Reconnaissance

The adversary is trying to gather information they can use to plan future operations.

5 Techniques
MITRE ATLAS Framework

Attack Techniques

Explore the specific techniques adversaries use during the reconnaissance phase of AI attacks.

1
AML.T0000

Search Open Technical Databases

Adversaries may search technical databases for information about AI systems and their configurations.

Examples:

  • Searching public model registries
  • Analyzing published research papers
  • Reviewing open-source AI projects
  • Examining AI system documentation

Mitigations:

  • Limit public exposure of AI system details
  • Implement proper access controls
  • Monitor for unusual access patterns
  • Regular security assessments
2
AML.T0001

Search Open Websites/Domains

Adversaries may search websites and domains for information about AI systems.

Examples:

  • Searching company websites for AI information
  • Analyzing social media for AI system details
  • Reviewing public AI deployment information

Mitigations:

  • Control public information disclosure
  • Regular information security reviews
  • Employee training on information sharing
3
AML.T0003

Search Open Websites/Domains

Adversaries may search websites and domains for information about AI systems.

Examples:

  • Searching company websites for AI information
  • Analyzing social media for AI system details
  • Reviewing public AI deployment information

Mitigations:

  • Control public information disclosure
  • Regular information security reviews
  • Employee training on information sharing
4
AML.T0004

Search Open Websites/Domains

Adversaries may search websites and domains for information about AI systems.

Examples:

  • Searching company websites for AI information
  • Analyzing social media for AI system details
  • Reviewing public AI deployment information

Mitigations:

  • Control public information disclosure
  • Regular information security reviews
  • Employee training on information sharing
5
AML.T0006

Search Open Websites/Domains

Adversaries may search websites and domains for information about AI systems.

Examples:

  • Searching company websites for AI information
  • Analyzing social media for AI system details
  • Reviewing public AI deployment information

Mitigations:

  • Control public information disclosure
  • Regular information security reviews
  • Employee training on information sharing