC-26-0007",
      "type": "incident",
      "title": "Unit 42 Demonstrates Persistent Memory Injection in Amazon Bedrock Agents",
      "url": "https://topaithreats.com/incidents/INC-26-0007-unit42-bedrock-agent-memory-injection-poc/",
      "date_occurred": "2026-02",
      "last_updated": "2026-03-07",
      "severity": "medium",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Unit 42 Demonstrates Persistent Memory Injection in Amazon Bedrock Agents\" (INC-26-0007), https://topaithreats.com/incidents/INC-26-0007-unit42-bedrock-agent-memory-injection-poc/, last updated 2026-03-07."
    },
    {
      "cite_id": "INC-26-0014",
      "type": "incident",
      "title": "CodeWall AI Agent Breaches McKinsey Lilli Platform via SQL Injection",
      "url": "https://topaithreats.com/incidents/INC-26-0014-mckinsey-lilli-ai-platform-breach/",
      "date_occurred": "2026-02",
      "last_updated": "2026-03-29",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"CodeWall AI Agent Breaches McKinsey Lilli Platform via SQL Injection\" (INC-26-0014), https://topaithreats.com/incidents/INC-26-0014-mckinsey-lilli-ai-platform-breach/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0016",
      "type": "incident",
      "title": "Clinejection: Prompt Injection in Cline AI Bot Enables npm Supply Chain Attack",
      "url": "https://topaithreats.com/incidents/INC-26-0016-clinejection-cline-supply-chain-attack/",
      "date_occurred": "2026-02",
      "last_updated": "2026-03-29",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Clinejection: Prompt Injection in Cline AI Bot Enables npm Supply Chain Attack\" (INC-26-0016), https://topaithreats.com/incidents/INC-26-0016-clinejection-cline-supply-chain-attack/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0021",
      "type": "incident",
      "title": "ModelScope MS-Agent Shell Tool Command Injection Vulnerability",
      "url": "https://topaithreats.com/incidents/INC-26-0021-ms-agent-shell-command-injection/",
      "date_occurred": "2026-02",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"ModelScope MS-Agent Shell Tool Command Injection Vulnerability\" (INC-26-0021), https://topaithreats.com/incidents/INC-26-0021-ms-agent-shell-command-injection/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0019",
      "type": "incident",
      "title": "MCP TypeScript SDK Race Condition Leaks Data Across Client Boundaries",
      "url": "https://topaithreats.com/incidents/INC-26-0019-mcp-sdk-cross-client-data-leak/",
      "date_occurred": "2026-02",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"MCP TypeScript SDK Race Condition Leaks Data Across Client Boundaries\" (INC-26-0019), https://topaithreats.com/incidents/INC-26-0019-mcp-sdk-cross-client-data-leak/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0028",
      "type": "incident",
      "title": "Anthropic Blacklisted by US Government After Refusing Autonomous Weapons and Mass Surveillance Contracts",
      "url": "https://topaithreats.com/incidents/INC-26-0028-anthropic-pentagon-blacklisting-standoff/",
      "date_occurred": "2026-02",
      "last_updated": "2026-04-02",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Anthropic Blacklisted by US Government After Refusing Autonomous Weapons and Mass Surveillance Contracts\" (INC-26-0028), https://topaithreats.com/incidents/INC-26-0028-anthropic-pentagon-blacklisting-standoff/, last updated 2026-04-02."
    },
    {
      "cite_id": "INC-26-0034",
      "type": "incident",
      "title": "OpenAI Pentagon Contract Triggers #QuitGPT Movement with 295% Uninstall Surge and 2.5 Million Participants",
      "url": "https://topaithreats.com/incidents/INC-26-0034-openai-pentagon-quitgpt-revolt/",
      "date_occurred": "2026-02",
      "last_updated": "2026-04-03",
      "severity": "critical",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"OpenAI Pentagon Contract Triggers #QuitGPT Movement with 295% Uninstall Surge and 2.5 Million Participants\" (INC-26-0034), https://topaithreats.com/incidents/INC-26-0034-openai-pentagon-quitgpt-revolt/, last updated 2026-04-03."
    },
    {
      "cite_id": "INC-26-0036",
      "type": "incident",
      "title": "MizarVision Chinese AI Startup Publishes Real-Time US Military Intelligence via Satellite Imagery",
      "url": "https://topaithreats.com/incidents/INC-26-0036-mizarvision-us-military-intelligence-exposure/",
      "date_occurred": "2026-02",
      "last_updated": "2026-04-03",
      "severity": "critical",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"MizarVision Chinese AI Startup Publishes Real-Time US Military Intelligence via Satellite Imagery\" (INC-26-0036), https://topaithreats.com/incidents/INC-26-0036-mizarvision-us-military-intelligence-exposure/, last updated 2026-04-03."
    },
    {
      "cite_id": "INC-26-0041",
      "type": "incident",
      "title": "xAI Colossus Data Center Operates 27 Unpermitted Gas Turbines in Memphis While Consuming 1.3 Million Gallons of Water Daily",
      "url": "https://topaithreats.com/incidents/INC-26-0041-xai-colossus-environmental-crisis/",
      "date_occurred": "2026-02",
      "last_updated": "2026-03-29",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"xAI Colossus Data Center Operates 27 Unpermitted Gas Turbines in Memphis While Consuming 1.3 Million Gallons of Water Daily\" (INC-26-0041), https://topaithreats.com/incidents/INC-26-0041-xai-colossus-environmental-crisis/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0070",
      "type": "incident",
      "title": "Claude Safety Testing Reveals Extreme Self-Preservation Behavior Including Blackmail Suggestions",
      "url": "https://topaithreats.com/incidents/INC-26-0070-claude-safety-test-blackmail-behavior/",
      "date_occurred": "2026-02",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Claude Safety Testing Reveals Extreme Self-Preservation Behavior Including Blackmail Suggestions\" (INC-26-0070), https://topaithreats.com/incidents/INC-26-0070-claude-safety-test-blackmail-behavior/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0073",
      "type": "incident",
      "title": "ChatGPT Ads Launch Triggers Researcher Resignation and Anthropic Counter-Marketing",
      "url": "https://topaithreats.com/incidents/INC-26-0073-chatgpt-ads-launch-backlash/",
      "date_occurred": "2026-02",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"ChatGPT Ads Launch Triggers Researcher Resignation and Anthropic Counter-Marketing\" (INC-26-0073), https://topaithreats.com/incidents/INC-26-0073-chatgpt-ads-launch-backlash/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0040",
      "type": "incident",
      "title": "Universal Music, Concord, and ABKCO Sue Anthropic for $3 Billion Over Alleged Training Data Piracy",
      "url": "https://topaithreats.com/incidents/INC-26-0040-universal-music-anthropic-copyright-lawsuit/",
      "date_occurred": "2026-01-28",
      "last_updated": "2026-04-03",
      "severity": "critical",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Universal Music, Concord, and ABKCO Sue Anthropic for $3 Billion Over Alleged Training Data Piracy\" (INC-26-0040), https://topaithreats.com/incidents/INC-26-0040-universal-music-anthropic-copyright-lawsuit/, last updated 2026-04-03."
    },
    {
      "cite_id": "INC-26-0044",
      "type": "incident",
      "title": "Waymo Robotaxi Strikes Child Near Elementary School in Santa Monica — NHTSA Investigation Opened",
      "url": "https://topaithreats.com/incidents/INC-26-0044-waymo-robotaxi-strikes-child/",
      "date_occurred": "2026-01-23",
      "last_updated": "2026-03-29",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Waymo Robotaxi Strikes Child Near Elementary School in Santa Monica — NHTSA Investigation Opened\" (INC-26-0044), https://topaithreats.com/incidents/INC-26-0044-waymo-robotaxi-strikes-child/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0035",
      "type": "incident",
      "title": "Grok AI Integrated into Pentagon Military Networks During CSAM Scandal",
      "url": "https://topaithreats.com/incidents/INC-26-0035-grok-pentagon-military-deployment/",
      "date_occurred": "2026-01-12",
      "last_updated": "2026-04-03",
      "severity": "critical",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Grok AI Integrated into Pentagon Military Networks During CSAM Scandal\" (INC-26-0035), https://topaithreats.com/incidents/INC-26-0035-grok-pentagon-military-deployment/, last updated 2026-04-03."
    },
    {
      "cite_id": "INC-26-0045",
      "type": "incident",
      "title": "Character.AI Settles Five Teen Suicide Lawsuits as Kentucky Becomes First State to Sue",
      "url": "https://topaithreats.com/incidents/INC-26-0045-character-ai-teen-suicide-legal-reckoning/",
      "date_occurred": "2026-01-07",
      "last_updated": "2026-03-29",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Character.AI Settles Five Teen Suicide Lawsuits as Kentucky Becomes First State to Sue\" (INC-26-0045), https://topaithreats.com/incidents/INC-26-0045-character-ai-teen-suicide-legal-reckoning/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0005",
      "type": "incident",
      "title": "AI impacting labor market like a tsunami as layoff fears mount",
      "url": "https://topaithreats.com/incidents/INC-26-0005-ai-impacting-labor-market-like-a-tsunami-as-layoff-fears-mou/",
      "date_occurred": "2026-01",
      "last_updated": "2026-02-20",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"AI impacting labor market like a tsunami as layoff fears mount\" (INC-26-0005), https://topaithreats.com/incidents/INC-26-0005-ai-impacting-labor-market-like-a-tsunami-as-layoff-fears-mou/, last updated 2026-02-20."
    },
    {
      "cite_id": "INC-26-0010",
      "type": "incident",
      "title": "New Zealand AI News Pages Flood Facebook with Rewritten Stories and Synthetic Images",
      "url": "https://topaithreats.com/incidents/INC-26-0010-nz-news-hub-ai-rewritten-news/",
      "date_occurred": "2026-01",
      "last_updated": "2026-03-13",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"New Zealand AI News Pages Flood Facebook with Rewritten Stories and Synthetic Images\" (INC-26-0010), https://topaithreats.com/incidents/INC-26-0010-nz-news-hub-ai-rewritten-news/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-26-0013",
      "type": "incident",
      "title": "OpenClaw AI Agent Platform Hit by Critical Vulnerability and Supply Chain Campaign",
      "url": "https://topaithreats.com/incidents/INC-26-0013-openclaw-ai-agent-security-crisis/",
      "date_occurred": "2026-01",
      "last_updated": "2026-03-29",
      "severity": "critical",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"OpenClaw AI Agent Platform Hit by Critical Vulnerability and Supply Chain Campaign\" (INC-26-0013), https://topaithreats.com/incidents/INC-26-0013-openclaw-ai-agent-security-crisis/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0017",
      "type": "incident",
      "title": "Claude Code Remote Code Execution and API Key Exfiltration Vulnerabilities",
      "url": "https://topaithreats.com/incidents/INC-26-0017-claude-code-rce-vulnerabilities/",
      "date_occurred": "2026-01",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Claude Code Remote Code Execution and API Key Exfiltration Vulnerabilities\" (INC-26-0017), https://topaithreats.com/incidents/INC-26-0017-claude-code-rce-vulnerabilities/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0020",
      "type": "incident",
      "title": "AI-Generated Code Vulnerability Surge: 74 Confirmed CVEs Traced to Coding Assistants",
      "url": "https://topaithreats.com/incidents/INC-26-0020-ai-generated-code-vulnerability-explosion/",
      "date_occurred": "2026-01",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"AI-Generated Code Vulnerability Surge: 74 Confirmed CVEs Traced to Coding Assistants\" (INC-26-0020), https://topaithreats.com/incidents/INC-26-0020-ai-generated-code-vulnerability-explosion/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0023",
      "type": "incident",
      "title": "Google Vertex AI Default Configurations Enable Privilege Escalation to Service Agent Roles",
      "url": "https://topaithreats.com/incidents/INC-26-0023-google-vertex-ai-privilege-escalation/",
      "date_occurred": "2026-01",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Google Vertex AI Default Configurations Enable Privilege Escalation to Service Agent Roles\" (INC-26-0023), https://topaithreats.com/incidents/INC-26-0023-google-vertex-ai-privilege-escalation/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0022",
      "type": "incident",
      "title": "Cursor AI Code Editor Shell Built-In Allowlist Bypass Enables Zero-Click RCE",
      "url": "https://topaithreats.com/incidents/INC-26-0022-cursor-ide-prompt-injection-rce/",
      "date_occurred": "2026-01",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Cursor AI Code Editor Shell Built-In Allowlist Bypass Enables Zero-Click RCE\" (INC-26-0022), https://topaithreats.com/incidents/INC-26-0022-cursor-ide-prompt-injection-rce/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0031",
      "type": "incident",
      "title": "ChatGPT Adult Mode Planned Despite Unanimous Safety Advisor Opposition; Feature Paused After Backlash",
      "url": "https://topaithreats.com/incidents/INC-26-0031-chatgpt-adult-mode-safety-crisis/",
      "date_occurred": "2026-01",
      "last_updated": "2026-04-03",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"ChatGPT Adult Mode Planned Despite Unanimous Safety Advisor Opposition; Feature Paused After Backlash\" (INC-26-0031), https://topaithreats.com/incidents/INC-26-0031-chatgpt-adult-mode-safety-crisis/, last updated 2026-04-03."
    },
    {
      "cite_id": "INC-26-0046",
      "type": "incident",
      "title": "LSU AI Cheating Detection Crisis — 1,488 Cases Filed with Disproportionate Impact on Non-Native English Speakers",
      "url": "https://topaithreats.com/incidents/INC-26-0046-lsu-ai-cheating-detection-crisis/",
      "date_occurred": "2026-01",
      "last_updated": "2026-03-29",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"LSU AI Cheating Detection Crisis — 1,488 Cases Filed with Disproportionate Impact on Non-Native English Speakers\" (INC-26-0046), https://topaithreats.com/incidents/INC-26-0046-lsu-ai-cheating-detection-crisis/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0050",
      "type": "incident",
      "title": "AI Healthcare Bias Study — 1.7 Million Responses Show Race-Based Treatment Differences Across 9 AI Programs",
      "url": "https://topaithreats.com/incidents/INC-26-0050-ai-healthcare-bias-race-based-treatment/",
      "date_occurred": "2026-01",
      "last_updated": "2026-03-29",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"AI Healthcare Bias Study — 1.7 Million Responses Show Race-Based Treatment Differences Across 9 AI Programs\" (INC-26-0050), https://topaithreats.com/incidents/INC-26-0050-ai-healthcare-bias-race-based-treatment/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0052",
      "type": "incident",
      "title": "ICE Deploys Warrantless AI Surveillance Combining Palantir, Clearview, Iris Scanning, and Phone Hacking",
      "url": "https://topaithreats.com/incidents/INC-26-0052-ice-warrantless-ai-surveillance/",
      "date_occurred": "2026-01",
      "last_updated": "2026-03-29",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"ICE Deploys Warrantless AI Surveillance Combining Palantir, Clearview, Iris Scanning, and Phone Hacking\" (INC-26-0052), https://topaithreats.com/incidents/INC-26-0052-ice-warrantless-ai-surveillance/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0055",
      "type": "incident",
      "title": "Perplexity Comet AI Browser Enables Zero-Click Credential Theft via Prompt Injection",
      "url": "https://topaithreats.com/incidents/INC-26-0055-perplexity-comet-credential-theft/",
      "date_occurred": "2026-01",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Perplexity Comet AI Browser Enables Zero-Click Credential Theft via Prompt Injection\" (INC-26-0055), https://topaithreats.com/incidents/INC-26-0055-perplexity-comet-credential-theft/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0056",
      "type": "incident",
      "title": "Eightfold AI Sued for Creating Secret Dossiers on 1 Billion+ Workers with Hidden Scoring",
      "url": "https://topaithreats.com/incidents/INC-26-0056-eightfold-ai-secret-worker-dossiers/",
      "date_occurred": "2026-01",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Eightfold AI Sued for Creating Secret Dossiers on 1 Billion+ Workers with Hidden Scoring\" (INC-26-0056), https://topaithreats.com/incidents/INC-26-0056-eightfold-ai-secret-worker-dossiers/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0062",
      "type": "incident",
      "title": "Google Gemini Tells Student 'Please Die' During Homework Help Session",
      "url": "https://topaithreats.com/incidents/INC-26-0062-gemini-please-die-message/",
      "date_occurred": "2026-01",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Google Gemini Tells Student 'Please Die' During Homework Help Session\" (INC-26-0062), https://topaithreats.com/incidents/INC-26-0062-gemini-please-die-message/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0063",
      "type": "incident",
      "title": "Reno Casino Facial Recognition Wrongful Arrest — '100% Match' Was 4 Inches Shorter with Different Eye Color",
      "url": "https://topaithreats.com/incidents/INC-26-0063-reno-casino-frt-wrongful-arrest/",
      "date_occurred": "2026-01",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Reno Casino Facial Recognition Wrongful Arrest — '100% Match' Was 4 Inches Shorter with Different Eye Color\" (INC-26-0063), https://topaithreats.com/incidents/INC-26-0063-reno-casino-frt-wrongful-arrest/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0069",
      "type": "incident",
      "title": "Grok Inserts 'White Genocide' Conspiracy Theory and Holocaust Denial into Unrelated Queries",
      "url": "https://topaithreats.com/incidents/INC-26-0069-grok-white-genocide-conspiracy/",
      "date_occurred": "2026-01",
      "last_updated": "2026-03-29",
      "severity": "medium",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Grok Inserts 'White Genocide' Conspiracy Theory and Holocaust Denial into Unrelated Queries\" (INC-26-0069), https://topaithreats.com/incidents/INC-26-0069-grok-white-genocide-conspiracy/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0076",
      "type": "incident",
      "title": "ECRI Names AI Chatbot Misuse as #1 Health Technology Hazard for 2026",
      "url": "https://topaithreats.com/incidents/INC-26-0076-ecri-ai-chatbot-health-hazard/",
      "date_occurred": "2026-01",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"ECRI Names AI Chatbot Misuse as #1 Health Technology Hazard for 2026\" (INC-26-0076), https://topaithreats.com/incidents/INC-26-0076-ecri-ai-chatbot-health-hazard/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0083",
      "type": "incident",
      "title": "DeepSeek Mass Government Bans and Publicly Exposed Database with 1M+ Records",
      "url": "https://topaithreats.com/incidents/INC-26-0083-deepseek-mass-bans-exposed-database/",
      "date_occurred": "2026-01",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"DeepSeek Mass Government Bans and Publicly Exposed Database with 1M+ Records\" (INC-26-0083), https://topaithreats.com/incidents/INC-26-0083-deepseek-mass-bans-exposed-database/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0090",
      "type": "incident",
      "title": "AI Deepfakes Surge in 2026 US Midterm Campaigns — Only 28 States Have Disclosure Laws",
      "url": "https://topaithreats.com/incidents/INC-26-0090-ai-deepfakes-2026-midterm-campaigns/",
      "date_occurred": "2026-01",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"AI Deepfakes Surge in 2026 US Midterm Campaigns — Only 28 States Have Disclosure Laws\" (INC-26-0090), https://topaithreats.com/incidents/INC-26-0090-ai-deepfakes-2026-midterm-campaigns/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0068",
      "type": "incident",
      "title": "Palantir ImmigrationOS — ICE Pays $30M for AI System Creating Neighborhood Deportation Maps",
      "url": "https://topaithreats.com/incidents/INC-26-0068-palantir-immigrationos-ice/",
      "date_occurred": "2026",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Palantir ImmigrationOS — ICE Pays $30M for AI System Creating Neighborhood Deportation Maps\" (INC-26-0068), https://topaithreats.com/incidents/INC-26-0068-palantir-immigrationos-ice/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-26-0077",
      "type": "incident",
      "title": "Brazil — 1 Million Schoolchildren Scanned Daily by Facial Recognition Across 1,700+ Schools",
      "url": "https://topaithreats.com/incidents/INC-26-0077-brazil-million-schoolchildren-frt/",
      "date_occurred": "2026",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Brazil — 1 Million Schoolchildren Scanned Daily by Facial Recognition Across 1,700+ Schools\" (INC-26-0077), https://topaithreats.com/incidents/INC-26-0077-brazil-million-schoolchildren-frt/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-25-0048",
      "type": "incident",
      "title": "Australia Scraps AI Advisory Body After 15 Months and $188K, Drops Mandatory AI Guardrails",
      "url": "https://topaithreats.com/incidents/INC-25-0048-australia-scraps-ai-advisory-body/",
      "date_occurred": "2025-12-02",
      "last_updated": "2026-04-06",
      "severity": "medium",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Australia Scraps AI Advisory Body After 15 Months and $188K, Drops Mandatory AI Guardrails\" (INC-25-0048), https://topaithreats.com/incidents/INC-25-0048-australia-scraps-ai-advisory-body/, last updated 2026-04-06."
    },
    {
      "cite_id": "INC-25-0016",
      "type": "incident",
      "title": "Heber City AI Police Report Generates Fictional Content from Background Audio",
      "url": "https://topaithreats.com/incidents/INC-25-0016-heber-city-ai-police-report-hallucination/",
      "date_occurred": "2025-12",
      "last_updated": "2026-03-13",
      "severity": "medium",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Heber City AI Police Report Generates Fictional Content from Background Audio\" (INC-25-0016), https://topaithreats.com/incidents/INC-25-0016-heber-city-ai-police-report-hallucination/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-25-0020",
      "type": "incident",
      "title": "Instacart AI-Driven Algorithmic Price Discrimination",
      "url": "https://topaithreats.com/incidents/INC-25-0020-instacart-algorithmic-price-discrimination/",
      "date_occurred": "2025-12",
      "last_updated": "2026-03-13",
      "severity": "medium",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Instacart AI-Driven Algorithmic Price Discrimination\" (INC-25-0020), https://topaithreats.com/incidents/INC-25-0020-instacart-algorithmic-price-discrimination/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-25-0026",
      "type": "incident",
      "title": "CrimeRadar AI App Sends False Crime Alerts Across U.S. Communities",
      "url": "https://topaithreats.com/incidents/INC-25-0026-crimeradar-ai-false-crime-alerts/",
      "date_occurred": "2025-12",
      "last_updated": "2026-03-13",
      "severity": "medium",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"CrimeRadar AI App Sends False Crime Alerts Across U.S. Communities\" (INC-25-0026), https://topaithreats.com/incidents/INC-25-0026-crimeradar-ai-false-crime-alerts/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-25-0033",
      "type": "incident",
      "title": "Jailbroken Claude AI Used to Breach Mexican Government Agencies",
      "url": "https://topaithreats.com/incidents/INC-25-0033-claude-code-mexico-government-hack/",
      "date_occurred": "2025-12",
      "last_updated": "2026-03-13",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Jailbroken Claude AI Used to Breach Mexican Government Agencies\" (INC-25-0033), https://topaithreats.com/incidents/INC-25-0033-claude-code-mexico-government-hack/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-25-0036",
      "type": "incident",
      "title": "State-Backed Hackers from Four Nations Weaponize Google Gemini for Cyberattack Operations",
      "url": "https://topaithreats.com/incidents/INC-25-0036-state-backed-hackers-weaponize-gemini/",
      "date_occurred": "2025-12",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"State-Backed Hackers from Four Nations Weaponize Google Gemini for Cyberattack Operations\" (INC-25-0036), https://topaithreats.com/incidents/INC-25-0036-state-backed-hackers-weaponize-gemini/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-25-0038",
      "type": "incident",
      "title": "Grok AI Generates 3 Million Sexualized Images Including Approximately 23,000 Depicting Children",
      "url": "https://topaithreats.com/incidents/INC-25-0038-grok-csam-scandal/",
      "date_occurred": "2025-12",
      "last_updated": "2026-04-03",
      "severity": "critical",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Grok AI Generates 3 Million Sexualized Images Including Approximately 23,000 Depicting Children\" (INC-25-0038), https://topaithreats.com/incidents/INC-25-0038-grok-csam-scandal/, last updated 2026-04-03."
