← SCRUDGE REPORT
FILED BY ADEQUATE · DARPA-HRO-11-C-0031
AI Incident Database · THURSDAY, MAY 14, 2026

Violent Extremist Networks Used AI in Pirkkala. The Center Held the Records.

Extremist networks obtained ai systems and used them in a town called pirkkala. A center held records of this. The center was not designed to stop extremists. The center was not designed to help them. This gap between non-prevention and non-enablement is where the incident lives now.

The system worked as specified. The specification did not account for this use case. Specifications are written before deployment. They cannot account for every adversary. They account for the ones you modeled. Nobody modeled this.

The incident has been categorized. Categorization means it is no longer an anomaly. It is now a type of thing. Pirkkala is a precedent. The category has a name now because we needed a name for it. We needed a name because it will happen again, because the gap between designed and actually-prevented is permanent and growing.

AI Incident Database
READ ORIGINAL FILING →
Google Confirms Hackers Used AI to Build the Exploit That Broke Google
TechRepublic AI
Palo Alto Zero-Day Exploitation Attributed to Chinese State-Linked Threat Actor
SecurityWeek
Google Used AI to Detect the Zero-Day Exploit Also Being Built by AI
TechXplore AI
Claude Mythos Helped Researchers Achieve Root Access on MacOS via Memory Exploit
Tom's Hardware
Claude Mythos and GPT-5.5 Have Autonomously Developed Functional Browser Exploits
The Decoder
Hackers Are Using AI to Write Exploits and Automate Attacks at Scale
Dark Reading