In his op-ed in DefenseScoop, Jack Corrigan discusses the U.S.'s first national security memorandum on artificial intelligence (AI), which emphasizes large "frontier" models from major tech firms as key to national security and technological leadership. He cautions, however, that this focus could stifle broader AI innovation and create reliance on costly, resource-intensive systems.
This report proposes an approach to systematically identify promising research using big data and analyze that research’s potential impact through structured engagements with subject-matter experts. The methodology offers a structured way to proactively monitor the research landscape and inform strategic R&D priorities.
Lauren Kahn, Emelia Probasco, and Ronnie Kinoshita
| November 2024
Automation bias is a critical issue for artificial intelligence deployment. It can cause otherwise knowledgeable users to make crucial and even obvious errors. Organizational, technical, and educational leaders can mitigate these biases through training, design, and processes. This paper explores automation bias and ways to mitigate it through three case studies: Tesla’s autopilot incidents, aviation incidents at Boeing and Airbus, and Army and Navy air defense incidents.
Sam Bresnick testified before the Senate Judiciary Subcommittee on Privacy, Technology, and the Law regarding tech companies' ties to China and their implications in a future conflict scenario.
In an article published by The Japan Times that discusses the White House’s push for the Pentagon and U.S. national security agencies to accelerate the adoption of AI technology, CSET Research Fellow, Sam Bresnick, provided his expert insights.
In an MWI Podcast episode about the anticipated impact of artificial intelligence on future warfare, CSET's Emmy Probasco and Igor Mikolic-Torreira shared their expert insights.
This blog describes key takeaways from the NATO-Ukraine Defense Innovators Forum, held in Krakow, Poland in June 2024. It overviews changing concepts of operation, battlefield realities, and technological aspirations and innovations in Ukraine, with a focus on uncrewed aerial vehicles (UAVs) and counter-UAV systems. It builds upon CSET’s previous blog from the Future of Drones in Ukraine conference held in Warsaw in November 2023.
In his op-ed in Lawfare, Sam Bresnick discusses the evolving military strategies of China under Xi Jinping, highlighting the country's increasing engagement in risky military activities across while simultaneously exhibiting a reluctance to responsibly manage military crises with the U.S.
This blog post recounts the development of a Python-based data collection pipeline project completed in the summer of 2024 by CSET inaugural intern Jordan Monts. During his project research and work, he used the Requests and BeautifulSoup libraries to create a two-part system to gather and process web data, support ongoing research initiatives, and strengthen his skills in data processing as well as application programming interface (API) management.
This website uses cookies.
To learn more, please review this policy. By continuing to browse the site, you agree to these terms.
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.