    },
    {
      "cite_id": "INC-25-0010",
      "type": "incident",
      "title": "Unit 42 Demonstrates Agent Session Smuggling in A2A Multi-Agent Systems",
      "url": "https://topaithreats.com/incidents/INC-25-0010-unit42-a2a-session-smuggling/",
      "date_occurred": "2025-11",
      "last_updated": "2026-03-10",
      "severity": "medium",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Unit 42 Demonstrates Agent Session Smuggling in A2A Multi-Agent Systems\" (INC-25-0010), https://topaithreats.com/incidents/INC-25-0010-unit42-a2a-session-smuggling/, last updated 2026-03-10."
    },
    {
      "cite_id": "INC-25-0039",
      "type": "incident",
      "title": "ChatGPT 'Suicide Coach' Wrongful Death Lawsuits Reach Eight Cases Including Suicide Lullaby",
      "url": "https://topaithreats.com/incidents/INC-25-0039-chatgpt-suicide-coach-wrongful-death/",
      "date_occurred": "2025-11",
      "last_updated": "2026-04-03",
      "severity": "critical",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"ChatGPT 'Suicide Coach' Wrongful Death Lawsuits Reach Eight Cases Including Suicide Lullaby\" (INC-25-0039), https://topaithreats.com/incidents/INC-25-0039-chatgpt-suicide-coach-wrongful-death/, last updated 2026-04-03."
    },
    {
      "cite_id": "INC-25-0046",
      "type": "incident",
      "title": "OpenAI Mixpanel Vendor Data Breach — Customer Data Exfiltrated via SMS Phishing",
      "url": "https://topaithreats.com/incidents/INC-25-0046-openai-mixpanel-vendor-breach/",
      "date_occurred": "2025-11",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"OpenAI Mixpanel Vendor Data Breach — Customer Data Exfiltrated via SMS Phishing\" (INC-25-0046), https://topaithreats.com/incidents/INC-25-0046-openai-mixpanel-vendor-breach/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-25-0019",
      "type": "incident",
      "title": "AI-Designed Toxin Gene Sequences Bypass DNA Synthesis Screening",
      "url": "https://topaithreats.com/incidents/INC-25-0019-dna-synthesis-toxin-screening-bypass/",
      "date_occurred": "2025-10",
      "last_updated": "2026-03-13",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"AI-Designed Toxin Gene Sequences Bypass DNA Synthesis Screening\" (INC-25-0019), https://topaithreats.com/incidents/INC-25-0019-dna-synthesis-toxin-screening-bypass/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-25-0022",
      "type": "incident",
      "title": "AWS Outage Causes AI-Connected Mattress Malfunctions",
      "url": "https://topaithreats.com/incidents/INC-25-0022-aws-outage-ai-mattress-malfunctions/",
      "date_occurred": "2025-10",
      "last_updated": "2026-03-13",
      "severity": "medium",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"AWS Outage Causes AI-Connected Mattress Malfunctions\" (INC-25-0022), https://topaithreats.com/incidents/INC-25-0022-aws-outage-ai-mattress-malfunctions/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-25-0037",
      "type": "incident",
      "title": "Google Gemini 'Mass Casualty Attack' Coaching Leads to User Death and Lawsuit",
      "url": "https://topaithreats.com/incidents/INC-25-0037-gemini-mass-casualty-suicide-lawsuit/",
      "date_occurred": "2025-10",
      "last_updated": "2026-04-02",
      "severity": "critical",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Google Gemini 'Mass Casualty Attack' Coaching Leads to User Death and Lawsuit\" (INC-25-0037), https://topaithreats.com/incidents/INC-25-0037-gemini-mass-casualty-suicide-lawsuit/, last updated 2026-04-02."
    },
    {
      "cite_id": "INC-25-0001",
      "type": "incident",
      "title": "AI-Orchestrated Cyber Espionage Campaign Against Critical Infrastructure",
      "url": "https://topaithreats.com/incidents/INC-25-0001-ai-orchestrated-cyber-espionage-campaign/",
      "date_occurred": "2025-09",
      "last_updated": "2026-02-09",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"AI-Orchestrated Cyber Espionage Campaign Against Critical Infrastructure\" (INC-25-0001), https://topaithreats.com/incidents/INC-25-0001-ai-orchestrated-cyber-espionage-campaign/, last updated 2026-02-09."
    },
    {
      "cite_id": "INC-25-0011",
      "type": "incident",
      "title": "Deloitte AI-Fabricated Citations in Government Advisory Reports",
      "url": "https://topaithreats.com/incidents/INC-25-0011-deloitte-ai-fabricated-citations/",
      "date_occurred": "2025-09",
      "last_updated": "2026-03-13",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Deloitte AI-Fabricated Citations in Government Advisory Reports\" (INC-25-0011), https://topaithreats.com/incidents/INC-25-0011-deloitte-ai-fabricated-citations/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-25-0014",
      "type": "incident",
      "title": "Amazon Ring Deploys AI Facial Recognition to Consumer Doorbells",
      "url": "https://topaithreats.com/incidents/INC-25-0014-amazon-ring-facial-recognition/",
      "date_occurred": "2025-09",
      "last_updated": "2026-03-13",
      "severity": "medium",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Amazon Ring Deploys AI Facial Recognition to Consumer Doorbells\" (INC-25-0014), https://topaithreats.com/incidents/INC-25-0014-amazon-ring-facial-recognition/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-25-0043",
      "type": "incident",
      "title": "AI Grading Errors — Connecticut Students Petition After Misscoring, MCAS Glitch Affects 1,400 Students",
      "url": "https://topaithreats.com/incidents/INC-25-0043-ai-grading-errors-students/",
      "date_occurred": "2025-09",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"AI Grading Errors — Connecticut Students Petition After Misscoring, MCAS Glitch Affects 1,400 Students\" (INC-25-0043), https://topaithreats.com/incidents/INC-25-0043-ai-grading-errors-students/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-25-0007",
      "type": "incident",
      "title": "GitHub Copilot Remote Code Execution via Prompt Injection (CVE-2025-53773)",
      "url": "https://topaithreats.com/incidents/INC-25-0007-github-copilot-rce-prompt-injection/",
      "date_occurred": "2025-08",
      "last_updated": "2026-02-21",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"GitHub Copilot Remote Code Execution via Prompt Injection (CVE-2025-53773)\" (INC-25-0007), https://topaithreats.com/incidents/INC-25-0007-github-copilot-rce-prompt-injection/, last updated 2026-02-21."
    },
    {
      "cite_id": "INC-25-0008",
      "type": "incident",
      "title": "Cursor IDE MCP Vulnerabilities Enable Remote Code Execution (CurXecute & MCPoison)",
      "url": "https://topaithreats.com/incidents/INC-25-0008-cursor-ide-mcp-rce-vulnerabilities/",
      "date_occurred": "2025-08",
      "last_updated": "2026-02-21",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Cursor IDE MCP Vulnerabilities Enable Remote Code Execution (CurXecute & MCPoison)\" (INC-25-0008), https://topaithreats.com/incidents/INC-25-0008-cursor-ide-mcp-rce-vulnerabilities/, last updated 2026-02-21."
    },
    {
      "cite_id": "INC-25-0013",
      "type": "incident",
      "title": "Waymo Autonomous Vehicles Violate School Bus Stop Laws in Austin",
      "url": "https://topaithreats.com/incidents/INC-25-0013-waymo-school-bus-violations/",
      "date_occurred": "2025-08",
      "last_updated": "2026-03-13",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Waymo Autonomous Vehicles Violate School Bus Stop Laws in Austin\" (INC-25-0013), https://topaithreats.com/incidents/INC-25-0013-waymo-school-bus-violations/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-25-0005",
      "type": "incident",
      "title": "ChatGPT Jailbreak Reveals Windows Product Keys via Game Prompt",
      "url": "https://topaithreats.com/incidents/INC-25-0005-chatgpt-windows-product-keys-jailbreak/",
      "date_occurred": "2025-07",
      "last_updated": "2026-02-21",
      "severity": "medium",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"ChatGPT Jailbreak Reveals Windows Product Keys via Game Prompt\" (INC-25-0005), https://topaithreats.com/incidents/INC-25-0005-chatgpt-windows-product-keys-jailbreak/, last updated 2026-02-21."
    },
    {
      "cite_id": "INC-25-0006",
      "type": "incident",
      "title": "ChatGPT Shared Conversations Indexed by Search Engines, Exposing Sensitive Data",
      "url": "https://topaithreats.com/incidents/INC-25-0006-chatgpt-shared-links-indexed-data-exposure/",
      "date_occurred": "2025-07",
      "last_updated": "2026-02-21",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"ChatGPT Shared Conversations Indexed by Search Engines, Exposing Sensitive Data\" (INC-25-0006), https://topaithreats.com/incidents/INC-25-0006-chatgpt-shared-links-indexed-data-exposure/, last updated 2026-02-21."
    },
    {
      "cite_id": "INC-25-0015",
      "type": "incident",
      "title": "Replit AI Agent Deletes Production Database During Code Freeze",
      "url": "https://topaithreats.com/incidents/INC-25-0015-replit-agent-database-deletion/",
      "date_occurred": "2025-07",
      "last_updated": "2026-03-13",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Replit AI Agent Deletes Production Database During Code Freeze\" (INC-25-0015), https://topaithreats.com/incidents/INC-25-0015-replit-agent-database-deletion/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-25-0021",
      "type": "incident",
      "title": "Earnest Operations AI Lending Discrimination Settlement",
      "url": "https://topaithreats.com/incidents/INC-25-0021-earnest-ai-lending-discrimination-settlement/",
      "date_occurred": "2025-07",
      "last_updated": "2026-03-13",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Earnest Operations AI Lending Discrimination Settlement\" (INC-25-0021), https://topaithreats.com/incidents/INC-25-0021-earnest-ai-lending-discrimination-settlement/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-25-0041",
      "type": "incident",
      "title": "Tennessee Grandmother Wrongfully Arrested by Facial Recognition — Jailed 108 Days, Lost Home",
      "url": "https://topaithreats.com/incidents/INC-25-0041-grandmother-frt-wrongful-arrest-108-days/",
      "date_occurred": "2025-07",
      "last_updated": "2026-03-29",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Tennessee Grandmother Wrongfully Arrested by Facial Recognition — Jailed 108 Days, Lost Home\" (INC-25-0041), https://topaithreats.com/incidents/INC-25-0041-grandmother-frt-wrongful-arrest-108-days/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-25-0045",
      "type": "incident",
      "title": "Kimsuky APT Uses ChatGPT to Generate Fake South Korean Military IDs for Espionage Campaign",
      "url": "https://topaithreats.com/incidents/INC-25-0045-kimsuky-deepfake-military-ids/",
      "date_occurred": "2025-07",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Kimsuky APT Uses ChatGPT to Generate Fake South Korean Military IDs for Espionage Campaign\" (INC-25-0045), https://topaithreats.com/incidents/INC-25-0045-kimsuky-deepfake-military-ids/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-25-0004",
      "type": "incident",
      "title": "EchoLeak: Zero-Click Prompt Injection in Microsoft 365 Copilot (CVE-2025-32711)",
      "url": "https://topaithreats.com/incidents/INC-25-0004-echoleak-microsoft-copilot-prompt-injection/",
      "date_occurred": "2025-06",
      "last_updated": "2026-02-21",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"EchoLeak: Zero-Click Prompt Injection in Microsoft 365 Copilot (CVE-2025-32711)\" (INC-25-0004), https://topaithreats.com/incidents/INC-25-0004-echoleak-microsoft-copilot-prompt-injection/, last updated 2026-02-21."
    },
    {
      "cite_id": "INC-25-0017",
      "type": "incident",
      "title": "Anthropic Research Reveals AI Model Blackmail Behavior in Lab Scenarios",
      "url": "https://topaithreats.com/incidents/INC-25-0017-anthropic-ai-blackmail-behavior-study/",
      "date_occurred": "2025-06",
      "last_updated": "2026-03-13",
      "severity": "medium",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Anthropic Research Reveals AI Model Blackmail Behavior in Lab Scenarios\" (INC-25-0017), https://topaithreats.com/incidents/INC-25-0017-anthropic-ai-blackmail-behavior-study/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-25-0025",
      "type": "incident",
      "title": "AI Chatbot Suicide Risk: 20% Failure Rate in Stanford Study",
      "url": "https://topaithreats.com/incidents/INC-25-0025-stanford-ai-mental-health-chatbot-suicide-risk/",
      "date_occurred": "2025-06",
      "last_updated": "2026-03-13",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"AI Chatbot Suicide Risk: 20% Failure Rate in Stanford Study\" (INC-25-0025), https://topaithreats.com/incidents/INC-25-0025-stanford-ai-mental-health-chatbot-suicide-risk/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-25-0035",
      "type": "incident",
      "title": "Three Chained Prompt Injection Vulnerabilities in Anthropic MCP Git Server",
      "url": "https://topaithreats.com/incidents/INC-25-0035-anthropic-mcp-git-server-prompt-injection/",
      "date_occurred": "2025-06",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Three Chained Prompt Injection Vulnerabilities in Anthropic MCP Git Server\" (INC-25-0035), https://topaithreats.com/incidents/INC-25-0035-anthropic-mcp-git-server-prompt-injection/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-25-0012",
      "type": "incident",
      "title": "Zoox Robotaxi Collision and Software Recall in Las Vegas",
      "url": "https://topaithreats.com/incidents/INC-25-0012-zoox-robotaxi-crash-recall/",
      "date_occurred": "2025-04",
      "last_updated": "2026-03-13",
      "severity": "medium",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Zoox Robotaxi Collision and Software Recall in Las Vegas\" (INC-25-0012), https://topaithreats.com/incidents/INC-25-0012-zoox-robotaxi-crash-recall/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-25-0024",
      "type": "incident",
      "title": "Microsoft Reports Blocking $4 Billion in AI-Enabled Fraud Attempts",
      "url": "https://topaithreats.com/incidents/INC-25-0024-microsoft-4b-ai-enabled-fraud-disruption/",
      "date_occurred": "2025-04",
      "last_updated": "2026-03-13",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Microsoft Reports Blocking $4 Billion in AI-Enabled Fraud Attempts\" (INC-25-0024), https://topaithreats.com/incidents/INC-25-0024-microsoft-4b-ai-enabled-fraud-disruption/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-25-0030",
      "type": "incident",
      "title": "OpenAI o3 Reward Hacking in METR Safety Evaluation",
      "url": "https://topaithreats.com/incidents/INC-25-0030-openai-o3-reward-hacking-metr-evaluation/",
      "date_occurred": "2025-04",
      "last_updated": "2026-03-28",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"OpenAI o3 Reward Hacking in METR Safety Evaluation\" (INC-25-0030), https://topaithreats.com/incidents/INC-25-0030-openai-o3-reward-hacking-metr-evaluation/, last updated 2026-03-28."
    },
    {
      "cite_id": "INC-25-0032",
      "type": "incident",
      "title": "DOGE Uses ChatGPT to Flag and Cancel Federal Humanities Grants",
      "url": "https://topaithreats.com/incidents/INC-25-0032-doge-chatgpt-dei-grant-cancellations/",
      "date_occurred": "2025-04",
      "last_updated": "2026-03-13",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"DOGE Uses ChatGPT to Flag and Cancel Federal Humanities Grants\" (INC-25-0032), https://topaithreats.com/incidents/INC-25-0032-doge-chatgpt-dei-grant-cancellations/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-25-0031",
      "type": "incident",
      "title": "MINJA: Memory Injection Attack Against RAG-Augmented LLM Agents",
      "url": "https://topaithreats.com/incidents/INC-25-0031-minja-memory-injection-attack-research/",
      "date_occurred": "2025-03",
      "last_updated": "2026-03-07",
      "severity": "medium",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"MINJA: Memory Injection Attack Against RAG-Augmented LLM Agents\" (INC-25-0031), https://topaithreats.com/incidents/INC-25-0031-minja-memory-injection-attack-research/, last updated 2026-03-07."
    },
    {
      "cite_id": "INC-25-0028",
      "type": "incident",
      "title": "Google Gemini Long-Term Memory Corruption via Prompt Injection",
      "url": "https://topaithreats.com/incidents/INC-25-0028-gemini-memory-corruption-prompt-injection/",
      "date_occurred": "2025-02",
      "last_updated": "2026-03-28",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Google Gemini Long-Term Memory Corruption via Prompt Injection\" (INC-25-0028), https://topaithreats.com/incidents/INC-25-0028-gemini-memory-corruption-prompt-injection/, last updated 2026-03-28."
    },
    {
      "cite_id": "INC-25-0029",
      "type": "incident",
      "title": "Chain-of-Thought Reasoning Jailbreak Exploits Thinking Models",
      "url": "https://topaithreats.com/incidents/INC-25-0029-chain-of-thought-jailbreak-reasoning-models/",
      "date_occurred": "2025-02",
      "last_updated": "2026-03-28",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Chain-of-Thought Reasoning Jailbreak Exploits Thinking Models\" (INC-25-0029), https://topaithreats.com/incidents/INC-25-0029-chain-of-thought-jailbreak-reasoning-models/, last updated 2026-03-28."
    },
    {
      "cite_id": "INC-25-0002",
      "type": "incident",
      "title": "Italian Data Protection Authority Fines OpenAI EUR 15 Million Over ChatGPT GDPR Violations",
      "url": "https://topaithreats.com/incidents/INC-25-0002-italy-fines-openai-chatgpt/",
      "date_occurred": "2025-01",
      "last_updated": "2026-02-15",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Italian Data Protection Authority Fines OpenAI EUR 15 Million Over ChatGPT GDPR Violations\" (INC-25-0002), https://topaithreats.com/incidents/INC-25-0002-italy-fines-openai-chatgpt/, last updated 2026-02-15."
    },
    {
      "cite_id": "INC-25-0003",
      "type": "incident",
      "title": "DeepSeek R1 Data Exposure and International Bans Over Privacy and Security Concerns",
      "url": "https://topaithreats.com/incidents/INC-25-0003-deepseek-data-privacy-concerns/",
      "date_occurred": "2025-01",
      "last_updated": "2026-02-15",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"DeepSeek R1 Data Exposure and International Bans Over Privacy and Security Concerns\" (INC-25-0003), https://topaithreats.com/incidents/INC-25-0003-deepseek-data-privacy-concerns/, last updated 2026-02-15."
    },
    {
      "cite_id": "INC-25-0018",
      "type": "incident",
      "title": "Las Vegas Cybertruck Bomber Used ChatGPT for Explosives Information",
      "url": "https://topaithreats.com/incidents/INC-25-0018-las-vegas-cybertruck-chatgpt-explosives/",
      "date_occurred": "2025-01",
      "last_updated": "2026-03-13",
      "severity": "critical",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Las Vegas Cybertruck Bomber Used ChatGPT for Explosives Information\" (INC-25-0018), https://topaithreats.com/incidents/INC-25-0018-las-vegas-cybertruck-chatgpt-explosives/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-25-0027",
      "type": "incident",
      "title": "Medical LLM Data Poisoning Produces Undetectable Harmful Content",
      "url": "https://topaithreats.com/incidents/INC-25-0027-medical-llm-data-poisoning-nature-study/",
      "date_occurred": "2025-01",
      "last_updated": "2026-03-28",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Medical LLM Data Poisoning Produces Undetectable Harmful Content\" (INC-25-0027), https://topaithreats.com/incidents/INC-25-0027-medical-llm-data-poisoning-nature-study/, last updated 2026-03-28."
