10/7/2019 1
Governance for Artificial Intelligence/ Machine Learning
Akbar Siddiqui Technical Director Civil Liberties, Privacy, and Transparency Office National Security Agency
1 2
Governance for Artificial Intelligence/ Machine Learning Akbar - - PDF document
10/7/2019 1 Governance for Artificial Intelligence/ Machine Learning Akbar Siddiqui Technical Director Civil Liberties, Privacy, and Transparency Office National Security Agency 2 1 10/7/2019 The N SA Mission The National Security
10/7/2019 1
Akbar Siddiqui Technical Director Civil Liberties, Privacy, and Transparency Office National Security Agency
1 2
10/7/2019 2
Signals Intelligence
The National Security Agency is responsible for:
Providing our nation’s policy makers and military commands with foreign intelligence to gain a decisive advantage.
U.S. Cybersecurity
Protecting and defending sensitive information systems and networks critical to national security and infrastructure.
Unsupervised Learning
MACHINE LEARNING
Reinforcement Learning Supervised Learning Game AI Skills Acquisition Learning Tasks Robot Navigation Real-time Decisions Estimating Life Expectancy Population Growth Prediction Market Forecasting Weather Forecasting Advertising Popularity Prediction
Classification Regression
Diagnostics Customer Retention Image Classification Identity Fraud Detection Meaningful Compression
Clustering
Big Data Visualization Structure Discovery Feature Elicitation Recommender Systems Targeted Marketing Customer Segmentation
Dimensional Reduction
Raw Data Labeled Training Data Experimental Parameters Models Output
3 4
10/7/2019 3
Purpose Collect Process Evaluate Retain
Disseminate Authority
Training Guidance Compliance Controls Technical Safeguards
Purpose Collect Process Evaluate Retain
Disseminate Authority
Training Guidance Compliance Controls Technical Safeguards
5 6
10/7/2019 4
Purpose Collect Process Evaluate Retain
Disseminate
Purpose Training Data Develop Model Apply to Data Use Outputs
Feedback
Purpose
Use
Purpose and Methods
Training Data
training data and test data
Datasheets for Datasets
Develop Model
Model Cards
Apply to Data
and Validation
Use Outputs
Redress
follows outputs
Feedback
techniques
7 8
10/7/2019 5
Purpose
known issues
Training Data
Purpose
9 10
10/7/2019 6
adversarial techniques
Develop Model Training Data Purpose
Model Mission Review Peer Review Senior Operations Data Officer (SODO), Senior Operations Analytics Officer (SOAO) Sharing Equities (Equities Review Board) Mission Risk Acceptance (Mission Element Owners) Security Business Intelligence Metrics (ROI) Labeled Data Civil Liberties, Privacy, and Transparency (CLPT) Compliance for Dissemination (LPOC) Legal Deployment Compliance (AVG) Chief Data Officer (CDO)
11 12
10/7/2019 7
Develop Model Training Data
Purpose
Apply to Data
Develop Model Training Data Purpose Apply to Data Use Outputs 13 14
10/7/2019 8
Develop Model Training Data Purpose Apply to Data Use Outputs
Feedback
15 16
10/7/2019 9
18
*Popular Science: Fooling The Machine, The
Byzantine science of deceiving artificial intelligence; Dave Gershgorn (March 30, 2016)
Original
Tricked
Machine learning (ML) can be a solution to scalable defensive and offensive measures for
automated decision support to fully-automated
in at least four ways. Adversaries can: (a) poison training data used to train ML algorithms to degrade prediction quality,
(b) evade by manipulating runtime data to ensure ML models misclassify malicious behavior as benign; (c) infer records into the training data; and (d) reconstruct the ML model for further analysis and exploitation. When ML models of varying qualities are integrated into an ensemble, an adversary can exploit weaknesses in individual models to coordinate a malicious effect in the overall system.
17 18