Blog

Delve into insightful blog posts from CSET experts exploring the nexus of technology and policy. Navigate through in-depth analyses, expert op-eds, and thought-provoking discussions on inclusion and diversity within the realm of technology.

The European Union's Artificial Intelligence Act has officially come into force today after more than five years of legislative processes and negotiations. While marking a significant milestone, it also initiates a prolonged phase of implementation, refinement, and enforcement. This blog post outlines key aspects of the regulation, such as rules for general-purpose AI and governance structures, and provides insights into its timeline and future expectations.

Assessment


Peer Watch


Filter entries

Controlling Access to Compute via the Cloud: Options for U.S. Policymakers, Part II

Hanna Dohmen, Jacob Feldgoise, Emily S. Weinstein, and Timothy Fist
| June 5, 2023

In the second of a series of publications, CSET and CNAS outline one avenue the U.S. government could pursue to cut off China’s access to cloud computing services in support of military, security, or intelligence services end use(r)s. The authors discuss pros, cons, and limitations.

Controlling Access to Advanced Compute via the Cloud: Options for U.S. Policymakers, Part I

Hanna Dohmen, Jacob Feldgoise, Emily S. Weinstein, and Timothy Fist
| May 15, 2023

In the first of a series of publications, CSET and CNAS outline one potential avenue for the U.S. government to cut off Chinese access to controlled chips via cloud computing, as well its pros, cons, and limitations.

What exactly are the differences between generative AI, large language models, and foundation models? This post aims to clarify what each of these three terms mean, how they overlap, and how they differ.

Studying Tech Competition through Research Output: Some CSET Best Practices

Jacob Feldgoise, Catherine Aiken, Emily S. Weinstein, and Zachary Arnold
| April 2023

As technology competition intensifies between the United States and China, governments and policy researchers are looking for metrics to assess each country’s relative strengths and weaknesses. One measure of technology innovation increasingly used by the policy community is research output. Drawing on CSET’s experiences over the last four years, this post shares our best practices for using research output to study national technological competition and inform public policy.

CSET’s 2022 Year in Review

Dewey Murdick
| March 2023

Executive Director Dewey Murdick shares a review of CSET's successes and growth in 2022.

Forecasting Potential Misuses of Language Models for Disinformation Campaigns—and How to Reduce Risk

Josh A. Goldstein, Girish Sastry, Micah Musser, Renée DiResta, Matthew Gentzel, and Katerina Sedova
| January 2023

Machine learning advances have powered the development of new and more powerful generative language models. These systems are increasingly able to write text at near human levels. In a new report, authors at CSET, OpenAI, and the Stanford Internet Observatory explore how language models could be misused for influence operations in the future, and they provide a framework for assessing potential mitigation strategies.

CSET's Daniel Chou provides an update on previous CSET research exploring China's security forces' AI research portfolio.

The goal of this guide is to acquaint researchers and analysts with tools, resources, and best practices to ensure security when collecting or accessing open-source information.

Unwanted Foreign Transfers of U.S. Technology: Proposed Prevention Strategies

William Hannas and Huey-Meei Chang
| September 10, 2021

The transfer of national security relevant technology—to peer competitors especially—is a well-documented problem and must be balanced with the benefits of free exchange. The following propositions covering six facets of the transfer issue reflect CSET’s current recommendations on the matter.

CSET and the Syracuse University Institute for Security Policy and Law hosted an October 2020 symposium to discuss AI policy issues facing lawyers, policymakers and technologists. This blog provides a summary of the discussion. A full report is attached.