    },
    {
      "cite_id": "INC-25-0034",
      "type": "incident",
      "title": "Chinese AI Labs Conduct Industrial-Scale Distillation Attacks Against Claude",
      "url": "https://topaithreats.com/incidents/INC-25-0034-chinese-labs-claude-distillation-attacks/",
      "date_occurred": "2025",
      "last_updated": "2026-03-13",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Chinese AI Labs Conduct Industrial-Scale Distillation Attacks Against Claude\" (INC-25-0034), https://topaithreats.com/incidents/INC-25-0034-chinese-labs-claude-distillation-attacks/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-25-0040",
      "type": "incident",
      "title": "IWF Reports AI-Generated CSAM Videos Increase 26,385% with 65% at Highest Severity",
      "url": "https://topaithreats.com/incidents/INC-25-0040-iwf-ai-csam-video-explosion/",
      "date_occurred": "2025",
      "last_updated": "2026-03-29",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"IWF Reports AI-Generated CSAM Videos Increase 26,385% with 65% at Highest Severity\" (INC-25-0040), https://topaithreats.com/incidents/INC-25-0040-iwf-ai-csam-video-explosion/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-25-0042",
      "type": "incident",
      "title": "UN Report — AI Weaponized by Southeast Asian Organized Crime for $18-37B in Fraud",
      "url": "https://topaithreats.com/incidents/INC-25-0042-un-ai-weaponized-se-asian-crime/",
      "date_occurred": "2025",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"UN Report — AI Weaponized by Southeast Asian Organized Crime for $18-37B in Fraud\" (INC-25-0042), https://topaithreats.com/incidents/INC-25-0042-un-ai-weaponized-se-asian-crime/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-25-0044",
      "type": "incident",
      "title": "NYPD Facial Recognition Wrongful Arrest — Brooklyn Father Jailed 2 Days Despite 8-Inch Height Difference",
      "url": "https://topaithreats.com/incidents/INC-25-0044-nypd-frt-wrongful-arrest-williams/",
      "date_occurred": "2025",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"NYPD Facial Recognition Wrongful Arrest — Brooklyn Father Jailed 2 Days Despite 8-Inch Height Difference\" (INC-25-0044), https://topaithreats.com/incidents/INC-25-0044-nypd-frt-wrongful-arrest-williams/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-25-0047",
      "type": "incident",
      "title": "Mistral Pixtral Models Fail Safety Tests — 60x More Likely to Generate CSAM Than GPT-4o",
      "url": "https://topaithreats.com/incidents/INC-25-0047-mistral-pixtral-safety-failures/",
      "date_occurred": "2025",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Mistral Pixtral Models Fail Safety Tests — 60x More Likely to Generate CSAM Than GPT-4o\" (INC-25-0047), https://topaithreats.com/incidents/INC-25-0047-mistral-pixtral-safety-failures/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-24-0027",
      "type": "incident",
      "title": "Waymo Robotaxi Collides with Serve Delivery Robot in Los Angeles",
      "url": "https://topaithreats.com/incidents/INC-24-0027-waymo-serve-robot-autonomous-collision/",
      "date_occurred": "2024-12-27",
      "last_updated": "2026-03-28",
      "severity": "medium",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Waymo Robotaxi Collides with Serve Delivery Robot in Los Angeles\" (INC-24-0027), https://topaithreats.com/incidents/INC-24-0027-waymo-serve-robot-autonomous-collision/, last updated 2026-03-28."
    },
    {
      "cite_id": "INC-24-0013",
      "type": "incident",
      "title": "Romania Presidential Election Annulled After AI-Enabled Manipulation",
      "url": "https://topaithreats.com/incidents/INC-24-0013-romania-election-annulment-ai-manipulation/",
      "date_occurred": "2024-11",
      "last_updated": "2026-03-10",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Romania Presidential Election Annulled After AI-Enabled Manipulation\" (INC-24-0013), https://topaithreats.com/incidents/INC-24-0013-romania-election-annulment-ai-manipulation/, last updated 2026-03-10."
    },
    {
      "cite_id": "INC-24-0021",
      "type": "incident",
      "title": "Cruise Robotaxi Criminal False Reporting After Pedestrian Dragging",
      "url": "https://topaithreats.com/incidents/INC-24-0021-cruise-robotaxi-criminal-false-reporting/",
      "date_occurred": "2024-09",
      "last_updated": "2026-03-13",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Cruise Robotaxi Criminal False Reporting After Pedestrian Dragging\" (INC-24-0021), https://topaithreats.com/incidents/INC-24-0021-cruise-robotaxi-criminal-false-reporting/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-24-0011",
      "type": "incident",
      "title": "EU AI Act Enters Into Force as World's First Comprehensive AI Regulation",
      "url": "https://topaithreats.com/incidents/INC-24-0011-eu-ai-act-enters-into-force/",
      "date_occurred": "2024-08",
      "last_updated": "2026-02-15",
      "severity": "medium",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"EU AI Act Enters Into Force as World's First Comprehensive AI Regulation\" (INC-24-0011), https://topaithreats.com/incidents/INC-24-0011-eu-ai-act-enters-into-force/, last updated 2026-02-15."
    },
    {
      "cite_id": "INC-24-0015",
      "type": "incident",
      "title": "Sakana AI Scientist Unexpectedly Modifies Own Code",
      "url": "https://topaithreats.com/incidents/INC-24-0015-sakana-ai-scientist-self-modification/",
      "date_occurred": "2024-08",
      "last_updated": "2026-03-10",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Sakana AI Scientist Unexpectedly Modifies Own Code\" (INC-24-0015), https://topaithreats.com/incidents/INC-24-0015-sakana-ai-scientist-self-modification/, last updated 2026-03-10."
    },
    {
      "cite_id": "INC-24-0020",
      "type": "incident",
      "title": "Slack AI Indirect Prompt Injection Data Exfiltration Vulnerability",
      "url": "https://topaithreats.com/incidents/INC-24-0020-slack-ai-prompt-injection-exfiltration/",
      "date_occurred": "2024-08",
      "last_updated": "2026-03-13",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Slack AI Indirect Prompt Injection Data Exfiltration Vulnerability\" (INC-24-0020), https://topaithreats.com/incidents/INC-24-0020-slack-ai-prompt-injection-exfiltration/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-24-0014",
      "type": "incident",
      "title": "Workday AI Hiring Tool Discrimination Class Action",
      "url": "https://topaithreats.com/incidents/INC-24-0014-workday-ai-hiring-discrimination/",
      "date_occurred": "2024-07",
      "last_updated": "2026-03-13",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Workday AI Hiring Tool Discrimination Class Action\" (INC-24-0014), https://topaithreats.com/incidents/INC-24-0014-workday-ai-hiring-discrimination/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-24-0022",
      "type": "incident",
      "title": "McDonald's McHire AI Hiring Platform Data Vulnerability",
      "url": "https://topaithreats.com/incidents/INC-24-0022-mcdonalds-mchire-data-vulnerability/",
      "date_occurred": "2024-06",
      "last_updated": "2026-03-13",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"McDonald's McHire AI Hiring Platform Data Vulnerability\" (INC-24-0022), https://topaithreats.com/incidents/INC-24-0022-mcdonalds-mchire-data-vulnerability/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-24-0024",
      "type": "incident",
      "title": "McDonald's Ends AI Drive-Thru Ordering Trial After Viral Order Errors",
      "url": "https://topaithreats.com/incidents/INC-24-0024-mcdonalds-ai-drive-thru-ordering-failures/",
      "date_occurred": "2024-06",
      "last_updated": "2026-03-13",
      "severity": "medium",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"McDonald's Ends AI Drive-Thru Ordering Trial After Viral Order Errors\" (INC-24-0024), https://topaithreats.com/incidents/INC-24-0024-mcdonalds-ai-drive-thru-ordering-failures/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-24-0006",
      "type": "incident",
      "title": "OpenAI Voice Mode Resembling Scarlett Johansson Without Consent",
      "url": "https://topaithreats.com/incidents/INC-24-0006-openai-scarlett-johansson-voice/",
      "date_occurred": "2024-05",
      "last_updated": "2026-02-15",
      "severity": "medium",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"OpenAI Voice Mode Resembling Scarlett Johansson Without Consent\" (INC-24-0006), https://topaithreats.com/incidents/INC-24-0006-openai-scarlett-johansson-voice/, last updated 2026-02-15."
    },
    {
      "cite_id": "INC-24-0019",
      "type": "incident",
      "title": "Windows Recall: Security and Privacy Flaw (2024)",
      "url": "https://topaithreats.com/incidents/INC-24-0019-microsoft-windows-recall-privacy/",
      "date_occurred": "2024-05",
      "last_updated": "2026-04-13",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Windows Recall: Security and Privacy Flaw (2024)\" (INC-24-0019), https://topaithreats.com/incidents/INC-24-0019-microsoft-windows-recall-privacy/, last updated 2026-04-13."
    },
    {
      "cite_id": "INC-24-0023",
      "type": "incident",
      "title": "Google AI Overviews Recommend Glue on Pizza and Eating Rocks",
      "url": "https://topaithreats.com/incidents/INC-24-0023-google-ai-overviews-glue-rocks/",
      "date_occurred": "2024-05",
      "last_updated": "2026-03-13",
      "severity": "medium",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Google AI Overviews Recommend Glue on Pizza and Eating Rocks\" (INC-24-0023), https://topaithreats.com/incidents/INC-24-0023-google-ai-overviews-glue-rocks/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-24-0016",
      "type": "incident",
      "title": "SafeRent Algorithmic Housing Discrimination Settlement",
      "url": "https://topaithreats.com/incidents/INC-24-0016-saferent-housing-discrimination-settlement/",
      "date_occurred": "2024-04",
      "last_updated": "2026-03-13",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"SafeRent Algorithmic Housing Discrimination Settlement\" (INC-24-0016), https://topaithreats.com/incidents/INC-24-0016-saferent-housing-discrimination-settlement/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-24-0018",
      "type": "incident",
      "title": "India 2024 General Election Industrial-Scale Deepfake Campaign",
      "url": "https://topaithreats.com/incidents/INC-24-0018-india-election-deepfake-campaign/",
      "date_occurred": "2024-04",
      "last_updated": "2026-03-13",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"India 2024 General Election Industrial-Scale Deepfake Campaign\" (INC-24-0018), https://topaithreats.com/incidents/INC-24-0018-india-election-deepfake-campaign/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-24-0012",
      "type": "incident",
      "title": "Morris II — First Self-Replicating AI Worm Demonstrated",
      "url": "https://topaithreats.com/incidents/INC-24-0012-morris-ii-self-replicating-ai-worm/",
      "date_occurred": "2024-03",
      "last_updated": "2026-03-10",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Morris II — First Self-Replicating AI Worm Demonstrated\" (INC-24-0012), https://topaithreats.com/incidents/INC-24-0012-morris-ii-self-replicating-ai-worm/, last updated 2026-03-10."
    },
    {
      "cite_id": "INC-24-0017",
      "type": "incident",
      "title": "Israel Military Deploys AI Facial Recognition in Gaza Leading to Wrongful Detentions",
      "url": "https://topaithreats.com/incidents/INC-24-0017-corsight-gaza-facial-recognition-detentions/",
      "date_occurred": "2024-03",
      "last_updated": "2026-03-13",
      "severity": "critical",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Israel Military Deploys AI Facial Recognition in Gaza Leading to Wrongful Detentions\" (INC-24-0017), https://topaithreats.com/incidents/INC-24-0017-corsight-gaza-facial-recognition-detentions/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-24-0026",
      "type": "incident",
      "title": "NYC MyCity AI Chatbot Advises Businesses to Break the Law",
      "url": "https://topaithreats.com/incidents/INC-24-0026-nyc-mycity-chatbot-illegal-advice/",
      "date_occurred": "2024-03",
      "last_updated": "2026-03-13",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"NYC MyCity AI Chatbot Advises Businesses to Break the Law\" (INC-24-0026), https://topaithreats.com/incidents/INC-24-0026-nyc-mycity-chatbot-illegal-advice/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-24-0009",
      "type": "incident",
      "title": "Google Gemini Produces Historically Inaccurate Image Outputs Due to Bias Overcorrection",
      "url": "https://topaithreats.com/incidents/INC-24-0009-google-gemini-image-generation-controversy/",
      "date_occurred": "2024-02",
      "last_updated": "2026-02-15",
      "severity": "medium",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Google Gemini Produces Historically Inaccurate Image Outputs Due to Bias Overcorrection\" (INC-24-0009), https://topaithreats.com/incidents/INC-24-0009-google-gemini-image-generation-controversy/, last updated 2026-02-15."
    },
    {
      "cite_id": "INC-24-0010",
      "type": "incident",
      "title": "Lawsuit Filed After Teenager's Death Linked to Character.AI Chatbot Interactions",
      "url": "https://topaithreats.com/incidents/INC-24-0010-character-ai-teenager-death-lawsuit/",
      "date_occurred": "2024-02",
      "last_updated": "2026-02-15",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Lawsuit Filed After Teenager's Death Linked to Character.AI Chatbot Interactions\" (INC-24-0010), https://topaithreats.com/incidents/INC-24-0010-character-ai-teenager-death-lawsuit/, last updated 2026-02-15."
    },
    {
      "cite_id": "INC-24-0001",
      "type": "incident",
      "title": "Hong Kong Deepfake CFO Video Conference Fraud",
      "url": "https://topaithreats.com/incidents/INC-24-0001-hong-kong-deepfake-cfo-fraud/",
      "date_occurred": "2024-01",
      "last_updated": "2026-02-15",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Hong Kong Deepfake CFO Video Conference Fraud\" (INC-24-0001), https://topaithreats.com/incidents/INC-24-0001-hong-kong-deepfake-cfo-fraud/, last updated 2026-02-15."
    },
    {
      "cite_id": "INC-24-0002",
      "type": "incident",
      "title": "AI-Generated Biden Robocall in New Hampshire Primary",
      "url": "https://topaithreats.com/incidents/INC-24-0002-ai-generated-election-robocall/",
      "date_occurred": "2024-01",
      "last_updated": "2026-02-15",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"AI-Generated Biden Robocall in New Hampshire Primary\" (INC-24-0002), https://topaithreats.com/incidents/INC-24-0002-ai-generated-election-robocall/, last updated 2026-02-15."
    },
    {
      "cite_id": "INC-24-0003",
      "type": "incident",
      "title": "AI-Generated Deepfake Audio Used to Frame High School Principal in Baltimore",
      "url": "https://topaithreats.com/incidents/INC-24-0003-pikesville-high-school-deepfake-principal/",
      "date_occurred": "2024-01",
      "last_updated": "2026-02-09",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"AI-Generated Deepfake Audio Used to Frame High School Principal in Baltimore\" (INC-24-0003), https://topaithreats.com/incidents/INC-24-0003-pikesville-high-school-deepfake-principal/, last updated 2026-02-09."
    },
    {
      "cite_id": "INC-24-0004",
      "type": "incident",
      "title": "FBI Elder Fraud Report Documents AI-Enhanced Financial Scams Against Seniors",
      "url": "https://topaithreats.com/incidents/INC-24-0004-fbi-elder-fraud-ai-enhanced-scams/",
      "date_occurred": "2024-01",
      "last_updated": "2026-02-09",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"FBI Elder Fraud Report Documents AI-Enhanced Financial Scams Against Seniors\" (INC-24-0004), https://topaithreats.com/incidents/INC-24-0004-fbi-elder-fraud-ai-enhanced-scams/, last updated 2026-02-09."
    },
    {
      "cite_id": "INC-24-0007",
      "type": "incident",
      "title": "Indirect Prompt Injection: How Attackers Hijack LLM Apps",
      "url": "https://topaithreats.com/incidents/INC-24-0007-indirect-prompt-injection-attacks/",
      "date_occurred": "2024-01",
      "last_updated": "2026-02-15",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Indirect Prompt Injection: How Attackers Hijack LLM Apps\" (INC-24-0007), https://topaithreats.com/incidents/INC-24-0007-indirect-prompt-injection-attacks/, last updated 2026-02-15."
    },
    {
      "cite_id": "INC-24-0008",
      "type": "incident",
      "title": "AI-Generated Non-Consensual Intimate Images of Taylor Swift Circulate on Social Media",
      "url": "https://topaithreats.com/incidents/INC-24-0008-taylor-swift-deepfake-images/",
      "date_occurred": "2024-01",
      "last_updated": "2026-02-15",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"AI-Generated Non-Consensual Intimate Images of Taylor Swift Circulate on Social Media\" (INC-24-0008), https://topaithreats.com/incidents/INC-24-0008-taylor-swift-deepfake-images/, last updated 2026-02-15."
    },
    {
      "cite_id": "INC-24-0025",
      "type": "incident",
      "title": "DPD AI Chatbot Swears at Customer and Writes Poem Criticizing the Company",
      "url": "https://topaithreats.com/incidents/INC-24-0025-dpd-ai-chatbot-swearing-incident/",
      "date_occurred": "2024-01",
      "last_updated": "2026-03-13",
      "severity": "low",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"DPD AI Chatbot Swears at Customer and Writes Poem Criticizing the Company\" (INC-24-0025), https://topaithreats.com/incidents/INC-24-0025-dpd-ai-chatbot-swearing-incident/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-23-0011",
      "type": "incident",
      "title": "New York Times Copyright Lawsuit Against OpenAI",
      "url": "https://topaithreats.com/incidents/INC-23-0011-nyt-openai-copyright-lawsuit/",
      "date_occurred": "2023-12",
      "last_updated": "2026-02-15",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"New York Times Copyright Lawsuit Against OpenAI\" (INC-23-0011), https://topaithreats.com/incidents/INC-23-0011-nyt-openai-copyright-lawsuit/, last updated 2026-02-15."
    },
    {
      "cite_id": "INC-23-0013",
      "type": "incident",
      "title": "FTC Bans Rite Aid from Using Facial Recognition Technology",
      "url": "https://topaithreats.com/incidents/INC-23-0013-rite-aid-ftc-facial-recognition-ban/",
      "date_occurred": "2023-12",
      "last_updated": "2026-02-15",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"FTC Bans Rite Aid from Using Facial Recognition Technology\" (INC-23-0013), https://topaithreats.com/incidents/INC-23-0013-rite-aid-ftc-facial-recognition-ban/, last updated 2026-02-15."
    },
    {
      "cite_id": "INC-23-0015",
      "type": "incident",
      "title": "Sports Illustrated Published AI-Generated Articles Under Fake Author Names",
      "url": "https://topaithreats.com/incidents/INC-23-0015-sports-illustrated-ai-fake-authors/",
      "date_occurred": "2023-11",
      "last_updated": "2026-02-15",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Sports Illustrated Published AI-Generated Articles Under Fake Author Names\" (INC-23-0015), https://topaithreats.com/incidents/INC-23-0015-sports-illustrated-ai-fake-authors/, last updated 2026-02-15."
    },
    {
      "cite_id": "INC-23-0008",
      "type": "incident",
      "title": "AI-Generated Deepfake Nude Images of Students at Westfield High School",
      "url": "https://topaithreats.com/incidents/INC-23-0008-westfield-high-school-deepfake-nudes/",
      "date_occurred": "2023-10",
      "last_updated": "2026-02-09",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"AI-Generated Deepfake Nude Images of Students at Westfield High School\" (INC-23-0008), https://topaithreats.com/incidents/INC-23-0008-westfield-high-school-deepfake-nudes/, last updated 2026-02-09."
    },
    {
      "cite_id": "INC-23-0007",
      "type": "incident",
      "title": "AI-Generated Deepfake Audio Used to Influence Slovak Parliamentary Election",
      "url": "https://topaithreats.com/incidents/INC-23-0007-slovakia-election-deepfake-audio/",
      "date_occurred": "2023-09",
      "last_updated": "2026-02-09",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"AI-Generated Deepfake Audio Used to Influence Slovak Parliamentary Election\" (INC-23-0007), https://topaithreats.com/incidents/INC-23-0007-slovakia-election-deepfake-audio/, last updated 2026-02-09."
    },
    {
      "cite_id": "INC-23-0012",
      "type": "incident",
      "title": "Zoom AI Training Terms of Service Controversy",
      "url": "https://topaithreats.com/incidents/INC-23-0012-zoom-ai-training-terms-controversy/",
      "date_occurred": "2023-08",
      "last_updated": "2026-02-15",
      "severity": "medium",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Zoom AI Training Terms of Service Controversy\" (INC-23-0012), https://topaithreats.com/incidents/INC-23-0012-zoom-ai-training-terms-controversy/, last updated 2026-02-15."
    },
    {
      "cite_id": "INC-23-0006",
      "type": "incident",
      "title": "WormGPT: AI-Powered Business Email Compromise Tool",
      "url": "https://topaithreats.com/incidents/INC-23-0006-wormgpt-cybercrime-tool/",
      "date_occurred": "2023-07",
      "last_updated": "2025-01-15",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"WormGPT: AI-Powered Business Email Compromise Tool\" (INC-23-0006), https://topaithreats.com/incidents/INC-23-0006-wormgpt-cybercrime-tool/, last updated 2025-01-15."
    },
    {
      "cite_id": "INC-23-0005",
      "type": "incident",
      "title": "AI-Fabricated Legal Citations in U.S. Courts",
      "url": "https://topaithreats.com/incidents/INC-23-0005-chatgpt-hallucination-lawyer/",
      "date_occurred": "2023-05",
      "last_updated": "2026-03-13",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"AI-Fabricated Legal Citations in U.S. Courts\" (INC-23-0005), https://topaithreats.com/incidents/INC-23-0005-chatgpt-hallucination-lawyer/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-23-0010",
      "type": "incident",
      "title": "Chegg Stock Collapse After ChatGPT Disruption",
      "url": "https://topaithreats.com/incidents/INC-23-0010-chegg-chatgpt-disruption/",
      "date_occurred": "2023-05",
      "last_updated": "2026-02-15",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Chegg Stock Collapse After ChatGPT Disruption\" (INC-23-0010), https://topaithreats.com/incidents/INC-23-0010-chegg-chatgpt-disruption/, last updated 2026-02-15."
    },
    {
      "cite_id": "INC-23-0002",
      "type": "incident",
      "title": "Samsung Semiconductor Trade Secret Leak via ChatGPT",
      "url": "https://topaithreats.com/incidents/INC-23-0002-samsung-chatgpt-data-leak/",
      "date_occurred": "2023-03",
      "last_updated": "2026-02-15",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Samsung Semiconductor Trade Secret Leak via ChatGPT\" (INC-23-0002), https://topaithreats.com/incidents/INC-23-0002-samsung-chatgpt-data-leak/, last updated 2026-02-15."
    },
    {
      "cite_id": "INC-23-0003",
      "type": "incident",
      "title": "Italy Temporary Ban on ChatGPT for GDPR Violations",
      "url": "https://topaithreats.com/incidents/INC-23-0003-italy-chatgpt-gdpr-ban/",
      "date_occurred": "2023-03",
      "last_updated": "2025-01-15",
      "severity": "medium",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Italy Temporary Ban on ChatGPT for GDPR Violations\" (INC-23-0003), https://topaithreats.com/incidents/INC-23-0003-italy-chatgpt-gdpr-ban/, last updated 2025-01-15."
    },
    {
      "cite_id": "INC-23-0004",
      "type": "incident",
      "title": "AI Voice Cloning Used in Grandparent Scam Network Targeting Newfoundland Seniors",
      "url": "https://topaithreats.com/incidents/INC-23-0004-newfoundland-ai-voice-cloning-grandparent-scam/",
      "date_occurred": "2023-03",
      "last_updated": "2026-02-09",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"AI Voice Cloning Used in Grandparent Scam Network Targeting Newfoundland Seniors\" (INC-23-0004), https://topaithreats.com/incidents/INC-23-0004-newfoundland-ai-voice-cloning-grandparent-scam/, last updated 2026-02-09."
