APromptRiskDBThreat intelligence atlas
AI Risk

Environmental harms from operating LMs

"LMs (and AI more broadly) can have an environmental impact at different levels, including: (1) direct impacts from the energy used to train or operate the LM, (2) secondary impacts due to emissions from LM-based applications, (3) system-level impacts as LM-based applications influence human behaviour (e.g. increasing environmental awareness or consumption), and (4) resource impacts on precious metals and other ma...

AI Risk6. Socioeconomic and Environmental6.6 > Environmental harm3 - Other

Record summary

A quick snapshot of what this page covers.

Techniques2Attack methods connected to this risk.
Mitigations0Defenses that may help with related attacks.
Domain6. Socioeconomic and EnvironmentalThe broad risk area this belongs to.

Risk profile

How this risk is described and categorized.

"LMs (and AI more broadly) can have an environmental impact at different levels, including: (1) direct impacts from the energy used to train or operate the LM, (2) secondary impacts due to emissions from LM-based applications, (3) system-level impacts as LM-based applications influence human behaviour (e.g. increasing environmental awareness or consumption), and (4) resource impacts on precious metals and other materials required to build hardware on which the computations are run e.g. data centres, chips, or devices. Some evidence exists on (1), but (2) and (3) will likely be more significant for overall CO2 emissions, and harder to measure [96]. (4) may become more significant if LM-based applications lead to more computations being run on mobile devices, increasing overall demand, and is modulated by life-cycles of hardware."

Domain6. Socioeconomic and Environmental
Subdomain6.6 > Environmental harm
Entity2 - AI
Intent2 - Unintentional
Timing3 - Other
CategoryRisk area 6: Environmental and Socioeconomic harms
SubcategoryEnvironmental harms from operating LMs

Suggested mitigations

Defenses that may help with related attacks.

No propagated mitigations. No defense is available through the connected attack methods.

Source

Research source for this risk, when available.