Tag Archive: Cybersecurity

A report by CSET’s Josh Goldstein, Micah Musser, and CSET alumna Katerina Sedova in collaboration with OpenAI and Stanford Internet Observatory was cited in an article published on Medium. The report explores how language models could be misused for influence operations in the future, and it provides a framework for assessing potential mitigation strategies.

Forecasting Potential Misuses of Language Models for Disinformation Campaigns—and How to Reduce Risk

Josh A. Goldstein Girish Sastry Micah Musser Renée DiResta Matthew Gentzel Katerina Sedova
| January 2023

Machine learning advances have powered the development of new and more powerful generative language models. These systems are increasingly able to write text at near human levels. In a new report, authors at CSET, OpenAI, and the Stanford Internet Observatory explore how language models could be misused for influence operations in the future, and provide a framework for assessing potential mitigation strategies.

Compute Accounting Principles Can Help Reduce AI Risks

Tech Policy Press
| November 30, 2022

In an opinion piece for Tech Policy Press, CSET's Krystal Jackson, Karson Elmgren, Jacob Feldgoise, and their coauthor Andrew Critch wrote about computational power as a key factor driving AI progress.

In an opinion piece for Foreign Policy, Research Analyst Jack Corrigan and Michael Kratsios drew from their CSET report to share how policymakers can build a more unified defense against foreign technology threats to secure American networks and bolster the U.S. tech economy.

CSET report "Banned in D.C." found that despite federal efforts to block Chinese telecom equipment from U.S. supply chains, state and local governments across the country continued to buy products designated a threat to national security.

In an interview with Nextgov, Research Analyst Jack Corrigan discussed his latest report and U.S. approached to foreign technology threats.

In an opinion piece for Lawfare, Research Analyst Micah Musser discussed the new regulations that entered into effect in China requiring companies deploying recommendation algorithms to file details about those algorithms with the Cyberspace Administration of China.

In a study for Harvard's Misinformation Review, Research Fellow Josh Goldstein looks at how tactics used in political influence operations are used for commercial purposes.

Senior Fellow Andrew Lohn weighs in on the State Department's "Rewards for Justice" initiative offering rewards for tips on hackers.

In an opinion piece for Scientific American, Dakota Cary discussed why civilian satellites must be designated as critical infrastructure.