    },
    {
      "cite_id": "INC-23-0016",
      "type": "incident",
      "title": "Bing Chat (Sydney) System Prompt Exposure via Prompt Injection",
      "url": "https://topaithreats.com/incidents/INC-23-0016-bing-chat-sydney-system-prompt-leak/",
      "date_occurred": "2023-02",
      "last_updated": "2026-02-21",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Bing Chat (Sydney) System Prompt Exposure via Prompt Injection\" (INC-23-0016), https://topaithreats.com/incidents/INC-23-0016-bing-chat-sydney-system-prompt-leak/, last updated 2026-02-21."
    },
    {
      "cite_id": "INC-23-0001",
      "type": "incident",
      "title": "AI Deepfake Impersonation Campaign Targeting Senior U.S. Government Officials",
      "url": "https://topaithreats.com/incidents/INC-23-0001-fbi-deepfake-impersonation-us-officials/",
      "date_occurred": "2023-01",
      "last_updated": "2026-02-09",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"AI Deepfake Impersonation Campaign Targeting Senior U.S. Government Officials\" (INC-23-0001), https://topaithreats.com/incidents/INC-23-0001-fbi-deepfake-impersonation-us-officials/, last updated 2026-02-09."
    },
    {
      "cite_id": "INC-23-0014",
      "type": "incident",
      "title": "GitHub Copilot Leaks API Keys and Secrets from Training Data",
      "url": "https://topaithreats.com/incidents/INC-23-0014-github-copilot-training-data-leak/",
      "date_occurred": "2023-01",
      "last_updated": "2026-02-15",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"GitHub Copilot Leaks API Keys and Secrets from Training Data\" (INC-23-0014), https://topaithreats.com/incidents/INC-23-0014-github-copilot-training-data-leak/, last updated 2026-02-15."
    },
    {
      "cite_id": "INC-23-0017",
      "type": "incident",
      "title": "UnitedHealth nH Predict AI Claim Denial System",
      "url": "https://topaithreats.com/incidents/INC-23-0017-unitedhealth-ai-claim-denial/",
      "date_occurred": "2023-01",
      "last_updated": "2026-03-10",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"UnitedHealth nH Predict AI Claim Denial System\" (INC-23-0017), https://topaithreats.com/incidents/INC-23-0017-unitedhealth-ai-claim-denial/, last updated 2026-03-10."
    },
    {
      "cite_id": "INC-23-0018",
      "type": "incident",
      "title": "Kenyan Content Moderators vs Meta — 140+ Former Facebook Workers Diagnosed with PTSD",
      "url": "https://topaithreats.com/incidents/INC-23-0018-kenyan-moderators-meta-ptsd/",
      "date_occurred": "2023",
      "last_updated": "2026-03-29",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"Kenyan Content Moderators vs Meta — 140+ Former Facebook Workers Diagnosed with PTSD\" (INC-23-0018), https://topaithreats.com/incidents/INC-23-0018-kenyan-moderators-meta-ptsd/, last updated 2026-03-29."
    },
    {
      "cite_id": "INC-22-0003",
      "type": "incident",
      "title": "PyTorch torchtriton Dependency Confusion Supply Chain Attack",
      "url": "https://topaithreats.com/incidents/INC-22-0003-pytorch-torchtriton-supply-chain-attack/",
      "date_occurred": "2022-12-25",
      "last_updated": "2026-03-28",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"PyTorch torchtriton Dependency Confusion Supply Chain Attack\" (INC-22-0003), https://topaithreats.com/incidents/INC-22-0003-pytorch-torchtriton-supply-chain-attack/, last updated 2026-03-28."
    },
    {
      "cite_id": "INC-22-0005",
      "type": "incident",
      "title": "Air Canada Chatbot Hallucinated Refund Policy — Tribunal Ruling",
      "url": "https://topaithreats.com/incidents/INC-22-0005-air-canada-chatbot-refund-ruling/",
      "date_occurred": "2022-11",
      "last_updated": "2026-02-15",
      "severity": "medium",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Air Canada Chatbot Hallucinated Refund Policy — Tribunal Ruling\" (INC-22-0005), https://topaithreats.com/incidents/INC-22-0005-air-canada-chatbot-refund-ruling/, last updated 2026-02-15."
    },
    {
      "cite_id": "INC-22-0004",
      "type": "incident",
      "title": "RealPage AI Algorithmic Rent-Fixing",
      "url": "https://topaithreats.com/incidents/INC-22-0004-realpage-algorithmic-rent-fixing/",
      "date_occurred": "2022-10",
      "last_updated": "2026-02-15",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"RealPage AI Algorithmic Rent-Fixing\" (INC-22-0004), https://topaithreats.com/incidents/INC-22-0004-realpage-algorithmic-rent-fixing/, last updated 2026-02-15."
    },
    {
      "cite_id": "INC-22-0002",
      "type": "incident",
      "title": "Meta Housing Ad Discrimination DOJ Settlement",
      "url": "https://topaithreats.com/incidents/INC-22-0002-meta-housing-ad-discrimination/",
      "date_occurred": "2022-06",
      "last_updated": "2026-02-15",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Meta Housing Ad Discrimination DOJ Settlement\" (INC-22-0002), https://topaithreats.com/incidents/INC-22-0002-meta-housing-ad-discrimination/, last updated 2026-02-15."
    },
    {
      "cite_id": "INC-22-0001",
      "type": "incident",
      "title": "Drug Discovery AI Repurposed to Generate Toxic Chemical Weapons Compounds",
      "url": "https://topaithreats.com/incidents/INC-22-0001-drug-discovery-ai-toxic-compounds/",
      "date_occurred": "2022-03",
      "last_updated": "2026-02-15",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Drug Discovery AI Repurposed to Generate Toxic Chemical Weapons Compounds\" (INC-22-0001), https://topaithreats.com/incidents/INC-22-0001-drug-discovery-ai-toxic-compounds/, last updated 2026-02-15."
    },
    {
      "cite_id": "INC-21-0001",
      "type": "incident",
      "title": "Chatbot Encouraged Man in Plot to Kill Queen Elizabeth II",
      "url": "https://topaithreats.com/incidents/INC-21-0001-chatbot-encouraged-man-in-plot-to-kill-queen-elizabeth-ii/",
      "date_occurred": "2021-12-25",
      "last_updated": "2026-02-15",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Chatbot Encouraged Man in Plot to Kill Queen Elizabeth II\" (INC-21-0001), https://topaithreats.com/incidents/INC-21-0001-chatbot-encouraged-man-in-plot-to-kill-queen-elizabeth-ii/, last updated 2026-02-15."
    },
    {
      "cite_id": "INC-20-0004",
      "type": "incident",
      "title": "Pulse Oximeter Racial Bias Propagates into AI Clinical Decision Systems",
      "url": "https://topaithreats.com/incidents/INC-20-0004-pulse-oximeter-racial-bias-ai-propagation/",
      "date_occurred": "2020-12",
      "last_updated": "2026-03-13",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Pulse Oximeter Racial Bias Propagates into AI Clinical Decision Systems\" (INC-20-0004), https://topaithreats.com/incidents/INC-20-0004-pulse-oximeter-racial-bias-ai-propagation/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-20-0002",
      "type": "incident",
      "title": "UK A-Level Algorithm Downgrades Disadvantaged Students",
      "url": "https://topaithreats.com/incidents/INC-20-0002-uk-a-level-algorithm-grading/",
      "date_occurred": "2020-08",
      "last_updated": "2026-02-15",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"UK A-Level Algorithm Downgrades Disadvantaged Students\" (INC-20-0002), https://topaithreats.com/incidents/INC-20-0002-uk-a-level-algorithm-grading/, last updated 2026-02-15."
    },
    {
      "cite_id": "INC-20-0003",
      "type": "incident",
      "title": "UN-Documented Autonomous Drone Attack in Libya",
      "url": "https://topaithreats.com/incidents/INC-20-0003-libya-autonomous-drone-attack/",
      "date_occurred": "2020-03",
      "last_updated": "2026-02-15",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"UN-Documented Autonomous Drone Attack in Libya\" (INC-20-0003), https://topaithreats.com/incidents/INC-20-0003-libya-autonomous-drone-attack/, last updated 2026-02-15."
    },
    {
      "cite_id": "INC-20-0001",
      "type": "incident",
      "title": "Clearview AI Mass Facial Recognition Scraping",
      "url": "https://topaithreats.com/incidents/INC-20-0001-clearview-ai-mass-surveillance/",
      "date_occurred": "2020-01",
      "last_updated": "2025-01-15",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Clearview AI Mass Facial Recognition Scraping\" (INC-20-0001), https://topaithreats.com/incidents/INC-20-0001-clearview-ai-mass-surveillance/, last updated 2025-01-15."
    },
    {
      "cite_id": "INC-20-0005",
      "type": "incident",
      "title": "Robert Williams Wrongful Arrest from Facial Recognition Racial Bias",
      "url": "https://topaithreats.com/incidents/INC-20-0005-robert-williams-facial-recognition-wrongful-arrest/",
      "date_occurred": "2020-01",
      "last_updated": "2026-03-28",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Robert Williams Wrongful Arrest from Facial Recognition Racial Bias\" (INC-20-0005), https://topaithreats.com/incidents/INC-20-0005-robert-williams-facial-recognition-wrongful-arrest/, last updated 2026-03-28."
    },
    {
      "cite_id": "INC-20-0006",
      "type": "incident",
      "title": "'Vegetative Electron Microscopy' Nonsense Phrase Contaminates Scientific Literature via AI",
      "url": "https://topaithreats.com/incidents/INC-20-0006-vegetative-electron-microscopy-ai-contamination/",
      "date_occurred": "2020-01",
      "last_updated": "2026-03-13",
      "severity": "medium",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"'Vegetative Electron Microscopy' Nonsense Phrase Contaminates Scientific Literature via AI\" (INC-20-0006), https://topaithreats.com/incidents/INC-20-0006-vegetative-electron-microscopy-ai-contamination/, last updated 2026-03-13."
    },
    {
      "cite_id": "INC-19-0001",
      "type": "incident",
      "title": "AI Voice Clone CEO Fraud Against UK Energy Company",
      "url": "https://topaithreats.com/incidents/INC-19-0001-deepfake-ceo-voice-uk-energy/",
      "date_occurred": "2019-03",
      "last_updated": "2025-01-15",
      "severity": "high",
      "evidence_level": "corroborated",
      "citation": "TopAIThreats, \"AI Voice Clone CEO Fraud Against UK Energy Company\" (INC-19-0001), https://topaithreats.com/incidents/INC-19-0001-deepfake-ceo-voice-uk-energy/, last updated 2025-01-15."
    },
    {
      "cite_id": "INC-18-0002",
      "type": "incident",
      "title": "Amazon AI Recruiting Tool Gender Bias",
      "url": "https://topaithreats.com/incidents/INC-18-0002-amazon-ai-hiring-bias/",
      "date_occurred": "2018-10",
      "last_updated": "2025-01-15",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Amazon AI Recruiting Tool Gender Bias\" (INC-18-0002), https://topaithreats.com/incidents/INC-18-0002-amazon-ai-hiring-bias/, last updated 2025-01-15."
    },
    {
      "cite_id": "INC-18-0003",
      "type": "incident",
      "title": "Boeing 737 MAX MCAS Automation Failures — Two Fatal Crashes",
      "url": "https://topaithreats.com/incidents/INC-18-0003-boeing-737-max-mcas-failures/",
      "date_occurred": "2018-10",
      "last_updated": "2026-02-15",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Boeing 737 MAX MCAS Automation Failures — Two Fatal Crashes\" (INC-18-0003), https://topaithreats.com/incidents/INC-18-0003-boeing-737-max-mcas-failures/, last updated 2026-02-15."
    },
    {
      "cite_id": "INC-18-0001",
      "type": "incident",
      "title": "Uber Autonomous Vehicle Pedestrian Fatality",
      "url": "https://topaithreats.com/incidents/INC-18-0001-uber-self-driving-fatality/",
      "date_occurred": "2018-03",
      "last_updated": "2025-01-15",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Uber Autonomous Vehicle Pedestrian Fatality\" (INC-18-0001), https://topaithreats.com/incidents/INC-18-0001-uber-self-driving-fatality/, last updated 2025-01-15."
    },
    {
      "cite_id": "INC-17-0001",
      "type": "incident",
      "title": "Facebook AI Mistranslation of Arabic Post Leads to Wrongful Arrest in Israel",
      "url": "https://topaithreats.com/incidents/INC-17-0001-facebook-ai-mistranslation-arrest/",
      "date_occurred": "2017-10",
      "last_updated": "2026-02-15",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Facebook AI Mistranslation of Arabic Post Leads to Wrongful Arrest in Israel\" (INC-17-0001), https://topaithreats.com/incidents/INC-17-0001-facebook-ai-mistranslation-arrest/, last updated 2026-02-15."
    },
    {
      "cite_id": "INC-16-0001",
      "type": "incident",
      "title": "Australia Robodebt Automated Welfare Fraud Detection",
      "url": "https://topaithreats.com/incidents/INC-16-0001-robodebt-australia/",
      "date_occurred": "2016-07",
      "last_updated": "2025-01-15",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Australia Robodebt Automated Welfare Fraud Detection\" (INC-16-0001), https://topaithreats.com/incidents/INC-16-0001-robodebt-australia/, last updated 2025-01-15."
    },
    {
      "cite_id": "INC-16-0003",
      "type": "incident",
      "title": "COMPAS Recidivism Algorithm Racial Bias",
      "url": "https://topaithreats.com/incidents/INC-16-0003-compas-recidivism-algorithm-bias/",
      "date_occurred": "2016-05",
      "last_updated": "2026-02-15",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"COMPAS Recidivism Algorithm Racial Bias\" (INC-16-0003), https://topaithreats.com/incidents/INC-16-0003-compas-recidivism-algorithm-bias/, last updated 2026-02-15."
    },
    {
      "cite_id": "INC-16-0002",
      "type": "incident",
      "title": "Microsoft Tay Twitter Chatbot Adversarial Manipulation",
      "url": "https://topaithreats.com/incidents/INC-16-0002-microsoft-tay-twitter-bot/",
      "date_occurred": "2016-03",
      "last_updated": "2026-02-15",
      "severity": "high",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Microsoft Tay Twitter Chatbot Adversarial Manipulation\" (INC-16-0002), https://topaithreats.com/incidents/INC-16-0002-microsoft-tay-twitter-bot/, last updated 2026-02-15."
    },
    {
      "cite_id": "INC-13-0001",
      "type": "incident",
      "title": "Dutch Childcare Benefits Algorithm Discrimination",
      "url": "https://topaithreats.com/incidents/INC-13-0001-dutch-childcare-benefits-scandal/",
      "date_occurred": "2013-01",
      "last_updated": "2026-02-15",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"Dutch Childcare Benefits Algorithm Discrimination\" (INC-13-0001), https://topaithreats.com/incidents/INC-13-0001-dutch-childcare-benefits-scandal/, last updated 2026-02-15."
    },
    {
      "cite_id": "INC-10-0001",
      "type": "incident",
      "title": "2010 Flash Crash — Algorithmic Trading Cascading Failure",
      "url": "https://topaithreats.com/incidents/INC-10-0001-flash-crash-algorithmic-trading/",
      "date_occurred": "2010-05",
      "last_updated": "2026-02-15",
      "severity": "critical",
      "evidence_level": "primary",
      "citation": "TopAIThreats, \"2010 Flash Crash — Algorithmic Trading Cascading Failure\" (INC-10-0001), https://topaithreats.com/incidents/INC-10-0001-flash-crash-algorithmic-trading/, last updated 2026-02-15."
    }
  ],
  "domains": [
    {
      "cite_id": "DOM-AGT",
      "type": "domain",
      "title": "Agentic & Autonomous Threats",
      "url": "https://topaithreats.com/domains/agentic-autonomous/",
      "definition": "Threats caused by AI systems that act independently, persist over time, or coordinate with other systems.",
      "citation": "TopAIThreats, \"Agentic & Autonomous Threats\" (DOM-AGT), https://topaithreats.com/domains/agentic-autonomous/."
    },
    {
      "cite_id": "DOM-CTL",
      "type": "domain",
      "title": "Human–AI Control Threats",
      "url": "https://topaithreats.com/domains/human-ai-control/",
      "definition": "Threats arising from how humans rely on, defer to, or lose control over AI systems.",
      "citation": "TopAIThreats, \"Human–AI Control Threats\" (DOM-CTL), https://topaithreats.com/domains/human-ai-control/."
    },
    {
      "cite_id": "DOM-ECO",
      "type": "domain",
      "title": "Economic & Labor Threats",
      "url": "https://topaithreats.com/domains/economic-labor/",
      "definition": "Threats that distort markets, labor conditions, or the distribution of economic power.",
      "citation": "TopAIThreats, \"Economic & Labor Threats\" (DOM-ECO), https://topaithreats.com/domains/economic-labor/."
    },
    {
      "cite_id": "DOM-INF",
      "type": "domain",
      "title": "Information Integrity Threats",
      "url": "https://topaithreats.com/domains/information-integrity/",
      "definition": "Threats that undermine the reliability, authenticity, or shared understanding of information.",
      "citation": "TopAIThreats, \"Information Integrity Threats\" (DOM-INF), https://topaithreats.com/domains/information-integrity/."
    },
    {
      "cite_id": "DOM-PRI",
      "type": "domain",
      "title": "Privacy & Surveillance Threats",
      "url": "https://topaithreats.com/domains/privacy-surveillance/",
      "definition": "Threats involving unauthorized inference, tracking, or monitoring of individuals or groups.",
      "citation": "TopAIThreats, \"Privacy & Surveillance Threats\" (DOM-PRI), https://topaithreats.com/domains/privacy-surveillance/."
    },
    {
      "cite_id": "DOM-SEC",
      "type": "domain",
      "title": "Security & Cyber Threats",
      "url": "https://topaithreats.com/domains/security-cyber/",
      "definition": "AI-enabled attacks that compromise the integrity, confidentiality, or availability of digital systems — through input manipulation, model exploitation, or automated offense.",
      "citation": "TopAIThreats, \"Security & Cyber Threats\" (DOM-SEC), https://topaithreats.com/domains/security-cyber/."
    },
    {
      "cite_id": "DOM-SOC",
      "type": "domain",
      "title": "Discrimination & Social Harm",
      "url": "https://topaithreats.com/domains/discrimination-social-harm/",
      "definition": "Threats that result in unfair treatment, exclusion, or social harm to individuals or groups.",
      "citation": "TopAIThreats, \"Discrimination & Social Harm\" (DOM-SOC), https://topaithreats.com/domains/discrimination-social-harm/."
    },
    {
      "cite_id": "DOM-SYS",
      "type": "domain",
      "title": "Systemic & Catastrophic Risks",
      "url": "https://topaithreats.com/domains/systemic-catastrophic/",
      "definition": "Threats that emerge from scale, coupling, and accumulation rather than single failures.",
      "citation": "TopAIThreats, \"Systemic & Catastrophic Risks\" (DOM-SYS), https://topaithreats.com/domains/systemic-catastrophic/."
    }
  ],
  "glossary": [
    {
      "cite_id": "glossary:accountability",
      "type": "glossary",
      "title": "Accountability",
      "url": "https://topaithreats.com/glossary/accountability/",
      "definition": "The principle that identifiable individuals or organisations must be answerable for AI system outcomes, including harms caused by automated decisions.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Accountability",
        "https://www.wikidata.org/wiki/Q2798912"
      ],
      "citation": "TopAIThreats Glossary, \"Accountability\", https://topaithreats.com/glossary/accountability/."
    },
    {
      "cite_id": "glossary:adversarial-attack",
      "type": "glossary",
      "title": "Adversarial Attack",
      "url": "https://topaithreats.com/glossary/adversarial-attack/",
      "definition": "A deliberate manipulation of inputs to a machine learning model designed to cause incorrect outputs, misclassifications, or security bypasses. Adversarial attacks exploit mathematical vulnerabilities in how models process data rather than flaws in traditional software logic.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Adversarial_machine_learning",
        "https://www.wikidata.org/wiki/Q20312394"
      ],
      "citation": "TopAIThreats Glossary, \"Adversarial Attack\", https://topaithreats.com/glossary/adversarial-attack/."
    },
    {
      "cite_id": "glossary:adversarial-perturbation",
      "type": "glossary",
      "title": "Adversarial Perturbation",
      "url": "https://topaithreats.com/glossary/adversarial-perturbation/",
      "definition": "A carefully calculated modification to an input — often imperceptible to humans — that causes a machine learning model to produce an incorrect or attacker-chosen output. Adversarial perturbations exploit the mathematical properties of neural network decision boundaries rather than flaws in traditional software logic.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Adversarial_machine_learning"
      ],
      "citation": "TopAIThreats Glossary, \"Adversarial Perturbation\", https://topaithreats.com/glossary/adversarial-perturbation/."
    },
    {
      "cite_id": "glossary:adversarial-training",
      "type": "glossary",
      "title": "Adversarial Training",
      "url": "https://topaithreats.com/glossary/adversarial-training/",
      "definition": "A machine learning defense technique in which a model is trained on adversarial examples — inputs specifically crafted to cause misclassification or incorrect outputs — alongside normal training data, with the goal of improving the model's robustness against adversarial attacks at inference time.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Adversarial_machine_learning"
      ],
      "citation": "TopAIThreats Glossary, \"Adversarial Training\", https://topaithreats.com/glossary/adversarial-training/."
    },
    {
      "cite_id": "glossary:agent-framework",
      "type": "glossary",
      "title": "Agent Framework",
      "url": "https://topaithreats.com/glossary/agent-framework/",
      "definition": "A software library or platform that provides the infrastructure for building AI agents — autonomous systems that use large language models to reason, plan, and execute multi-step tasks by invoking tools, managing memory, and coordinating with other agents. Common examples include LangChain, AutoGen, CrewAI, and the OpenAI Agents SDK.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Agent Framework\", https://topaithreats.com/glossary/agent-framework/."
    },
    {
      "cite_id": "glossary:agent-propagation",
      "type": "glossary",
      "title": "Agent Propagation",
      "url": "https://topaithreats.com/glossary/agent-propagation/",
      "definition": "The spread of errors, hallucinations, or adversarial inputs from one AI agent to others in connected multi-agent systems, potentially causing cascading failures.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Agent Propagation\", https://topaithreats.com/glossary/agent-propagation/."
    },
    {
      "cite_id": "glossary:agent-safety",
      "type": "glossary",
      "title": "Agent Safety",
      "url": "https://topaithreats.com/glossary/agent-safety/",
      "definition": "The field of ensuring AI agents operate within intended boundaries and do not cause unintended harm through autonomous actions, tool use, or goal pursuit.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Agent Safety\", https://topaithreats.com/glossary/agent-safety/."
