Publications

CSET produces evidence-driven analysis in a variety of forms, from informative graphics and translations to expert testimony and published reports. Our key areas of inquiry are the foundations of artificial intelligence — such as talent, data and computational power — as well as how AI can be used in cybersecurity and other national security settings. We also do research on the policy tools that can be used to shape AI’s development and use, and on biotechnology.

Analysis

Building the Tech Coalition

Emelia Probasco
| August 2024

The U.S. Army’s 18th Airborne Corps can now target artillery just as efficiently as the best unit in recent American history—and it can do so with two thousand fewer servicemembers. This report presents a case study of how the 18th Airborne partnered with tech companies to develop, prototype, and operationalize software and artificial intelligence for clear military advantage. The lessons learned form recommendations to the U.S. Department of Defense as it pushes to further develop and adopt AI and other new technologies.

Applications


Assessment


Filter publications
Data Snapshot

Funding the AI Cloud — Amazon, Alphabet, and Microsoft’s Cloud Computing Investments, Part 3

Christian Schoeberl and Jack Corrigan
| November 20, 2024

Data Snapshots are informative descriptions and quick analyses that dig into CSET’s unique data resources. This three-part series uses data from a variety of sources to track how three cloud providers—Amazon, Alphabet, and Microsoft—distribute their financial resources to create and sustain demand for their cloud services. By investing in data centers & workforce training, the large tech platforms of Amazon, Google, and Microsoft draw developers, companies, and governments to their tools & services.

Analysis

AI Safety and Automation Bias

Lauren Kahn, Emelia Probasco, and Ronnie Kinoshita
| November 2024

Automation bias is a critical issue for artificial intelligence deployment. It can cause otherwise knowledgeable users to make crucial and even obvious errors. Organizational, technical, and educational leaders can mitigate these biases through training, design, and processes. This paper explores automation bias and ways to mitigate it through three case studies: Tesla’s autopilot incidents, aviation incidents at Boeing and Airbus, and Army and Navy air defense incidents.

Sam Bresnick testified before the Senate Judiciary Subcommittee on Privacy, Technology, and the Law regarding tech companies' ties to China and their implications in a future conflict scenario.

Analysis

Acquiring AI Companies: Tracking U.S. AI Mergers and Acquisitions

Jack Corrigan, Ngor Luong, and Christian Schoeberl
| November 2024

Maintaining U.S. technological leadership in the years ahead will require policymakers to promote competition in the AI market and prevent industry leaders from wielding their power in harmful ways. This brief examines trends in U.S. mergers and acquisitions of artificial intelligence companies. The authors found that AI-related M&A deals have grown significantly over the last decade, with large U.S. tech companies being the most prolific acquirers of AI firms.

Data Snapshot

Funding the AI Cloud — Amazon, Alphabet, and Microsoft’s Cloud Computing Investments, Part 2

Christian Schoeberl and Jack Corrigan
| November 13, 2024

Data Snapshots are informative descriptions and quick analyses that dig into CSET’s unique data resources. This three-part series uses data from a variety of sources to track how three cloud providers—Amazon, Alphabet, and Microsoft—distribute their financial resources to create and sustain demand for their cloud services. By investing in data centers & workforce training, the large tech platforms of Amazon, Google, and Microsoft draw developers, companies, and governments to their tools & services.

Analysis

Cybersecurity Risks of AI-Generated Code

Jessica Ji, Jenny Jun, Maggie Wu, and Rebecca Gelles
| November 2024

Artificial intelligence models have become increasingly adept at generating computer code. They are powerful and promising tools for software development across many industries, but they can also pose direct and indirect cybersecurity risks. This report identifies three broad categories of risk associated with AI code generation models and discusses their policy and cybersecurity implications.

Data Snapshot

Funding the AI Cloud — Amazon, Alphabet, and Microsoft’s Cloud Computing Investments, Part 1

Christian Schoeberl and Jack Corrigan
| October 30, 2024

Data Snapshots are informative descriptions and quick analyses that dig into CSET’s unique data resources. This three-part series uses data from a variety of sources to track how three cloud providers—Amazon, Alphabet, and Microsoft—distribute their financial resources to create and sustain demand for their cloud services. By investing in data centers & workforce training, the large tech platforms of Amazon, Google, and Microsoft draw developers, companies, and governments to their tools & services.

Analysis

Fueling China’s Innovation: The Chinese Academy of Sciences and Its Role in the PRC’s S&T Ecosystem

Cole McFaul, Hanna Dohmen, Sam Bresnick, and Emily S. Weinstein
| October 2024

The Chinese Academy of Sciences is among the most important S&T organizations in the world and plays a key role in advancing Beijing’s S&T objectives. This report provides an in-depth look into the organization and its various functions within China’s S&T ecosystem, including advancing S&T research, fostering the commercialization of critical and emerging technologies, and contributing to S&T policymaking.

Analysis

Through the Chat Window and Into the Real World: Preparing for AI Agents

Helen Toner, John Bansemer, Kyle Crichton, Matthew Burtell, Thomas Woodside, Anat Lior, Andrew Lohn, Ashwin Acharya, Beba Cibralic, Chris Painter, Cullen O’Keefe, Iason Gabriel, Kathleen Fisher, Ketan Ramakrishnan, Krystal Jackson, Noam Kolt, Rebecca Crootof, and Samrat Chatterjee
| October 2024

Computer scientists have long sought to build systems that can actively and autonomously carry out complicated goals in the real world—commonly referred to as artificial intelligence "agents." Recently, significant progress in large language models has fueled new optimism about the prospect of building sophisticated AI agents. This CSET-led workshop report synthesizes findings from a May 2024 workshop on this topic, including what constitutes an AI agent, how the technology is improving, what risks agents exacerbate, and intervention points that could help.

Analysis

Securing Critical Infrastructure in the Age of AI

Kyle Crichton, Jessica Ji, Kyle Miller, John Bansemer, Zachary Arnold, David Batz, Minwoo Choi, Marisa Decillis, Patricia Eke, Daniel M. Gerstein, Alex Leblang, Monty McGee, Greg Rattray, Luke Richards, and Alana Scott
| October 2024

As critical infrastructure operators and providers seek to harness the benefits of new artificial intelligence capabilities, they must also manage associated risks from both AI-enabled cyber threats and potential vulnerabilities in deployed AI systems. In June 2024, CSET led a workshop to assess these issues. This report synthesizes our findings, drawing on lessons from cybersecurity and insights from critical infrastructure sectors to identify challenges and potential risk mitigations associated with AI adoption.