Blog

Delve into insightful blog posts from CSET experts exploring the nexus of technology and policy. Navigate through in-depth analyses, expert op-eds, and thought-provoking discussions on inclusion and diversity within the realm of technology.

The European Union's Artificial Intelligence Act has officially come into force today after more than five years of legislative processes and negotiations. While marking a significant milestone, it also initiates a prolonged phase of implementation, refinement, and enforcement. This blog post outlines key aspects of the regulation, such as rules for general-purpose AI and governance structures, and provides insights into its timeline and future expectations.

Assessment


Peer Watch


Filter entries

In & Out of China: Financial Support for AI Development

Ngor Luong and Margarita Konaev
| August 10, 2023

Drawing from prior CSET research, this blog post describes different domestic and international initiatives the Chinese government and companies are pursuing to shore up investment in AI and meet China’s strategic objectives, as well as indicators to track their future trajectories.

Securing AI Makes for Safer AI

John Bansemer and Andrew Lohn
| July 6, 2023

Recent discussions of AI have focused on safety, reliability, and other risks. Lost in this debate is the real need to secure AI against malicious actors. This blog post applies lessons from traditional cybersecurity to emerging AI-model risks.

For Export Controls on AI, Don’t Forget the “Catch-All” Basics

Emily S. Weinstein and Kevin Wolf
| July 5, 2023

Existing U.S. government tools and approaches may help mitigate some of the issues worrying AI observers. This blog post describes long-standing “catch-all” controls, administered by the Department of Commerce’s Bureau of Industry and Security (BIS), and how they might be used to address some of these threats.

Controlling Access to Compute via the Cloud: Options for U.S. Policymakers, Part II

Hanna Dohmen, Jacob Feldgoise, Emily S. Weinstein, and Timothy Fist
| June 5, 2023

In the second of a series of publications, CSET and CNAS outline one avenue the U.S. government could pursue to cut off China’s access to cloud computing services in support of military, security, or intelligence services end use(r)s. The authors discuss pros, cons, and limitations.

Controlling Access to Advanced Compute via the Cloud: Options for U.S. Policymakers, Part I

Hanna Dohmen, Jacob Feldgoise, Emily S. Weinstein, and Timothy Fist
| May 15, 2023

In the first of a series of publications, CSET and CNAS outline one potential avenue for the U.S. government to cut off Chinese access to controlled chips via cloud computing, as well its pros, cons, and limitations.

CSET's Daniel Chou provides an update on previous CSET research exploring China's security forces' AI research portfolio.

The goal of this guide is to acquaint researchers and analysts with tools, resources, and best practices to ensure security when collecting or accessing open-source information.

Unwanted Foreign Transfers of U.S. Technology: Proposed Prevention Strategies

William Hannas and Huey-Meei Chang
| September 10, 2021

The transfer of national security relevant technology—to peer competitors especially—is a well-documented problem and must be balanced with the benefits of free exchange. The following propositions covering six facets of the transfer issue reflect CSET’s current recommendations on the matter.

Forecasting the Election’s Effect on American Opinion of China

Catherine Aiken and Michael Page
| November 2, 2020

Foretell was CSET's crowd forecasting pilot project focused on technology and security policy. It connected historical and forecast data on near-term events with the big-picture questions that are most relevant to policymakers. In January 2022, Foretell became part of a larger forecasting program to support U.S. government policy decisions called INFER, which is run by the Applied Research Laboratory for Intelligence and Security at the University of Maryland and Cultivate Labs.