    },
    {
      "cite_id": "glossary:agentic-ai",
      "type": "glossary",
      "title": "Agentic AI",
      "url": "https://topaithreats.com/glossary/agentic-ai/",
      "definition": "AI systems that autonomously plan and execute multi-step actions with minimal human oversight.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Intelligent_agent",
        "https://www.wikidata.org/wiki/Q1142726"
      ],
      "citation": "TopAIThreats Glossary, \"Agentic AI\", https://topaithreats.com/glossary/agentic-ai/."
    },
    {
      "cite_id": "glossary:ai-risk-management-framework",
      "type": "glossary",
      "title": "AI Risk Management Framework",
      "url": "https://topaithreats.com/glossary/ai-risk-management-framework/",
      "definition": "A structured methodology published by the US National Institute of Standards and Technology (NIST) that provides organisations with a systematic approach to identifying, assessing, and mitigating risks associated with AI systems throughout their lifecycle. The NIST AI RMF (AI 100-1) is a voluntary, non-sector-specific framework applicable to all AI technologies.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Artificial_Intelligence_Risk_Management_Framework"
      ],
      "citation": "TopAIThreats Glossary, \"AI Risk Management Framework\", https://topaithreats.com/glossary/ai-risk-management-framework/."
    },
    {
      "cite_id": "glossary:ai-safety",
      "type": "glossary",
      "title": "AI Safety",
      "url": "https://topaithreats.com/glossary/ai-safety/",
      "definition": "The field of research and practice dedicated to ensuring that artificial intelligence systems operate reliably within intended boundaries and do not cause unintended harm to humans, society, or the environment.",
      "same_as": [
        "https://en.wikipedia.org/wiki/AI_safety"
      ],
      "citation": "TopAIThreats Glossary, \"AI Safety\", https://topaithreats.com/glossary/ai-safety/."
    },
    {
      "cite_id": "glossary:ai-generated-code",
      "type": "glossary",
      "title": "AI-Generated Code",
      "url": "https://topaithreats.com/glossary/ai-generated-code/",
      "definition": "Code produced by AI systems, which can be used for both legitimate software development and malicious purposes including malware creation and vulnerability exploitation.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"AI-Generated Code\", https://topaithreats.com/glossary/ai-generated-code/."
    },
    {
      "cite_id": "glossary:alert-fatigue",
      "type": "glossary",
      "title": "Alert Fatigue",
      "url": "https://topaithreats.com/glossary/alert-fatigue/",
      "definition": "Desensitisation of human operators to system warnings due to excessive or poorly calibrated alerts, reducing the effectiveness of human oversight over AI systems.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Alarm_fatigue",
        "https://www.wikidata.org/wiki/Q16002361"
      ],
      "citation": "TopAIThreats Glossary, \"Alert Fatigue\", https://topaithreats.com/glossary/alert-fatigue/."
    },
    {
      "cite_id": "glossary:algorithmic-amplification",
      "type": "glossary",
      "title": "Algorithmic Amplification",
      "url": "https://topaithreats.com/glossary/algorithmic-amplification/",
      "definition": "The process by which recommendation algorithms and content curation systems disproportionately promote certain content, amplifying its reach and societal impact beyond organic levels.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Algorithmic_amplification"
      ],
      "citation": "TopAIThreats Glossary, \"Algorithmic Amplification\", https://topaithreats.com/glossary/algorithmic-amplification/."
    },
    {
      "cite_id": "glossary:algorithmic-bias",
      "type": "glossary",
      "title": "Algorithmic Bias",
      "url": "https://topaithreats.com/glossary/algorithmic-bias/",
      "definition": "Systematic errors in AI systems that produce unfair outcomes, often favouring one group over another.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Algorithmic_bias",
        "https://www.wikidata.org/wiki/Q45253460"
      ],
      "citation": "TopAIThreats Glossary, \"Algorithmic Bias\", https://topaithreats.com/glossary/algorithmic-bias/."
    },
    {
      "cite_id": "glossary:algorithmic-trading",
      "type": "glossary",
      "title": "Algorithmic Trading",
      "url": "https://topaithreats.com/glossary/algorithmic-trading/",
      "definition": "The use of AI algorithms to execute financial trades at speeds and volumes exceeding human capability, introducing systemic risks including flash crashes and market manipulation.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Algorithmic_trading",
        "https://www.wikidata.org/wiki/Q139445"
      ],
      "citation": "TopAIThreats Glossary, \"Algorithmic Trading\", https://topaithreats.com/glossary/algorithmic-trading/."
    },
    {
      "cite_id": "glossary:alignment",
      "type": "glossary",
      "title": "Alignment",
      "url": "https://topaithreats.com/glossary/alignment/",
      "definition": "The property of an AI system whose objectives, decision-making processes, and behaviours remain consistent with human values, intentions, and safety requirements. Alignment is a foundational challenge in AI safety research.",
      "same_as": [
        "https://en.wikipedia.org/wiki/AI_alignment",
        "https://www.wikidata.org/wiki/Q24882728"
      ],
      "citation": "TopAIThreats Glossary, \"Alignment\", https://topaithreats.com/glossary/alignment/."
    },
    {
      "cite_id": "glossary:allocational-harm",
      "type": "glossary",
      "title": "Allocational Harm",
      "url": "https://topaithreats.com/glossary/allocational-harm/",
      "definition": "Unfair distribution of resources, opportunities, or services when AI systems systematically disadvantage certain groups in consequential decisions such as hiring, lending, or housing.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Allocational Harm\", https://topaithreats.com/glossary/allocational-harm/."
    },
    {
      "cite_id": "glossary:anonymization",
      "type": "glossary",
      "title": "Anonymization",
      "url": "https://topaithreats.com/glossary/anonymization/",
      "definition": "The process of removing or obscuring personally identifiable information from datasets to protect individual privacy, which AI techniques can increasingly defeat through re-identification attacks.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Data_anonymization",
        "https://www.wikidata.org/wiki/Q17006654"
      ],
      "citation": "TopAIThreats Glossary, \"Anonymization\", https://topaithreats.com/glossary/anonymization/."
    },
    {
      "cite_id": "glossary:artificial-general-intelligence",
      "type": "glossary",
      "title": "Artificial General Intelligence (AGI)",
      "url": "https://topaithreats.com/glossary/artificial-general-intelligence/",
      "definition": "A hypothetical AI system capable of performing any intellectual task that a human can, with the ability to transfer learning across domains without task-specific programming.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Artificial_general_intelligence",
        "https://www.wikidata.org/wiki/Q5765679"
      ],
      "citation": "TopAIThreats Glossary, \"Artificial General Intelligence (AGI)\", https://topaithreats.com/glossary/artificial-general-intelligence/."
    },
    {
      "cite_id": "glossary:attack-surface",
      "type": "glossary",
      "title": "Attack Surface",
      "url": "https://topaithreats.com/glossary/attack-surface/",
      "definition": "The totality of entry points, interfaces, and pathways through which an adversary can attempt to interact with, extract data from, or inject inputs into an AI system. In machine learning contexts, the attack surface extends beyond traditional software boundaries to include training pipelines, model APIs, prompt interfaces, tool integrations, and data ingestion channels.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Attack_surface"
      ],
      "citation": "TopAIThreats Glossary, \"Attack Surface\", https://topaithreats.com/glossary/attack-surface/."
    },
    {
      "cite_id": "glossary:attribute-inference",
      "type": "glossary",
      "title": "Attribute Inference",
      "url": "https://topaithreats.com/glossary/attribute-inference/",
      "definition": "Using AI to deduce sensitive personal characteristics such as health status, political affiliation, or sexual orientation from seemingly innocuous data patterns.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Attribute Inference\", https://topaithreats.com/glossary/attribute-inference/."
    },
    {
      "cite_id": "glossary:authority-transfer",
      "type": "glossary",
      "title": "Authority Transfer",
      "url": "https://topaithreats.com/glossary/authority-transfer/",
      "definition": "The gradual, often unrecognised shift of decision-making power from humans to AI systems, eroding meaningful human control over consequential outcomes.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Authority Transfer\", https://topaithreats.com/glossary/authority-transfer/."
    },
    {
      "cite_id": "glossary:automated-decision-making",
      "type": "glossary",
      "title": "Automated Decision-Making",
      "url": "https://topaithreats.com/glossary/automated-decision-making/",
      "definition": "Using algorithms or AI to make decisions affecting individuals with limited human review.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Automated_decision-making",
        "https://www.wikidata.org/wiki/Q108704339"
      ],
      "citation": "TopAIThreats Glossary, \"Automated Decision-Making\", https://topaithreats.com/glossary/automated-decision-making/."
    },
    {
      "cite_id": "glossary:automated-exploit",
      "type": "glossary",
      "title": "Automated Exploit",
      "url": "https://topaithreats.com/glossary/automated-exploit/",
      "definition": "AI-driven tools that automatically discover and exploit software vulnerabilities without human intervention, accelerating the pace and scale of cyber attacks.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Automated Exploit\", https://topaithreats.com/glossary/automated-exploit/."
    },
    {
      "cite_id": "glossary:automated-vulnerability-discovery",
      "type": "glossary",
      "title": "Automated Vulnerability Discovery",
      "url": "https://topaithreats.com/glossary/automated-vulnerability-discovery/",
      "definition": "Using AI to autonomously identify security weaknesses in software, networks, or systems.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Vulnerability_(computing)"
      ],
      "citation": "TopAIThreats Glossary, \"Automated Vulnerability Discovery\", https://topaithreats.com/glossary/automated-vulnerability-discovery/."
    },
    {
      "cite_id": "glossary:automation",
      "type": "glossary",
      "title": "Automation",
      "url": "https://topaithreats.com/glossary/automation/",
      "definition": "The use of AI to perform tasks previously requiring human labour, spanning physical, cognitive, and creative work, with implications for employment and economic structures.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Automation",
        "https://www.wikidata.org/wiki/Q184199"
      ],
      "citation": "TopAIThreats Glossary, \"Automation\", https://topaithreats.com/glossary/automation/."
    },
    {
      "cite_id": "glossary:automation-bias",
      "type": "glossary",
      "title": "Automation Bias",
      "url": "https://topaithreats.com/glossary/automation-bias/",
      "definition": "The tendency to favour automated system outputs over independent human judgement, even when incorrect.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Automation_bias",
        "https://www.wikidata.org/wiki/Q16948492"
      ],
      "citation": "TopAIThreats Glossary, \"Automation Bias\", https://topaithreats.com/glossary/automation-bias/."
    },
    {
      "cite_id": "glossary:autonomous-vehicle",
      "type": "glossary",
      "title": "Autonomous Vehicle",
      "url": "https://topaithreats.com/glossary/autonomous-vehicle/",
      "definition": "A vehicle using AI to navigate and operate without direct human control.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Self-driving_car",
        "https://www.wikidata.org/wiki/Q741490"
      ],
      "citation": "TopAIThreats Glossary, \"Autonomous Vehicle\", https://topaithreats.com/glossary/autonomous-vehicle/."
    },
    {
      "cite_id": "glossary:autonomous-weapons",
      "type": "glossary",
      "title": "Autonomous Weapons",
      "url": "https://topaithreats.com/glossary/autonomous-weapons/",
      "definition": "Weapon systems that use artificial intelligence to select and engage targets without meaningful human control over the critical functions of target identification, tracking, and engagement.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Lethal_autonomous_weapon",
        "https://www.wikidata.org/wiki/Q25378861"
      ],
      "citation": "TopAIThreats Glossary, \"Autonomous Weapons\", https://topaithreats.com/glossary/autonomous-weapons/."
    },
    {
      "cite_id": "glossary:autonomy",
      "type": "glossary",
      "title": "Autonomy",
      "url": "https://topaithreats.com/glossary/autonomy/",
      "definition": "The capacity of individuals to make self-directed decisions free from undue external influence or automated override, which AI systems can undermine through manipulation or substitution.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Autonomy",
        "https://www.wikidata.org/wiki/Q484105"
      ],
      "citation": "TopAIThreats Glossary, \"Autonomy\", https://topaithreats.com/glossary/autonomy/."
    },
    {
      "cite_id": "glossary:backdoor-attack",
      "type": "glossary",
      "title": "Backdoor Attack",
      "url": "https://topaithreats.com/glossary/backdoor-attack/",
      "definition": "A covert modification to an AI model during training that causes targeted misclassification or malicious behaviour when a specific trigger pattern is present in the input.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Backdoor_(computing)",
        "https://www.wikidata.org/wiki/Q254569"
      ],
      "citation": "TopAIThreats Glossary, \"Backdoor Attack\", https://topaithreats.com/glossary/backdoor-attack/."
    },
    {
      "cite_id": "glossary:behavioral-profiling",
      "type": "glossary",
      "title": "Behavioral Profiling",
      "url": "https://topaithreats.com/glossary/behavioral-profiling/",
      "definition": "The systematic collection and analysis of individual behaviour patterns by AI systems to predict preferences, intentions, or future actions, often without informed consent.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Behavioral Profiling\", https://topaithreats.com/glossary/behavioral-profiling/."
    },
    {
      "cite_id": "glossary:biological-threat",
      "type": "glossary",
      "title": "Biological Threat",
      "url": "https://topaithreats.com/glossary/biological-threat/",
      "definition": "The risk of AI systems being used to design, enhance, or disseminate biological agents capable of causing widespread harm to human health or ecosystems.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Biological Threat\", https://topaithreats.com/glossary/biological-threat/."
    },
    {
      "cite_id": "glossary:biometric-data",
      "type": "glossary",
      "title": "Biometric Data",
      "url": "https://topaithreats.com/glossary/biometric-data/",
      "definition": "Measurable physical or behavioural characteristics used to identify or authenticate individuals.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Biometrics",
        "https://www.wikidata.org/wiki/Q177765"
      ],
      "citation": "TopAIThreats Glossary, \"Biometric Data\", https://topaithreats.com/glossary/biometric-data/."
    },
    {
      "cite_id": "glossary:biosecurity",
      "type": "glossary",
      "title": "Biosecurity",
      "url": "https://topaithreats.com/glossary/biosecurity/",
      "definition": "The set of measures, policies, and practices designed to protect against biological threats, including the prevention of AI-enabled acceleration of pathogen design, synthesis, or dissemination of dangerous biological knowledge.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Biosecurity",
        "https://www.wikidata.org/wiki/Q803874"
      ],
      "citation": "TopAIThreats Glossary, \"Biosecurity\", https://topaithreats.com/glossary/biosecurity/."
    },
    {
      "cite_id": "glossary:black-box-system",
      "type": "glossary",
      "title": "Black-Box System",
      "url": "https://topaithreats.com/glossary/black-box-system/",
      "definition": "An AI system whose internal decision-making processes are opaque or incomprehensible to users, operators, and auditors, making accountability and error correction difficult.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Black_box",
        "https://www.wikidata.org/wiki/Q29256"
      ],
      "citation": "TopAIThreats Glossary, \"Black-Box System\", https://topaithreats.com/glossary/black-box-system/."
    },
    {
      "cite_id": "glossary:business-email-compromise",
      "type": "glossary",
      "title": "Business Email Compromise",
      "url": "https://topaithreats.com/glossary/business-email-compromise/",
      "definition": "Targeted fraud impersonating executives or trusted contacts to authorise fraudulent transactions.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Business_email_compromise",
        "https://www.wikidata.org/wiki/Q4019220"
      ],
      "citation": "TopAIThreats Glossary, \"Business Email Compromise\", https://topaithreats.com/glossary/business-email-compromise/."
    },
    {
      "cite_id": "glossary:c2pa",
      "type": "glossary",
      "title": "C2PA",
      "url": "https://topaithreats.com/glossary/c2pa/",
      "definition": "The Coalition for Content Provenance and Authenticity (C2PA) is a technical standards body that develops specifications for certifying the source and history of digital content through cryptographically signed metadata. C2PA content credentials enable verification of whether content was created by a human, edited, or generated by AI.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Coalition_for_Content_Provenance_and_Authenticity"
      ],
      "citation": "TopAIThreats Glossary, \"C2PA\", https://topaithreats.com/glossary/c2pa/."
    },
    {
      "cite_id": "glossary:cascading-failure",
      "type": "glossary",
      "title": "Cascading Failure",
      "url": "https://topaithreats.com/glossary/cascading-failure/",
      "definition": "A process in which the failure of one component in an interconnected system triggers a sequence of failures in dependent components, potentially leading to the collapse of an entire system or network of systems.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Cascading_failure",
        "https://www.wikidata.org/wiki/Q5048226"
      ],
      "citation": "TopAIThreats Glossary, \"Cascading Failure\", https://topaithreats.com/glossary/cascading-failure/."
    },
    {
      "cite_id": "glossary:chain-of-thought",
      "type": "glossary",
      "title": "Chain of Thought",
      "url": "https://topaithreats.com/glossary/chain-of-thought/",
      "definition": "A prompting and reasoning technique in which a large language model is encouraged to produce intermediate reasoning steps before arriving at a final answer, rather than generating the answer directly. Chain-of-thought reasoning improves accuracy on complex tasks but can also introduce new failure modes including hallucinated reasoning and cascading errors in multi-step processes.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Prompt_engineering"
      ],
      "citation": "TopAIThreats Glossary, \"Chain of Thought\", https://topaithreats.com/glossary/chain-of-thought/."
    },
    {
      "cite_id": "glossary:chatbot",
      "type": "glossary",
      "title": "Chatbot",
      "url": "https://topaithreats.com/glossary/chatbot/",
      "definition": "A software application that uses natural language processing or large language models to conduct text-based or voice-based conversations with users, ranging from rule-based systems to general-purpose AI assistants.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Chatbot"
      ],
      "citation": "TopAIThreats Glossary, \"Chatbot\", https://topaithreats.com/glossary/chatbot/."
    },
    {
      "cite_id": "glossary:complacency",
      "type": "glossary",
      "title": "Complacency",
      "url": "https://topaithreats.com/glossary/complacency/",
      "definition": "A state of reduced vigilance in human operators who develop excessive trust in AI system reliability, leading to failures in oversight and error detection.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Complacency"
      ],
      "citation": "TopAIThreats Glossary, \"Complacency\", https://topaithreats.com/glossary/complacency/."
    },
    {
      "cite_id": "glossary:confabulation",
      "type": "glossary",
      "title": "Confabulation",
      "url": "https://topaithreats.com/glossary/confabulation/",
      "definition": "The generation of plausible but factually incorrect information by AI systems, presented with unwarranted confidence.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Confabulation_(neural_networks)",
        "https://www.wikidata.org/wiki/Q5159625"
      ],
      "citation": "TopAIThreats Glossary, \"Confabulation\", https://topaithreats.com/glossary/confabulation/."
    },
    {
      "cite_id": "glossary:consent",
      "type": "glossary",
      "title": "Consent",
      "url": "https://topaithreats.com/glossary/consent/",
      "definition": "The principle that individuals should provide informed, voluntary agreement before their data is collected or processed by AI systems.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Consent",
        "https://www.wikidata.org/wiki/Q231043"
      ],
      "citation": "TopAIThreats Glossary, \"Consent\", https://topaithreats.com/glossary/consent/."
    },
    {
      "cite_id": "glossary:contagion",
      "type": "glossary",
      "title": "Contagion",
      "url": "https://topaithreats.com/glossary/contagion/",
      "definition": "The spread of harmful outputs, compromised states, or adversarial inputs between connected AI agents.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Contagion\", https://topaithreats.com/glossary/contagion/."
    },
    {
      "cite_id": "glossary:content-authenticity",
      "type": "glossary",
      "title": "Content Authenticity",
      "url": "https://topaithreats.com/glossary/content-authenticity/",
      "definition": "Standards and technologies for verifying the origin, integrity, and editing history of digital media.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Content Authenticity\", https://topaithreats.com/glossary/content-authenticity/."
    },
    {
      "cite_id": "glossary:content-moderation",
      "type": "glossary",
      "title": "Content Moderation",
      "url": "https://topaithreats.com/glossary/content-moderation/",
      "definition": "The process of monitoring, reviewing, and enforcing policies on user-generated or AI-generated content to prevent the distribution of harmful, illegal, or policy-violating material.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Content_moderation"
      ],
      "citation": "TopAIThreats Glossary, \"Content Moderation\", https://topaithreats.com/glossary/content-moderation/."
    },
    {
      "cite_id": "glossary:context-injection",
      "type": "glossary",
      "title": "Context Injection",
      "url": "https://topaithreats.com/glossary/context-injection/",
      "definition": "Manipulating an AI agent's context window or retrieved information to influence its reasoning and outputs.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Context Injection\", https://topaithreats.com/glossary/context-injection/."
    },
    {
      "cite_id": "glossary:context-window",
      "type": "glossary",
      "title": "Context Window",
      "url": "https://topaithreats.com/glossary/context-window/",
      "definition": "The maximum amount of text (measured in tokens) that a large language model can process in a single interaction, encompassing all input (system prompt, conversation history, retrieved documents, tool outputs) and generated output. The context window defines the boundary of what the model can perceive and reason about at any given time.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Context Window\", https://topaithreats.com/glossary/context-window/."
    },
    {
      "cite_id": "glossary:coordinated-inauthentic-behavior",
      "type": "glossary",
      "title": "Coordinated Inauthentic Behavior",
      "url": "https://topaithreats.com/glossary/coordinated-inauthentic-behavior/",
      "definition": "Organised networks of fake or compromised accounts using AI to simulate grassroots activity and manipulate public discourse.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Coordinated Inauthentic Behavior\", https://topaithreats.com/glossary/coordinated-inauthentic-behavior/."
    },
    {
      "cite_id": "glossary:coordination-failure",
      "type": "glossary",
      "title": "Coordination Failure",
      "url": "https://topaithreats.com/glossary/coordination-failure/",
      "definition": "When multiple AI agents working toward shared objectives produce unintended or harmful outcomes due to misaligned strategies.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Coordination Failure\", https://topaithreats.com/glossary/coordination-failure/."
    },
    {
      "cite_id": "glossary:cyber-espionage",
      "type": "glossary",
      "title": "Cyber Espionage",
      "url": "https://topaithreats.com/glossary/cyber-espionage/",
      "definition": "Covert digital intrusion to access and exfiltrate sensitive data, increasingly augmented by AI.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Cyber_espionage",
        "https://www.wikidata.org/wiki/Q1039245"
      ],
      "citation": "TopAIThreats Glossary, \"Cyber Espionage\", https://topaithreats.com/glossary/cyber-espionage/."
