Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

AI Poisoning: A Self Help Cybersecurity Option

By Jonathan Bick
December 02, 2024

By Jonathan Bick

A novel legal self-help technique to secure artificial intelligence data and programs is known as Poisoning AI. This technique involves modifying the AI algorithm to intentionally produce specific erroneous results. Poisoning AI may be used to both stop third parties from using AI via the internet, or alternatively identifying cybersecurity difficulties. To ameliorate legal difficulties associated with this technique, appropriate user terms of use agreement notice content should be employed.
Self-help is action taken to enforce legal rights without resorting to the legal system. Such action has long been accepted as lawful (for example see, “Right of Conditional Seller to Retake Property Without Judicial Aid,” 55 A.L.R. 184 (1991) for a collection of self-help cases). Self-help is also recognized as an appropriate course of action by the Uniform Commercial Code (for example, see, NJ UCC Section 9-609 and Section 2A-525 of the UCC).
Both custom and “off the shelf” software have been deemed goods for UCC self-help purposes. In Revlon Group v. Logisticon (No. 70533 Cal. Super. Ct., Santa Clara Cnty., complaint filed Oct. 22, 1990), for example, a software vendor is authorized to access a client’s system and uses to repossess the disputed software. Many states have adopted Article 2A of the UCC and Article 2A.65 Section 2A-525 allows the software lessors to disable or remove software upon default on term similar to UCC Article 9, self-repossession actions.
AI is software. AI software differs from traditional software because a computer rather than a programmer writes the algorithm (the element of the software which tell the computer what to do). AI programs can instruct the computer to add unnecessary content to AI algorithms. Such unnecessary content may poison the AI software.
Poisoning AI allows AI owners to change their internet content or their AI software, so that if the content is copied without consent, then the unauthorized content user’s computer will generate suboptimal output. For example, an artist may add pixels in their art before they upload it online so that if it’s scraped into an AI training set, it can cause the resulting model to malfunction. Similarly, an AI software seller may use “poison data” that could damage future iterations of image-generating AI models, by rendering some of the outputs valueless.
Poisoning AI may take several forms. The most common form is to change the data, which is used to train an AI, thus changing the algorithm. This type of poisoning exploits a security vulnerability in generative AI models. More specifically, generative AI algorithms usually must be trained on vast amounts of data — in this case, images that have been posted on the internet.
Another example is to change the pixels of a photo or other image that are invisible to the human eye but operates to force a machine-learning AI to misinterpret the photo or image. This type of poisoning is usually used to help artists to protect their internet posting from unconsented use.
The next most common poisoning is to require an existing AI algorithm to execute an unnecessary step. For example, prior to sending an output, the AI algorithm requires the computer to query the computer for a formula or key. Such formulas or keys are only available to computer which are authorized to use the AI software.
AI software is usually trained on billions of images and AI software typically contains millions of lines of code, so detection of modified AI algorithm is extremely difficult. Additionally, the more poisoned images can be scraped into the model, and the more AI modified algorithm elements in use the more damage the poisoning technique will cause.
Another way to poison an AI using data to render AI software valueless is to corrupt the AI algorithm. For example, when as few as 50 poisoned images of dogs was inputted to a widely used AI program which was trained on millions of photos of dogs and then prompted it to create images of dogs itself, the output included dog images with too many legs. With 300 poisoned samples, the AI software was manipulated to generate images of dogs to look like cats.
AI poisoning is a form of the nontraditional legal remedy of self-help. The potential benefits of AI poisoning self-help, when used without challenge, include the low cost and rapid use of the law which does not depend on formal invocation of the judicial system and, thus, provides the rapid resolution that legal difficulties sometimes require.
In addition to disabling AI software, poisoning has been used to identify an AI software user who is using the AI software without consent. Such identification may be used as evidence in non-self-help legal actions.
Self-help can result in legal difficulties, due to unintended results. Considering the extensiveness and the rapidity of damage that can be caused when AI poisoning is employed, contractual self-help remedies should be considered. This would remove the element of surprise in software repossession and/or disabling and limiting consequential damages.
While neither the UCC nor the traditional self-help doctrine allows a debtor to recover the consequential damages of the creditor’s repossession (see, 18 U.S.C.A Section 1030(a)(4) (West Supp. 1991), appropriate notice may ameliorate or eliminate legal difficulties which might arise for AI poisoning. Such notices are recommended.
Additionally, since the legal validity of contractual self-help remedies is being expanded by statute and the courts, when content is posted on the internet which will be protected by AI poisoning techniques, legal notices are recommended to eliminate or ameliorate legal difficulties. Such legal notices may be implemented by adding an AI poisoning clause in an internet site’s terms of use agreement.
Contractual self-help is designed by contracting parties to control or prevent contract-breach transactions. For example, clauses in the AI software agreement or in the terms of use agreements might state: In the event of unauthorized use of the AI software, the distributor of said software may resort to self-help to recover or disable said software.
Courts would rather enforce remedies, but to avoid unfair results, they are becoming more amenable to self-help remedies. As a result, those who exercise self-help remedies and end up in litigation are more likely to find favorable court treatment.

*****

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
Strategy vs. Tactics: Two Sides of a Difficult Coin Image

With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.

'Huguenot LLC v. Megalith Capital Group Fund I, L.P.': A Tutorial On Contract Liability for Real Estate Purchasers Image

In June 2024, the First Department decided Huguenot LLC v. Megalith Capital Group Fund I, L.P., which resolved a question of liability for a group of condominium apartment buyers and in so doing, touched on a wide range of issues about how contracts can obligate purchasers of real property.

The Article 8 Opt In Image

The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.

Fresh Filings Image

Notable recent court filings in entertainment law.

Major Differences In UK, U.S. Copyright Laws Image

This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.