2.6.4 AI security and hacking