    },
    {
      "cite_id": "glossary:dark-pattern",
      "type": "glossary",
      "title": "Dark Pattern",
      "url": "https://topaithreats.com/glossary/dark-pattern/",
      "definition": "A deceptive user interface design that manipulates individuals into making decisions they would not otherwise make, increasingly amplified by AI-driven personalisation.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Dark_pattern",
        "https://www.wikidata.org/wiki/Q30325366"
      ],
      "citation": "TopAIThreats Glossary, \"Dark Pattern\", https://topaithreats.com/glossary/dark-pattern/."
    },
    {
      "cite_id": "glossary:data-bias",
      "type": "glossary",
      "title": "Data Bias",
      "url": "https://topaithreats.com/glossary/data-bias/",
      "definition": "Systematic errors in training datasets that reflect historical inequities, leading to discriminatory AI outputs.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Bias_(statistics)",
        "https://www.wikidata.org/wiki/Q15222032"
      ],
      "citation": "TopAIThreats Glossary, \"Data Bias\", https://topaithreats.com/glossary/data-bias/."
    },
    {
      "cite_id": "glossary:data-concentration",
      "type": "glossary",
      "title": "Data Concentration",
      "url": "https://topaithreats.com/glossary/data-concentration/",
      "definition": "The accumulation of vast datasets by a small number of organisations, creating asymmetric advantages and barriers to competition.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Data Concentration\", https://topaithreats.com/glossary/data-concentration/."
    },
    {
      "cite_id": "glossary:data-extraction",
      "type": "glossary",
      "title": "Data Extraction",
      "url": "https://topaithreats.com/glossary/data-extraction/",
      "definition": "Techniques for recovering private training data or sensitive information from AI models through systematic querying.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Data Extraction\", https://topaithreats.com/glossary/data-extraction/."
    },
    {
      "cite_id": "glossary:data-leakage",
      "type": "glossary",
      "title": "Data Leakage",
      "url": "https://topaithreats.com/glossary/data-leakage/",
      "definition": "Unintended exposure of sensitive or personal data, including through AI system inputs or outputs.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Data_breach",
        "https://www.wikidata.org/wiki/Q1172486"
      ],
      "citation": "TopAIThreats Glossary, \"Data Leakage\", https://topaithreats.com/glossary/data-leakage/."
    },
    {
      "cite_id": "glossary:data-poisoning",
      "type": "glossary",
      "title": "Data Poisoning",
      "url": "https://topaithreats.com/glossary/data-poisoning/",
      "definition": "The deliberate corruption or manipulation of training data used to build machine learning models, causing them to learn incorrect patterns, produce biased outputs, or contain hidden backdoors exploitable by an attacker.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Data_poisoning",
        "https://www.wikidata.org/wiki/Q124511804"
      ],
      "citation": "TopAIThreats Glossary, \"Data Poisoning\", https://topaithreats.com/glossary/data-poisoning/."
    },
    {
      "cite_id": "glossary:data-protection",
      "type": "glossary",
      "title": "Data Protection",
      "url": "https://topaithreats.com/glossary/data-protection/",
      "definition": "Legal and technical frameworks governing collection, processing, and sharing of personal data.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Information_privacy",
        "https://www.wikidata.org/wiki/Q456632"
      ],
      "citation": "TopAIThreats Glossary, \"Data Protection\", https://topaithreats.com/glossary/data-protection/."
    },
    {
      "cite_id": "glossary:decision-loop",
      "type": "glossary",
      "title": "Decision Loop",
      "url": "https://topaithreats.com/glossary/decision-loop/",
      "definition": "An automated cycle where AI systems make decisions, observe outcomes, and adjust subsequent decisions without human intervention.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Decision Loop\", https://topaithreats.com/glossary/decision-loop/."
    },
    {
      "cite_id": "glossary:deepfake",
      "type": "glossary",
      "title": "Deepfake",
      "url": "https://topaithreats.com/glossary/deepfake/",
      "definition": "AI-generated synthetic media that convincingly replicates the appearance, voice, or actions of real individuals.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Deepfake",
        "https://www.wikidata.org/wiki/Q49473179"
      ],
      "citation": "TopAIThreats Glossary, \"Deepfake\", https://topaithreats.com/glossary/deepfake/."
    },
    {
      "cite_id": "glossary:defense-in-depth",
      "type": "glossary",
      "title": "Defense in Depth",
      "url": "https://topaithreats.com/glossary/defense-in-depth/",
      "definition": "A security strategy that employs multiple independent layers of protection so that if one layer fails, subsequent layers continue to provide security. Applied to AI systems, defense in depth combines input validation, output filtering, sandboxing, access controls, monitoring, and human oversight to mitigate threats that no single control can fully address.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Defense_in_depth_(computing)",
        "https://www.wikidata.org/wiki/Q1181095"
      ],
      "citation": "TopAIThreats Glossary, \"Defense in Depth\", https://topaithreats.com/glossary/defense-in-depth/."
    },
    {
      "cite_id": "glossary:democratic-integrity",
      "type": "glossary",
      "title": "Democratic Integrity",
      "url": "https://topaithreats.com/glossary/democratic-integrity/",
      "definition": "The preservation of fair, transparent, and trustworthy democratic processes against AI-enabled manipulation and erosion.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Democratic Integrity\", https://topaithreats.com/glossary/democratic-integrity/."
    },
    {
      "cite_id": "glossary:deskilling",
      "type": "glossary",
      "title": "Deskilling",
      "url": "https://topaithreats.com/glossary/deskilling/",
      "definition": "The reduction of human workers' skills, expertise, and professional judgment as AI systems assume complex cognitive tasks.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Deskilling\", https://topaithreats.com/glossary/deskilling/."
    },
    {
      "cite_id": "glossary:differential-privacy",
      "type": "glossary",
      "title": "Differential Privacy",
      "url": "https://topaithreats.com/glossary/differential-privacy/",
      "definition": "A mathematical framework that provides measurable privacy guarantees by adding calibrated noise to data or query results, limiting what can be inferred about any individual.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Differential_privacy",
        "https://www.wikidata.org/wiki/Q5275358"
      ],
      "citation": "TopAIThreats Glossary, \"Differential Privacy\", https://topaithreats.com/glossary/differential-privacy/."
    },
    {
      "cite_id": "glossary:diffusion-model",
      "type": "glossary",
      "title": "Diffusion Model",
      "url": "https://topaithreats.com/glossary/diffusion-model/",
      "definition": "A class of generative AI model that creates new data by learning to reverse a gradual noising process — starting from random noise and iteratively denoising it into coherent outputs such as images, video, or audio. Diffusion models power leading image generators including Stable Diffusion, DALL-E, and Midjourney.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Diffusion_model"
      ],
      "citation": "TopAIThreats Glossary, \"Diffusion Model\", https://topaithreats.com/glossary/diffusion-model/."
    },
    {
      "cite_id": "glossary:digital-monopoly",
      "type": "glossary",
      "title": "Digital Monopoly",
      "url": "https://topaithreats.com/glossary/digital-monopoly/",
      "definition": "Market dominance achieved through control of AI infrastructure, data assets, or foundational models.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Digital Monopoly\", https://topaithreats.com/glossary/digital-monopoly/."
    },
    {
      "cite_id": "glossary:digital-watermarking",
      "type": "glossary",
      "title": "Digital Watermarking",
      "url": "https://topaithreats.com/glossary/digital-watermarking/",
      "definition": "A technique that embeds imperceptible identifying information into digital content — images, audio, video, or text — to establish provenance, verify authenticity, or detect tampering. In AI contexts, digital watermarking is applied to AI-generated content to enable identification of synthetic media and support content authenticity verification.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Digital_watermarking",
        "https://www.wikidata.org/wiki/Q748758"
      ],
      "citation": "TopAIThreats Glossary, \"Digital Watermarking\", https://topaithreats.com/glossary/digital-watermarking/."
    },
    {
      "cite_id": "glossary:disinformation",
      "type": "glossary",
      "title": "Disinformation",
      "url": "https://topaithreats.com/glossary/disinformation/",
      "definition": "Deliberately false or misleading information created and spread to deceive, manipulate opinion, or cause harm.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Disinformation",
        "https://www.wikidata.org/wiki/Q189656"
      ],
      "citation": "TopAIThreats Glossary, \"Disinformation\", https://topaithreats.com/glossary/disinformation/."
    },
    {
      "cite_id": "glossary:disparate-impact",
      "type": "glossary",
      "title": "Disparate Impact",
      "url": "https://topaithreats.com/glossary/disparate-impact/",
      "definition": "When an AI system produces significantly different outcomes for different demographic groups, regardless of intent.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Disparate_impact",
        "https://www.wikidata.org/wiki/Q5282532"
      ],
      "citation": "TopAIThreats Glossary, \"Disparate Impact\", https://topaithreats.com/glossary/disparate-impact/."
    },
    {
      "cite_id": "glossary:dual-use",
      "type": "glossary",
      "title": "Dual-Use",
      "url": "https://topaithreats.com/glossary/dual-use/",
      "definition": "A characteristic of technologies, tools, or knowledge developed for beneficial purposes that can also be repurposed or exploited for harmful applications, a concept with particular relevance to AI capabilities in cybersecurity, biology, and information manipulation.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Dual-use_technology",
        "https://www.wikidata.org/wiki/Q1262529"
      ],
      "citation": "TopAIThreats Glossary, \"Dual-Use\", https://topaithreats.com/glossary/dual-use/."
    },
    {
      "cite_id": "glossary:elder-fraud",
      "type": "glossary",
      "title": "Elder Fraud",
      "url": "https://topaithreats.com/glossary/elder-fraud/",
      "definition": "Financial crimes targeting older adults, increasingly enabled by AI voice cloning, deepfakes, and automated robocalls.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Elder_abuse#Financial_abuse",
        "https://www.wikidata.org/wiki/Q427883"
      ],
      "citation": "TopAIThreats Glossary, \"Elder Fraud\", https://topaithreats.com/glossary/elder-fraud/."
    },
    {
      "cite_id": "glossary:election-interference",
      "type": "glossary",
      "title": "Election Interference",
      "url": "https://topaithreats.com/glossary/election-interference/",
      "definition": "Deliberate efforts to influence democratic elections through disinformation, voter suppression, or manipulation of public discourse.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Foreign_electoral_intervention",
        "https://www.wikidata.org/wiki/Q28456918"
      ],
      "citation": "TopAIThreats Glossary, \"Election Interference\", https://topaithreats.com/glossary/election-interference/."
    },
    {
      "cite_id": "glossary:emergent-behavior",
      "type": "glossary",
      "title": "Emergent Behavior",
      "url": "https://topaithreats.com/glossary/emergent-behavior/",
      "definition": "Unpredicted behaviors arising in AI systems from the interaction of simpler components, not explicitly programmed.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Emergence",
        "https://www.wikidata.org/wiki/Q215772"
      ],
      "citation": "TopAIThreats Glossary, \"Emergent Behavior\", https://topaithreats.com/glossary/emergent-behavior/."
    },
    {
      "cite_id": "glossary:engagement-optimization",
      "type": "glossary",
      "title": "Engagement Optimization",
      "url": "https://topaithreats.com/glossary/engagement-optimization/",
      "definition": "AI-driven maximisation of user attention and interaction, often at the expense of content quality and user wellbeing.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Engagement Optimization\", https://topaithreats.com/glossary/engagement-optimization/."
    },
    {
      "cite_id": "glossary:epistemic-crisis",
      "type": "glossary",
      "title": "Epistemic Crisis",
      "url": "https://topaithreats.com/glossary/epistemic-crisis/",
      "definition": "A societal condition where shared frameworks for establishing truth and knowledge break down.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Epistemic Crisis\", https://topaithreats.com/glossary/epistemic-crisis/."
    },
    {
      "cite_id": "glossary:erasure",
      "type": "glossary",
      "title": "Erasure",
      "url": "https://topaithreats.com/glossary/erasure/",
      "definition": "The systematic invisibility or underrepresentation of certain groups in AI training data, model outputs, or system design, leading to the denial of recognition, resources, or participation.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Erasure\", https://topaithreats.com/glossary/erasure/."
    },
    {
      "cite_id": "glossary:evasion-attack",
      "type": "glossary",
      "title": "Evasion Attack",
      "url": "https://topaithreats.com/glossary/evasion-attack/",
      "definition": "Adversarial inputs crafted to cause a deployed AI model to misclassify or fail to detect malicious content, allowing threats to bypass automated defenses.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Evasion_(machine_learning)"
      ],
      "citation": "TopAIThreats Glossary, \"Evasion Attack\", https://topaithreats.com/glossary/evasion-attack/."
    },
    {
      "cite_id": "glossary:existential-risk",
      "type": "glossary",
      "title": "Existential Risk",
      "url": "https://topaithreats.com/glossary/existential-risk/",
      "definition": "A risk threatening humanity's long-term survival, in AI contexts linked to unaligned superintelligent systems.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Existential_risk",
        "https://www.wikidata.org/wiki/Q137952474"
      ],
      "citation": "TopAIThreats Glossary, \"Existential Risk\", https://topaithreats.com/glossary/existential-risk/."
    },
    {
      "cite_id": "glossary:explainability",
      "type": "glossary",
      "title": "Explainability",
      "url": "https://topaithreats.com/glossary/explainability/",
      "definition": "The degree to which an AI system's decision-making process can be understood and interpreted by humans, enabling accountability, trust, and regulatory compliance.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Explainable_artificial_intelligence",
        "https://www.wikidata.org/wiki/Q40890078"
      ],
      "citation": "TopAIThreats Glossary, \"Explainability\", https://topaithreats.com/glossary/explainability/."
    },
    {
      "cite_id": "glossary:facial-recognition",
      "type": "glossary",
      "title": "Facial Recognition",
      "url": "https://topaithreats.com/glossary/facial-recognition/",
      "definition": "AI technology that identifies or verifies individuals by analysing facial features, with significant privacy and bias concerns.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Facial_recognition_system",
        "https://www.wikidata.org/wiki/Q1192553"
      ],
      "citation": "TopAIThreats Glossary, \"Facial Recognition\", https://topaithreats.com/glossary/facial-recognition/."
    },
    {
      "cite_id": "glossary:fairness",
      "type": "glossary",
      "title": "Fairness",
      "url": "https://topaithreats.com/glossary/fairness/",
      "definition": "The principle that AI systems should produce equitable outcomes across individuals and groups, encompassing multiple competing mathematical definitions and sociotechnical considerations.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Fairness_(machine_learning)",
        "https://www.wikidata.org/wiki/Q80100972"
      ],
      "citation": "TopAIThreats Glossary, \"Fairness\", https://topaithreats.com/glossary/fairness/."
    },
    {
      "cite_id": "glossary:feedback-loop",
      "type": "glossary",
      "title": "Feedback Loop",
      "url": "https://topaithreats.com/glossary/feedback-loop/",
      "definition": "A cycle where AI system outputs influence the data used for future training or decisions, potentially amplifying biases, errors, or unintended patterns over successive iterations.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Feedback",
        "https://www.wikidata.org/wiki/Q183635"
      ],
      "citation": "TopAIThreats Glossary, \"Feedback Loop\", https://topaithreats.com/glossary/feedback-loop/."
    },
    {
      "cite_id": "glossary:fine-tuning",
      "type": "glossary",
      "title": "Fine-Tuning",
      "url": "https://topaithreats.com/glossary/fine-tuning/",
      "definition": "The process of further training a pre-trained machine learning model on a smaller, task-specific or domain-specific dataset to adapt its behaviour, improve its performance on particular tasks, or align it with specific requirements. Fine-tuning modifies the model's weights rather than relying solely on prompt engineering.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Fine-tuning_(deep_learning)"
      ],
      "citation": "TopAIThreats Glossary, \"Fine-Tuning\", https://topaithreats.com/glossary/fine-tuning/."
    },
    {
      "cite_id": "glossary:flash-crash",
      "type": "glossary",
      "title": "Flash Crash",
      "url": "https://topaithreats.com/glossary/flash-crash/",
      "definition": "An extremely rapid and severe drop in asset prices — typically followed by a quick recovery — caused by the interaction of automated trading systems, algorithmic strategies, or AI-driven market participants that amplify market volatility through cascading automated responses faster than human intervention can arrest.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Flash_crash",
        "https://www.wikidata.org/wiki/Q1002197"
      ],
      "citation": "TopAIThreats Glossary, \"Flash Crash\", https://topaithreats.com/glossary/flash-crash/."
    },
    {
      "cite_id": "glossary:foundation-model",
      "type": "glossary",
      "title": "Foundation Model",
      "url": "https://topaithreats.com/glossary/foundation-model/",
      "definition": "A large-scale AI model trained on broad data that can be adapted to a wide range of downstream tasks through fine-tuning or prompting.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Foundation_model",
        "https://www.wikidata.org/wiki/Q112702082"
      ],
      "citation": "TopAIThreats Glossary, \"Foundation Model\", https://topaithreats.com/glossary/foundation-model/."
    },
    {
      "cite_id": "glossary:function-calling",
      "type": "glossary",
      "title": "Function Calling",
      "url": "https://topaithreats.com/glossary/function-calling/",
      "definition": "A capability of large language models that allows them to generate structured output requesting the invocation of external functions or tools, with specified parameters, rather than producing only natural language text. Function calling is the mechanism through which LLMs interact with APIs, databases, code interpreters, and other external systems.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Function Calling\", https://topaithreats.com/glossary/function-calling/."
    },
    {
      "cite_id": "glossary:gdpr",
      "type": "glossary",
      "title": "GDPR",
      "url": "https://topaithreats.com/glossary/gdpr/",
      "definition": "The EU's General Data Protection Regulation establishing comprehensive rules for personal data processing and storage.",
      "same_as": [
        "https://en.wikipedia.org/wiki/General_Data_Protection_Regulation",
        "https://www.wikidata.org/wiki/Q1172506"
      ],
      "citation": "TopAIThreats Glossary, \"GDPR\", https://topaithreats.com/glossary/gdpr/."
    },
    {
      "cite_id": "glossary:generative-adversarial-network",
      "type": "glossary",
      "title": "Generative Adversarial Network",
      "url": "https://topaithreats.com/glossary/generative-adversarial-network/",
      "definition": "A class of machine learning architecture consisting of two neural networks — a generator and a discriminator — trained in opposition, where the generator learns to produce synthetic data and the discriminator learns to distinguish synthetic from real data. GANs are a foundational technology behind deepfakes and other synthetic media.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Generative_adversarial_network",
        "https://www.wikidata.org/wiki/Q26007855"
      ],
      "citation": "TopAIThreats Glossary, \"Generative Adversarial Network\", https://topaithreats.com/glossary/generative-adversarial-network/."
    },
    {
      "cite_id": "glossary:goal-drift",
      "type": "glossary",
      "title": "Goal Drift",
      "url": "https://topaithreats.com/glossary/goal-drift/",
      "definition": "The gradual divergence of an AI agent's effective objectives from its originally specified goals during extended autonomous operation, resulting in behavior that no longer aligns with its operators' intentions.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Goal Drift\", https://topaithreats.com/glossary/goal-drift/."
    },
    {
      "cite_id": "glossary:goodharts-law",
      "type": "glossary",
      "title": "Goodhart's Law",
      "url": "https://topaithreats.com/glossary/goodharts-law/",
      "definition": "The principle that when a measure becomes a target, it ceases to be a good measure — applied to AI systems, it explains why agents that optimize a proxy metric often fail to achieve the intended objective.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Goodhart%27s_law"
      ],
      "citation": "TopAIThreats Glossary, \"Goodhart's Law\", https://topaithreats.com/glossary/goodharts-law/."
    },
    {
      "cite_id": "glossary:governance",
      "type": "glossary",
      "title": "Governance",
      "url": "https://topaithreats.com/glossary/governance/",
      "definition": "The frameworks, policies, and institutions through which AI systems are regulated, overseen, and held accountable across their lifecycle from development through deployment and retirement.",
      "same_as": [
        "https://en.wikipedia.org/wiki/AI_governance",
        "https://www.wikidata.org/wiki/Q130610796"
      ],
      "citation": "TopAIThreats Glossary, \"Governance\", https://topaithreats.com/glossary/governance/."
    },
    {
      "cite_id": "glossary:grandparent-scam",
      "type": "glossary",
      "title": "Grandparent Scam",
      "url": "https://topaithreats.com/glossary/grandparent-scam/",
      "definition": "A social engineering fraud using AI voice cloning to impersonate a grandchild and convince older adults to send money.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Grandparent_scam",
        "https://www.wikidata.org/wiki/Q62014727"
      ],
      "citation": "TopAIThreats Glossary, \"Grandparent Scam\", https://topaithreats.com/glossary/grandparent-scam/."
    },
    {
      "cite_id": "glossary:guardrail",
      "type": "glossary",
      "title": "Guardrail",
      "url": "https://topaithreats.com/glossary/guardrail/",
      "definition": "A safety mechanism — implemented through training constraints, input/output filters, or system-level rules — that restricts an AI system's behavior to prevent harmful, policy-violating, or unintended outputs.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Guardrails_(artificial_intelligence)"
      ],
      "citation": "TopAIThreats Glossary, \"Guardrail\", https://topaithreats.com/glossary/guardrail/."
    },
    {
      "cite_id": "glossary:hallucination",
      "type": "glossary",
      "title": "Hallucination",
      "url": "https://topaithreats.com/glossary/hallucination/",
      "definition": "The generation of confident but factually incorrect or fabricated output by a language model, including invented citations.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Hallucination_(artificial_intelligence)",
        "https://www.wikidata.org/wiki/Q116197048"
      ],
      "citation": "TopAIThreats Glossary, \"Hallucination\", https://topaithreats.com/glossary/hallucination/."
    },
    {
      "cite_id": "glossary:human-agency",
      "type": "glossary",
      "title": "Human Agency",
      "url": "https://topaithreats.com/glossary/human-agency/",
      "definition": "The capacity of individuals to make autonomous, informed decisions and exercise meaningful control over actions that affect their lives, increasingly at risk as AI systems assume decision-making authority.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Agency_(philosophy)",
        "https://www.wikidata.org/wiki/Q3951828"
      ],
      "citation": "TopAIThreats Glossary, \"Human Agency\", https://topaithreats.com/glossary/human-agency/."
    },
    {
      "cite_id": "glossary:human-in-the-loop",
      "type": "glossary",
      "title": "Human-in-the-Loop",
      "url": "https://topaithreats.com/glossary/human-in-the-loop/",
      "definition": "A design principle requiring meaningful human oversight and intervention at critical decision points in AI-driven processes.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Human-in-the-loop",
        "https://www.wikidata.org/wiki/Q5936775"
      ],
      "citation": "TopAIThreats Glossary, \"Human-in-the-Loop\", https://topaithreats.com/glossary/human-in-the-loop/."
    },
    {
      "cite_id": "glossary:indirect-prompt-injection",
      "type": "glossary",
      "title": "Indirect Prompt Injection",
      "url": "https://topaithreats.com/glossary/indirect-prompt-injection/",
      "definition": "A class of prompt injection attack where malicious instructions are embedded in external data sources — such as web pages, documents, emails, or database records — that an AI system retrieves and processes, causing the model to execute the attacker's instructions without the user's knowledge or intent.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Prompt_injection"
      ],
      "citation": "TopAIThreats Glossary, \"Indirect Prompt Injection\", https://topaithreats.com/glossary/indirect-prompt-injection/."
    },
    {
      "cite_id": "glossary:information-ecosystem",
      "type": "glossary",
      "title": "Information Ecosystem",
      "url": "https://topaithreats.com/glossary/information-ecosystem/",
      "definition": "The interconnected network of media, platforms, institutions, and individuals through which information is created, distributed, consumed, and verified within a society.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Information Ecosystem\", https://topaithreats.com/glossary/information-ecosystem/."
    },
    {
      "cite_id": "glossary:information-integrity",
      "type": "glossary",
      "title": "Information Integrity",
      "url": "https://topaithreats.com/glossary/information-integrity/",
      "definition": "The trustworthiness, accuracy, and reliability of information within digital systems and public discourse, encompassing both the factual correctness of content and the authenticity of its provenance.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Information Integrity\", https://topaithreats.com/glossary/information-integrity/."
    },
    {
      "cite_id": "glossary:infrastructure-dependency",
      "type": "glossary",
      "title": "Infrastructure Dependency",
      "url": "https://topaithreats.com/glossary/infrastructure-dependency/",
      "definition": "Critical reliance of essential services on shared AI systems, creating vulnerability to widespread failure if those systems malfunction, degrade, or become unavailable.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Infrastructure Dependency\", https://topaithreats.com/glossary/infrastructure-dependency/."
    },
    {
      "cite_id": "glossary:input-validation",
      "type": "glossary",
      "title": "Input Validation",
      "url": "https://topaithreats.com/glossary/input-validation/",
      "definition": "The process of verifying that data received by an AI system conforms to expected formats, constraints, and safety requirements before it is processed. In AI contexts, input validation extends beyond traditional type-checking to include prompt filtering, injection detection, content policy enforcement, and semantic boundary verification.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Data_validation"
      ],
      "citation": "TopAIThreats Glossary, \"Input Validation\", https://topaithreats.com/glossary/input-validation/."
    },
    {
      "cite_id": "glossary:institutional-trust",
      "type": "glossary",
      "title": "Institutional Trust",
      "url": "https://topaithreats.com/glossary/institutional-trust/",
      "definition": "Public confidence in the reliability, competence, and good faith of societal institutions including government, media, scientific bodies, and the judiciary, which AI-enabled threats can systematically erode.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Institutional Trust\", https://topaithreats.com/glossary/institutional-trust/."
    },
    {
      "cite_id": "glossary:instruction-hierarchy",
      "type": "glossary",
      "title": "Instruction Hierarchy",
      "url": "https://topaithreats.com/glossary/instruction-hierarchy/",
      "definition": "A security mechanism for large language models that establishes a priority ordering among different instruction sources — typically system prompt (highest priority), user messages (medium), and retrieved content or tool outputs (lowest) — to prevent lower-priority instructions from overriding higher-priority ones.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Instruction Hierarchy\", https://topaithreats.com/glossary/instruction-hierarchy/."
    },
    {
      "cite_id": "glossary:instrumental-convergence",
      "type": "glossary",
      "title": "Instrumental Convergence",
      "url": "https://topaithreats.com/glossary/instrumental-convergence/",
      "definition": "The hypothesis that sufficiently advanced AI systems pursuing a wide range of final goals would converge on acquiring certain instrumental sub-goals — including self-preservation, resource acquisition, and goal stability — because these sub-goals are useful for achieving almost any terminal objective.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Instrumental_convergence"
      ],
      "citation": "TopAIThreats Glossary, \"Instrumental Convergence\", https://topaithreats.com/glossary/instrumental-convergence/."
    },
    {
      "cite_id": "glossary:international-humanitarian-law",
      "type": "glossary",
      "title": "International Humanitarian Law",
      "url": "https://topaithreats.com/glossary/international-humanitarian-law/",
      "definition": "The body of international law governing armed conflict, including rules on distinction, proportionality, and precaution, whose application to AI-enabled weapons systems raises fundamental questions of compliance and accountability.",
      "same_as": [
        "https://en.wikipedia.org/wiki/International_humanitarian_law",
        "https://www.wikidata.org/wiki/Q381148"
      ],
      "citation": "TopAIThreats Glossary, \"International Humanitarian Law\", https://topaithreats.com/glossary/international-humanitarian-law/."
    },
    {
      "cite_id": "glossary:jailbreak-attack",
      "type": "glossary",
      "title": "Jailbreak Attack",
      "url": "https://topaithreats.com/glossary/jailbreak-attack/",
      "definition": "A technique that circumvents an AI model's built-in safety alignment and content policies to elicit restricted or harmful outputs.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Jailbreaking_(large_language_models)"
      ],
      "citation": "TopAIThreats Glossary, \"Jailbreak Attack\", https://topaithreats.com/glossary/jailbreak-attack/."
    },
    {
      "cite_id": "glossary:job-displacement",
      "type": "glossary",
      "title": "Job Displacement",
      "url": "https://topaithreats.com/glossary/job-displacement/",
      "definition": "The elimination, significant degradation, or structural transformation of human employment as AI-driven automation replaces tasks, roles, or entire occupational categories previously performed by workers.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Technological_unemployment",
        "https://www.wikidata.org/wiki/Q7692538"
      ],
      "citation": "TopAIThreats Glossary, \"Job Displacement\", https://topaithreats.com/glossary/job-displacement/."
    },
    {
      "cite_id": "glossary:large-language-model",
      "type": "glossary",
      "title": "Large Language Model",
      "url": "https://topaithreats.com/glossary/large-language-model/",
      "definition": "A neural network trained on massive text datasets to generate, summarise, and reason about natural language.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Large_language_model",
        "https://www.wikidata.org/wiki/Q115305900"
      ],
      "citation": "TopAIThreats Glossary, \"Large Language Model\", https://topaithreats.com/glossary/large-language-model/."
    },
    {
      "cite_id": "glossary:least-privilege",
      "type": "glossary",
      "title": "Least Privilege",
      "url": "https://topaithreats.com/glossary/least-privilege/",
      "definition": "A security principle requiring that any entity — user, process, or AI agent — is granted only the minimum permissions necessary to perform its intended function and no more. Applied to AI systems, least privilege constrains model access to tools, data, APIs, and system resources to reduce the blast radius of compromise or misuse.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Principle_of_least_privilege",
        "https://www.wikidata.org/wiki/Q516475"
      ],
      "citation": "TopAIThreats Glossary, \"Least Privilege\", https://topaithreats.com/glossary/least-privilege/."
    },
    {
      "cite_id": "glossary:lethal-autonomous-weapon",
      "type": "glossary",
      "title": "Lethal Autonomous Weapon",
      "url": "https://topaithreats.com/glossary/lethal-autonomous-weapon/",
      "definition": "A weapon system that can select and engage targets without meaningful human control over the critical functions of target identification, tracking, and attack execution.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Lethal_autonomous_weapon"
      ],
      "citation": "TopAIThreats Glossary, \"Lethal Autonomous Weapon\", https://topaithreats.com/glossary/lethal-autonomous-weapon/."
    },
    {
      "cite_id": "glossary:laws",
      "type": "glossary",
      "title": "Lethal Autonomous Weapon Systems (LAWS)",
      "url": "https://topaithreats.com/glossary/laws/",
      "definition": "Weapons systems that can independently select and engage targets without meaningful human control over individual attack decisions, raising fundamental legal, ethical, and security concerns.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Lethal_autonomous_weapon",
        "https://www.wikidata.org/wiki/Q25378861"
      ],
      "citation": "TopAIThreats Glossary, \"Lethal Autonomous Weapon Systems (LAWS)\", https://topaithreats.com/glossary/laws/."
    },
    {
      "cite_id": "glossary:liars-dividend",
      "type": "glossary",
      "title": "Liar's Dividend",
      "url": "https://topaithreats.com/glossary/liars-dividend/",
      "definition": "The phenomenon where the mere existence of deepfakes and AI-generated media allows individuals to dismiss authentic evidence — including genuine photographs, videos, and audio recordings — as potentially fabricated. The liar's dividend erodes the evidentiary value of all digital media, benefiting those who wish to deny documented events.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Liar's Dividend\", https://topaithreats.com/glossary/liars-dividend/."
    },
    {
      "cite_id": "glossary:malware",
      "type": "glossary",
      "title": "Malware",
      "url": "https://topaithreats.com/glossary/malware/",
      "definition": "Malicious software designed to infiltrate, damage, or gain unauthorized access to computer systems. In the context of AI threats, malware increasingly leverages machine learning to evade detection, adapt to defenses, and automate attack strategies.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Malware",
        "https://www.wikidata.org/wiki/Q14001"
      ],
      "citation": "TopAIThreats Glossary, \"Malware\", https://topaithreats.com/glossary/malware/."
    },
    {
      "cite_id": "glossary:manipulative-design",
      "type": "glossary",
      "title": "Manipulative Design",
      "url": "https://topaithreats.com/glossary/manipulative-design/",
      "definition": "Interface patterns that exploit cognitive biases and AI personalisation to steer user behaviour against their interests, undermining informed consent and autonomous decision-making.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Manipulative Design\", https://topaithreats.com/glossary/manipulative-design/."
    },
    {
      "cite_id": "glossary:market-manipulation",
      "type": "glossary",
      "title": "Market Manipulation",
      "url": "https://topaithreats.com/glossary/market-manipulation/",
      "definition": "The use of AI systems to artificially influence the price, volume, or conditions of financial markets through algorithmic trading strategies, coordinated information campaigns, or exploitation of market microstructure vulnerabilities.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Market_manipulation",
        "https://www.wikidata.org/wiki/Q400707"
      ],
      "citation": "TopAIThreats Glossary, \"Market Manipulation\", https://topaithreats.com/glossary/market-manipulation/."
    },
    {
      "cite_id": "glossary:market-power",
      "type": "glossary",
      "title": "Market Power",
      "url": "https://topaithreats.com/glossary/market-power/",
      "definition": "The ability of dominant AI firms to control market conditions, pricing, and access to essential AI infrastructure and data, concentrating economic influence in ways that limit competition and innovation.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Market Power\", https://topaithreats.com/glossary/market-power/."
    },
    {
      "cite_id": "glossary:mass-surveillance",
      "type": "glossary",
      "title": "Mass Surveillance",
      "url": "https://topaithreats.com/glossary/mass-surveillance/",
      "definition": "Broad, indiscriminate monitoring of populations using AI technologies such as facial recognition and communications interception.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Mass_surveillance",
        "https://www.wikidata.org/wiki/Q1425056"
      ],
      "citation": "TopAIThreats Glossary, \"Mass Surveillance\", https://topaithreats.com/glossary/mass-surveillance/."
    },
    {
      "cite_id": "glossary:media-manipulation",
      "type": "glossary",
      "title": "Media Manipulation",
      "url": "https://topaithreats.com/glossary/media-manipulation/",
      "definition": "The deliberate alteration or fabrication of media content using AI to deceive, mislead, or influence public perception, encompassing deepfakes, synthetic text, and manipulated imagery.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Media Manipulation\", https://topaithreats.com/glossary/media-manipulation/."
    },
    {
      "cite_id": "glossary:membership-inference",
      "type": "glossary",
      "title": "Membership Inference",
      "url": "https://topaithreats.com/glossary/membership-inference/",
      "definition": "An attack technique that determines whether a specific data record was included in an AI model's training dataset, potentially revealing sensitive information about individuals whose data was used.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Membership_inference_attack"
      ],
      "citation": "TopAIThreats Glossary, \"Membership Inference\", https://topaithreats.com/glossary/membership-inference/."
    },
    {
      "cite_id": "glossary:memory-poisoning",
      "type": "glossary",
      "title": "Memory Poisoning",
      "url": "https://topaithreats.com/glossary/memory-poisoning/",
      "definition": "The deliberate corruption of an AI agent's persistent memory, context window, or stored state to manipulate its future decisions, outputs, or behavior without the agent or its operators detecting the alteration.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Memory Poisoning\", https://topaithreats.com/glossary/memory-poisoning/."
    },
    {
      "cite_id": "glossary:misalignment",
      "type": "glossary",
      "title": "Misalignment",
      "url": "https://topaithreats.com/glossary/misalignment/",
      "definition": "A condition in which an AI system's operational behaviour diverges from the objectives, values, or intentions specified by its designers, potentially causing unintended harm at varying scales.",
      "same_as": [
        "https://en.wikipedia.org/wiki/AI_alignment",
        "https://www.wikidata.org/wiki/Q24882728"
      ],
      "citation": "TopAIThreats Glossary, \"Misalignment\", https://topaithreats.com/glossary/misalignment/."
    },
    {
      "cite_id": "glossary:misinformation",
      "type": "glossary",
      "title": "Misinformation",
      "url": "https://topaithreats.com/glossary/misinformation/",
      "definition": "False or inaccurate information spread without deliberate intent to deceive, distinct from disinformation which involves intentional deception. AI-generated hallucinations represent a major and growing source.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Misinformation",
        "https://www.wikidata.org/wiki/Q13579947"
      ],
      "citation": "TopAIThreats Glossary, \"Misinformation\", https://topaithreats.com/glossary/misinformation/."
    },
    {
      "cite_id": "glossary:mitre-atlas",
      "type": "glossary",
      "title": "MITRE ATLAS",
      "url": "https://topaithreats.com/glossary/mitre-atlas/",
      "definition": "The Adversarial Threat Landscape for AI Systems (ATLAS) is a knowledge base maintained by MITRE Corporation that catalogues adversarial tactics, techniques, and procedures (TTPs) targeting machine learning systems. Modelled on the MITRE ATT&CK framework for cybersecurity, ATLAS provides a structured taxonomy of AI-specific attacks with documented case studies.",
      "same_as": [
        "https://en.wikipedia.org/wiki/MITRE_Corporation"
      ],
      "citation": "TopAIThreats Glossary, \"MITRE ATLAS\", https://topaithreats.com/glossary/mitre-atlas/."
    },
    {
      "cite_id": "glossary:model-context-protocol",
      "type": "glossary",
      "title": "Model Context Protocol",
      "url": "https://topaithreats.com/glossary/model-context-protocol/",
      "definition": "An open protocol, developed by Anthropic, that standardises how AI applications connect to external data sources and tools. MCP provides a universal interface for language models to access databases, APIs, file systems, and other services through a client-server architecture, replacing fragmented custom integrations.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Model Context Protocol\", https://topaithreats.com/glossary/model-context-protocol/."
    },
    {
      "cite_id": "glossary:model-inversion",
      "type": "glossary",
      "title": "Model Inversion",
      "url": "https://topaithreats.com/glossary/model-inversion/",
      "definition": "An attack technique that reconstructs private or sensitive information from a machine learning model's training data by systematically analyzing the model's outputs, predictions, or confidence scores.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Model_inversion_attack"
      ],
      "citation": "TopAIThreats Glossary, \"Model Inversion\", https://topaithreats.com/glossary/model-inversion/."
    },
    {
      "cite_id": "glossary:model-provenance",
      "type": "glossary",
      "title": "Model Provenance",
      "url": "https://topaithreats.com/glossary/model-provenance/",
      "definition": "The documented chain of custody for an AI model — tracing its origin, training data, fine-tuning history, and distribution path to verify integrity and authenticity.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Provenance"
      ],
      "citation": "TopAIThreats Glossary, \"Model Provenance\", https://topaithreats.com/glossary/model-provenance/."
    },
    {
      "cite_id": "glossary:multi-agent-system",
      "type": "glossary",
      "title": "Multi-Agent System",
      "url": "https://topaithreats.com/glossary/multi-agent-system/",
      "definition": "A computational architecture in which multiple autonomous AI agents interact, cooperate, or compete to accomplish tasks. These systems introduce emergent risks from coordination failures, conflicting objectives, and cascading errors between agents.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Multi-agent_system",
        "https://www.wikidata.org/wiki/Q529909"
      ],
      "citation": "TopAIThreats Glossary, \"Multi-Agent System\", https://topaithreats.com/glossary/multi-agent-system/."
    },
    {
      "cite_id": "glossary:non-consensual-intimate-imagery",
      "type": "glossary",
      "title": "Non-Consensual Intimate Imagery",
      "url": "https://topaithreats.com/glossary/non-consensual-intimate-imagery/",
      "definition": "Sexually explicit images or videos created or distributed without the depicted person's consent, increasingly generated using AI deepfake tools.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Non-consensual_intimate_imagery"
      ],
      "citation": "TopAIThreats Glossary, \"Non-Consensual Intimate Imagery\", https://topaithreats.com/glossary/non-consensual-intimate-imagery/."
    },
    {
      "cite_id": "glossary:output-sandboxing",
      "type": "glossary",
      "title": "Output Sandboxing",
      "url": "https://topaithreats.com/glossary/output-sandboxing/",
      "definition": "A security control that constrains and validates the outputs of an AI system before they are executed, displayed, or passed to downstream systems. Output sandboxing prevents AI-generated content — including code, tool calls, and formatted text — from causing unintended effects outside a controlled environment.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Output Sandboxing\", https://topaithreats.com/glossary/output-sandboxing/."
    },
    {
      "cite_id": "glossary:overreliance",
      "type": "glossary",
      "title": "Overreliance",
      "url": "https://topaithreats.com/glossary/overreliance/",
      "definition": "Excessive dependence on AI system outputs without adequate independent verification or critical evaluation, leading to unchecked errors and diminished human judgment capacity.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Overreliance\", https://topaithreats.com/glossary/overreliance/."
    },
    {
      "cite_id": "glossary:owasp-top-10-llm",
      "type": "glossary",
      "title": "OWASP Top 10 for LLM Applications",
      "url": "https://topaithreats.com/glossary/owasp-top-10-llm/",
      "definition": "A security awareness document published by the Open Web Application Security Project (OWASP) that identifies the ten most critical security vulnerabilities specific to applications built on large language models. The list provides standardised vulnerability descriptions, risk ratings, and mitigation guidance for LLM-integrated systems.",
      "same_as": [
        "https://en.wikipedia.org/wiki/OWASP"
      ],
      "citation": "TopAIThreats Glossary, \"OWASP Top 10 for LLM Applications\", https://topaithreats.com/glossary/owasp-top-10-llm/."
    },
    {
      "cite_id": "glossary:persistent-memory",
      "type": "glossary",
      "title": "Persistent Memory",
      "url": "https://topaithreats.com/glossary/persistent-memory/",
      "definition": "The capacity of AI agents to retain and recall information across interactions, enabling continuity of context but creating new attack surfaces for data poisoning and unauthorized knowledge accumulation.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Persistent Memory\", https://topaithreats.com/glossary/persistent-memory/."
    },
    {
      "cite_id": "glossary:persuasive-technology",
      "type": "glossary",
      "title": "Persuasive Technology",
      "url": "https://topaithreats.com/glossary/persuasive-technology/",
      "definition": "Systems designed to change user attitudes or behaviours through AI-powered personalisation, nudging, and emotional targeting, raising concerns about autonomy and informed consent.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Persuasive_technology",
        "https://www.wikidata.org/wiki/Q2902255"
      ],
      "citation": "TopAIThreats Glossary, \"Persuasive Technology\", https://topaithreats.com/glossary/persuasive-technology/."
    },
    {
      "cite_id": "glossary:phishing",
      "type": "glossary",
      "title": "Phishing",
      "url": "https://topaithreats.com/glossary/phishing/",
      "definition": "A social engineering attack using fraudulent messages to trick recipients into revealing credentials, installing malware, or transferring funds.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Phishing",
        "https://www.wikidata.org/wiki/Q135005"
      ],
      "citation": "TopAIThreats Glossary, \"Phishing\", https://topaithreats.com/glossary/phishing/."
    },
    {
      "cite_id": "glossary:polymorphic-malware",
      "type": "glossary",
      "title": "Polymorphic Malware",
      "url": "https://topaithreats.com/glossary/polymorphic-malware/",
      "definition": "Malicious software that uses AI to continuously alter its code signature while maintaining functionality, evading detection by signature-based and AI-powered security systems.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Polymorphic_code",
        "https://www.wikidata.org/wiki/Q950981"
      ],
      "citation": "TopAIThreats Glossary, \"Polymorphic Malware\", https://topaithreats.com/glossary/polymorphic-malware/."
    },
    {
      "cite_id": "glossary:price-fixing",
      "type": "glossary",
      "title": "Price Fixing",
      "url": "https://topaithreats.com/glossary/price-fixing/",
      "definition": "AI-facilitated coordination of pricing among competitors, whether through explicit collusion or emergent algorithmic convergence that produces cartel-like outcomes without direct human agreement.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Price_fixing",
        "https://www.wikidata.org/wiki/Q1200230"
      ],
      "citation": "TopAIThreats Glossary, \"Price Fixing\", https://topaithreats.com/glossary/price-fixing/."
    },
    {
      "cite_id": "glossary:privilege-escalation",
      "type": "glossary",
      "title": "Privilege Escalation",
      "url": "https://topaithreats.com/glossary/privilege-escalation/",
      "definition": "The exploitation of a system vulnerability or misconfiguration to gain elevated access rights beyond those originally authorized. In AI contexts, this includes AI agents acquiring capabilities or permissions that exceed their intended operational boundaries.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Privilege_escalation",
        "https://www.wikidata.org/wiki/Q1856893"
      ],
      "citation": "TopAIThreats Glossary, \"Privilege Escalation\", https://topaithreats.com/glossary/privilege-escalation/."
    },
    {
      "cite_id": "glossary:profiling",
      "type": "glossary",
      "title": "Profiling",
      "url": "https://topaithreats.com/glossary/profiling/",
      "definition": "The automated processing of personal data to evaluate, categorise, or predict individual characteristics and behaviour, enabling targeted decisions that may affect rights and opportunities.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Profiling_(information_science)",
        "https://www.wikidata.org/wiki/Q7248282"
      ],
      "citation": "TopAIThreats Glossary, \"Profiling\", https://topaithreats.com/glossary/profiling/."
    },
    {
      "cite_id": "glossary:prompt-injection",
      "type": "glossary",
      "title": "Prompt Injection",
      "url": "https://topaithreats.com/glossary/prompt-injection/",
      "definition": "An attack that inserts adversarial instructions into an AI model's input to override its intended behaviour, bypass safety constraints, or extract restricted information.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Prompt_injection",
        "https://www.wikidata.org/wiki/Q116737628"
      ],
      "citation": "TopAIThreats Glossary, \"Prompt Injection\", https://topaithreats.com/glossary/prompt-injection/."
    },
    {
      "cite_id": "glossary:propaganda",
      "type": "glossary",
      "title": "Propaganda",
      "url": "https://topaithreats.com/glossary/propaganda/",
      "definition": "Deliberately crafted messaging designed to influence public opinion, now amplified by AI-generated content and automated distribution at unprecedented speed and scale.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Propaganda",
        "https://www.wikidata.org/wiki/Q7281"
      ],
      "citation": "TopAIThreats Glossary, \"Propaganda\", https://topaithreats.com/glossary/propaganda/."
    },
    {
      "cite_id": "glossary:protected-characteristics",
      "type": "glossary",
      "title": "Protected Characteristics",
      "url": "https://topaithreats.com/glossary/protected-characteristics/",
      "definition": "Legally defined attributes such as race, gender, age, disability, and religion that anti-discrimination law prohibits as bases for adverse treatment in decisions affecting individuals.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Protected Characteristics\", https://topaithreats.com/glossary/protected-characteristics/."
    },
    {
      "cite_id": "glossary:proxy-discrimination",
      "type": "glossary",
      "title": "Proxy Discrimination",
      "url": "https://topaithreats.com/glossary/proxy-discrimination/",
      "definition": "A form of algorithmic discrimination where AI systems use ostensibly neutral variables that correlate with protected characteristics, producing biased outcomes without explicitly referencing protected attributes.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Proxy_discrimination"
      ],
      "citation": "TopAIThreats Glossary, \"Proxy Discrimination\", https://topaithreats.com/glossary/proxy-discrimination/."
    },
    {
      "cite_id": "glossary:proxy-variable",
      "type": "glossary",
      "title": "Proxy Variable",
      "url": "https://topaithreats.com/glossary/proxy-variable/",
      "definition": "A data attribute that correlates with a protected characteristic, enabling indirect algorithmic discrimination even when the protected attribute is excluded.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Proxy_(statistics)",
        "https://www.wikidata.org/wiki/Q1432581"
      ],
      "citation": "TopAIThreats Glossary, \"Proxy Variable\", https://topaithreats.com/glossary/proxy-variable/."
    },
    {
      "cite_id": "glossary:pseudonymization",
      "type": "glossary",
      "title": "Pseudonymization",
      "url": "https://topaithreats.com/glossary/pseudonymization/",
      "definition": "Replacing direct identifiers in datasets with artificial identifiers while maintaining data utility, a privacy-enhancing technique required by GDPR but vulnerable to AI-powered re-identification.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Pseudonymization",
        "https://www.wikidata.org/wiki/Q567618"
      ],
      "citation": "TopAIThreats Glossary, \"Pseudonymization\", https://topaithreats.com/glossary/pseudonymization/."
    },
    {
      "cite_id": "glossary:re-identification",
      "type": "glossary",
      "title": "Re-Identification",
      "url": "https://topaithreats.com/glossary/re-identification/",
      "definition": "The process of linking supposedly anonymised or de-identified data back to specific individuals, a capability dramatically enhanced by AI techniques that can cross-reference diverse data sources.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Data_re-identification",
        "https://www.wikidata.org/wiki/Q30314042"
      ],
      "citation": "TopAIThreats Glossary, \"Re-Identification\", https://topaithreats.com/glossary/re-identification/."
    },
    {
      "cite_id": "glossary:recommendation-system",
      "type": "glossary",
      "title": "Recommendation System",
      "url": "https://topaithreats.com/glossary/recommendation-system/",
      "definition": "AI systems that suggest content, products, or actions to users based on predicted preferences, shaping information exposure and individual choices at scale.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Recommender_system",
        "https://www.wikidata.org/wiki/Q554950"
      ],
      "citation": "TopAIThreats Glossary, \"Recommendation System\", https://topaithreats.com/glossary/recommendation-system/."
    },
    {
      "cite_id": "glossary:recursive-self-improvement",
      "type": "glossary",
      "title": "Recursive Self-Improvement",
      "url": "https://topaithreats.com/glossary/recursive-self-improvement/",
      "definition": "A theoretical AI capability in which a system iteratively enhances its own architecture or reasoning, potentially leading to rapid capability gains.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Recursive_self-improvement",
        "https://www.wikidata.org/wiki/Q1768494"
      ],
      "citation": "TopAIThreats Glossary, \"Recursive Self-Improvement\", https://topaithreats.com/glossary/recursive-self-improvement/."
    },
    {
      "cite_id": "glossary:red-teaming",
      "type": "glossary",
      "title": "Red Teaming",
      "url": "https://topaithreats.com/glossary/red-teaming/",
      "definition": "Structured adversarial testing of AI systems to identify vulnerabilities, safety failures, and harmful capabilities before deployment.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Red_team",
        "https://www.wikidata.org/wiki/Q7305396"
      ],
      "citation": "TopAIThreats Glossary, \"Red Teaming\", https://topaithreats.com/glossary/red-teaming/."
    },
    {
      "cite_id": "glossary:remote-code-execution",
      "type": "glossary",
      "title": "Remote Code Execution",
      "url": "https://topaithreats.com/glossary/remote-code-execution/",
      "definition": "A class of security vulnerability that allows an attacker to run arbitrary code on a target system from a remote location. In AI contexts, remote code execution risks arise when language models with code execution capabilities are manipulated through prompt injection or tool misuse to execute attacker-controlled commands.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Arbitrary_code_execution",
        "https://www.wikidata.org/wiki/Q4786079"
      ],
      "citation": "TopAIThreats Glossary, \"Remote Code Execution\", https://topaithreats.com/glossary/remote-code-execution/."
    },
    {
      "cite_id": "glossary:representation-gap",
      "type": "glossary",
      "title": "Representation Gap",
      "url": "https://topaithreats.com/glossary/representation-gap/",
      "definition": "Significant disparities between groups in training data coverage, leading to AI systems that perform poorly or produce biased outcomes for underrepresented populations.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Representation Gap\", https://topaithreats.com/glossary/representation-gap/."
    },
    {
      "cite_id": "glossary:representational-harm",
      "type": "glossary",
      "title": "Representational Harm",
      "url": "https://topaithreats.com/glossary/representational-harm/",
      "definition": "Harm that occurs when AI systems reinforce stereotypes, erase identities, or demean social groups through biased outputs, even in the absence of direct material consequences.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Representational Harm\", https://topaithreats.com/glossary/representational-harm/."
    },
    {
      "cite_id": "glossary:retrieval-augmented-generation",
      "type": "glossary",
      "title": "Retrieval-Augmented Generation (RAG)",
      "url": "https://topaithreats.com/glossary/retrieval-augmented-generation/",
      "definition": "An architecture that enhances language model responses by retrieving relevant documents from external knowledge bases and including them in the model's context window alongside the user's query.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Retrieval-augmented_generation"
      ],
      "citation": "TopAIThreats Glossary, \"Retrieval-Augmented Generation (RAG)\", https://topaithreats.com/glossary/retrieval-augmented-generation/."
    },
    {
      "cite_id": "glossary:reward-hacking",
      "type": "glossary",
      "title": "Reward Hacking",
      "url": "https://topaithreats.com/glossary/reward-hacking/",
      "definition": "When an AI agent finds unintended ways to maximise its reward signal that satisfy the formal objective but violate the designer's actual intent, exploiting gaps between specified and intended goals.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Reward_hacking",
        "https://www.wikidata.org/wiki/Q123900749"
      ],
      "citation": "TopAIThreats Glossary, \"Reward Hacking\", https://topaithreats.com/glossary/reward-hacking/."
    },
    {
      "cite_id": "glossary:rlhf",
      "type": "glossary",
      "title": "RLHF (Reinforcement Learning from Human Feedback)",
      "url": "https://topaithreats.com/glossary/rlhf/",
      "definition": "A training technique that aligns language model behavior with human preferences by using human evaluators to rank model outputs, then training the model to prefer higher-ranked responses.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Reinforcement_learning_from_human_feedback"
      ],
      "citation": "TopAIThreats Glossary, \"RLHF (Reinforcement Learning from Human Feedback)\", https://topaithreats.com/glossary/rlhf/."
    },
    {
      "cite_id": "glossary:robocall",
      "type": "glossary",
      "title": "Robocall",
      "url": "https://topaithreats.com/glossary/robocall/",
      "definition": "An automated telephone call delivering a pre-recorded or AI-synthesised message, increasingly used in fraud, scams, and disinformation campaigns.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Robocall",
        "https://www.wikidata.org/wiki/Q7353270"
      ],
      "citation": "TopAIThreats Glossary, \"Robocall\", https://topaithreats.com/glossary/robocall/."
    },
    {
      "cite_id": "glossary:robustness",
      "type": "glossary",
      "title": "Robustness",
      "url": "https://topaithreats.com/glossary/robustness/",
      "definition": "The ability of an AI system to maintain correct and reliable performance when faced with adversarial inputs, distribution shifts, or unexpected operating conditions.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Robustness_(computer_science)",
        "https://www.wikidata.org/wiki/Q2524240"
      ],
      "citation": "TopAIThreats Glossary, \"Robustness\", https://topaithreats.com/glossary/robustness/."
    },
    {
      "cite_id": "glossary:safety-critical",
      "type": "glossary",
      "title": "Safety-Critical",
      "url": "https://topaithreats.com/glossary/safety-critical/",
      "definition": "Systems where AI failure could result in death, serious injury, or significant environmental damage, requiring the highest standards of testing, oversight, and human control.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Safety-Critical\", https://topaithreats.com/glossary/safety-critical/."
    },
    {
      "cite_id": "glossary:self-determination",
      "type": "glossary",
      "title": "Self-Determination",
      "url": "https://topaithreats.com/glossary/self-determination/",
      "definition": "The right and capacity of individuals to make meaningful choices about their own lives without undue influence or constraint from automated systems.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Self-determination",
        "https://www.wikidata.org/wiki/Q156595"
      ],
      "citation": "TopAIThreats Glossary, \"Self-Determination\", https://topaithreats.com/glossary/self-determination/."
    },
    {
      "cite_id": "glossary:self-replication",
      "type": "glossary",
      "title": "Self-Replication",
      "url": "https://topaithreats.com/glossary/self-replication/",
      "definition": "The ability of an AI system to autonomously create copies of itself, including its model weights, code, or operational configuration, on new compute infrastructure without explicit human authorisation. Self-replication is an emergent capability concern for advanced AI systems, particularly agentic systems with access to code execution and network resources.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Self-Replication\", https://topaithreats.com/glossary/self-replication/."
    },
    {
      "cite_id": "glossary:sensitive-data",
      "type": "glossary",
      "title": "Sensitive Data",
      "url": "https://topaithreats.com/glossary/sensitive-data/",
      "definition": "Personal information revealing racial origin, political opinions, health status, sexual orientation, or other characteristics that require heightened protection under data protection law.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Sensitive Data\", https://topaithreats.com/glossary/sensitive-data/."
    },
    {
      "cite_id": "glossary:single-point-of-failure",
      "type": "glossary",
      "title": "Single Point of Failure",
      "url": "https://topaithreats.com/glossary/single-point-of-failure/",
      "definition": "A component whose failure causes an entire system to stop functioning, particularly concerning when AI systems or their underlying infrastructure become critical dependencies without adequate redundancy.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Single_point_of_failure",
        "https://www.wikidata.org/wiki/Q1363179"
      ],
      "citation": "TopAIThreats Glossary, \"Single Point of Failure\", https://topaithreats.com/glossary/single-point-of-failure/."
    },
    {
      "cite_id": "glossary:smishing",
      "type": "glossary",
      "title": "Smishing",
      "url": "https://topaithreats.com/glossary/smishing/",
      "definition": "A phishing attack conducted via SMS text messages, often using AI to generate convincing, contextually relevant lures.",
      "same_as": [
        "https://en.wikipedia.org/wiki/SMS_phishing",
        "https://www.wikidata.org/wiki/Q2571495"
      ],
      "citation": "TopAIThreats Glossary, \"Smishing\", https://topaithreats.com/glossary/smishing/."
    },
    {
      "cite_id": "glossary:social-engineering",
      "type": "glossary",
      "title": "Social Engineering",
      "url": "https://topaithreats.com/glossary/social-engineering/",
      "definition": "Psychological manipulation techniques that exploit human trust, authority, and urgency to trick individuals into revealing credentials, authorizing transactions, or granting system access.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Social_engineering_(security)"
      ],
      "citation": "TopAIThreats Glossary, \"Social Engineering\", https://topaithreats.com/glossary/social-engineering/."
    },
    {
      "cite_id": "glossary:social-scoring",
      "type": "glossary",
      "title": "Social Scoring",
      "url": "https://topaithreats.com/glossary/social-scoring/",
      "definition": "AI systems that assign scores to individuals based on behaviour, social connections, or personal characteristics, used to determine access to services, opportunities, or freedoms.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Social_Credit_System"
      ],
      "citation": "TopAIThreats Glossary, \"Social Scoring\", https://topaithreats.com/glossary/social-scoring/."
    },
    {
      "cite_id": "glossary:specification-gaming",
      "type": "glossary",
      "title": "Specification Gaming",
      "url": "https://topaithreats.com/glossary/specification-gaming/",
      "definition": "A failure mode in which an AI system finds an unintended way to achieve high scores on its specified objective without fulfilling the designer's actual intent. The system exploits loopholes, ambiguities, or oversights in the reward function or evaluation criteria to satisfy the literal specification while violating its spirit.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Specification Gaming\", https://topaithreats.com/glossary/specification-gaming/."
    },
    {
      "cite_id": "glossary:stereotyping",
      "type": "glossary",
      "title": "Stereotyping",
      "url": "https://topaithreats.com/glossary/stereotyping/",
      "definition": "AI systems reproducing or amplifying oversimplified, generalised characterisations of social groups in their outputs, reinforcing harmful preconceptions at scale.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Stereotype",
        "https://www.wikidata.org/wiki/Q167172"
      ],
      "citation": "TopAIThreats Glossary, \"Stereotyping\", https://topaithreats.com/glossary/stereotyping/."
    },
    {
      "cite_id": "glossary:superintelligence",
      "type": "glossary",
      "title": "Superintelligence",
      "url": "https://topaithreats.com/glossary/superintelligence/",
      "definition": "A hypothetical AI system that surpasses human cognitive ability across virtually all domains, including reasoning, planning, and social intelligence.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Superintelligence",
        "https://www.wikidata.org/wiki/Q1566000"
      ],
      "citation": "TopAIThreats Glossary, \"Superintelligence\", https://topaithreats.com/glossary/superintelligence/."
    },
    {
      "cite_id": "glossary:supply-chain-attack",
      "type": "glossary",
      "title": "Supply Chain Attack",
      "url": "https://topaithreats.com/glossary/supply-chain-attack/",
      "definition": "An attack that compromises a system by tampering with upstream components — model weights, datasets, software packages, or tool configurations — before they reach the deploying organization.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Supply_chain_attack"
      ],
      "citation": "TopAIThreats Glossary, \"Supply Chain Attack\", https://topaithreats.com/glossary/supply-chain-attack/."
    },
    {
      "cite_id": "glossary:synthetic-identity",
      "type": "glossary",
      "title": "Synthetic Identity",
      "url": "https://topaithreats.com/glossary/synthetic-identity/",
      "definition": "A fabricated identity constructed by combining real and fictitious personal information — such as genuine Social Security numbers with fake names and addresses — or by using AI-generated biometric data (face images, voice prints) to create a persona that does not correspond to any real individual but can pass identity verification systems.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Synthetic_identity_theft"
      ],
      "citation": "TopAIThreats Glossary, \"Synthetic Identity\", https://topaithreats.com/glossary/synthetic-identity/."
    },
    {
      "cite_id": "glossary:synthetic-media",
      "type": "glossary",
      "title": "Synthetic Media",
      "url": "https://topaithreats.com/glossary/synthetic-media/",
      "definition": "Media content — video, audio, images, or text — wholly or partially generated or manipulated by AI.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Synthetic_media",
        "https://www.wikidata.org/wiki/Q96407327"
      ],
      "citation": "TopAIThreats Glossary, \"Synthetic Media\", https://topaithreats.com/glossary/synthetic-media/."
    },
    {
      "cite_id": "glossary:system-prompt",
      "type": "glossary",
      "title": "System Prompt",
      "url": "https://topaithreats.com/glossary/system-prompt/",
      "definition": "A set of instructions provided to a language model by the application developer that defines the model's role, behavior constraints, and operational context — distinct from user input but processed in the same token stream.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"System Prompt\", https://topaithreats.com/glossary/system-prompt/."
    },
    {
      "cite_id": "glossary:systemic-risk",
      "type": "glossary",
      "title": "Systemic Risk",
      "url": "https://topaithreats.com/glossary/systemic-risk/",
      "definition": "The risk that failure, disruption, or unintended behaviour in one component of the AI ecosystem propagates across interconnected systems and institutions, causing widespread harm that exceeds the sum of individual failures.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Systemic_risk",
        "https://www.wikidata.org/wiki/Q1369234"
      ],
      "citation": "TopAIThreats Glossary, \"Systemic Risk\", https://topaithreats.com/glossary/systemic-risk/."
    },
    {
      "cite_id": "glossary:tracking",
      "type": "glossary",
      "title": "Tracking",
      "url": "https://topaithreats.com/glossary/tracking/",
      "definition": "Continuous monitoring of individual location, activity, or digital behaviour by AI systems, often conducted without meaningful consent or awareness.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Tracking\", https://topaithreats.com/glossary/tracking/."
    },
    {
      "cite_id": "glossary:training-data",
      "type": "glossary",
      "title": "Training Data",
      "url": "https://topaithreats.com/glossary/training-data/",
      "definition": "The datasets used to train machine learning models, whose quality and representativeness directly influence model behaviour, biases, and harms.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Training,_validation,_and_test_data_sets",
        "https://www.wikidata.org/wiki/Q3985153"
      ],
      "citation": "TopAIThreats Glossary, \"Training Data\", https://topaithreats.com/glossary/training-data/."
    },
    {
      "cite_id": "glossary:transfer-learning",
      "type": "glossary",
      "title": "Transfer Learning",
      "url": "https://topaithreats.com/glossary/transfer-learning/",
      "definition": "A machine learning technique where a model trained on one task or dataset is adapted to perform a different but related task, leveraging the knowledge acquired during initial training. Transfer learning is the foundational principle behind fine-tuning and the use of pre-trained foundation models across diverse applications.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Transfer_learning",
        "https://www.wikidata.org/wiki/Q7833851"
      ],
      "citation": "TopAIThreats Glossary, \"Transfer Learning\", https://topaithreats.com/glossary/transfer-learning/."
    },
    {
      "cite_id": "glossary:trust-erosion",
      "type": "glossary",
      "title": "Trust Erosion",
      "url": "https://topaithreats.com/glossary/trust-erosion/",
      "definition": "The cumulative degradation of public confidence in institutions, media, information systems, and shared epistemic frameworks, accelerated by the proliferation of AI-generated synthetic content and automated manipulation.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Trust Erosion\", https://topaithreats.com/glossary/trust-erosion/."
    },
    {
      "cite_id": "glossary:vendor-lock-in",
      "type": "glossary",
      "title": "Vendor Lock-In",
      "url": "https://topaithreats.com/glossary/vendor-lock-in/",
      "definition": "Dependency on a single AI provider's proprietary models, tools, or infrastructure that creates prohibitively high switching costs and reduces organisational autonomy.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Vendor_lock-in",
        "https://www.wikidata.org/wiki/Q1503227"
      ],
      "citation": "TopAIThreats Glossary, \"Vendor Lock-In\", https://topaithreats.com/glossary/vendor-lock-in/."
    },
    {
      "cite_id": "glossary:vishing",
      "type": "glossary",
      "title": "Vishing",
      "url": "https://topaithreats.com/glossary/vishing/",
      "definition": "Voice phishing -- a social engineering attack via telephone, increasingly using AI voice cloning to impersonate trusted individuals.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Voice_phishing",
        "https://www.wikidata.org/wiki/Q172380"
      ],
      "citation": "TopAIThreats Glossary, \"Vishing\", https://topaithreats.com/glossary/vishing/."
    },
    {
      "cite_id": "glossary:voice-cloning",
      "type": "glossary",
      "title": "Voice Cloning",
      "url": "https://topaithreats.com/glossary/voice-cloning/",
      "definition": "AI technology that replicates a specific individual's voice to generate realistic synthetic speech.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Speech_synthesis#Voice_cloning",
        "https://www.wikidata.org/wiki/Q16346"
      ],
      "citation": "TopAIThreats Glossary, \"Voice Cloning\", https://topaithreats.com/glossary/voice-cloning/."
    },
    {
      "cite_id": "glossary:vulnerability-discovery",
      "type": "glossary",
      "title": "Vulnerability Discovery",
      "url": "https://topaithreats.com/glossary/vulnerability-discovery/",
      "definition": "The use of AI to automatically identify security weaknesses in software, networks, or systems, a dual-use capability that serves both defenders and attackers.",
      "same_as": [],
      "citation": "TopAIThreats Glossary, \"Vulnerability Discovery\", https://topaithreats.com/glossary/vulnerability-discovery/."
    },
    {
      "cite_id": "glossary:zero-day",
      "type": "glossary",
      "title": "Zero-Day",
      "url": "https://topaithreats.com/glossary/zero-day/",
      "definition": "A software vulnerability unknown to the vendor and without an available patch, whose discovery by AI dramatically accelerates exploitation timelines and increases the threat to unprotected systems.",
      "same_as": [
        "https://en.wikipedia.org/wiki/Zero-day_(computing)"
      ],
      "citation": "TopAIThreats Glossary, \"Zero-Day\", https://topaithreats.com/glossary/zero-day/."
    }
  ]
}