Applications and implications

CSET's September webinar with experts Andrew Lohn, Katerina Sedova, and Micah Musser raise alarms on how AI technology, specifically GPT-3, can generate disinformation.

CSET's machine learning primer "Hacking AI" illustrates how hackers can access AI systems and argues for policymakers to build a robust and transparent AI for military systems.

Research Analyst Emily Weinstein spoke with University World News about continued collaboration between Chinese and American university researchers amidst tensions from the China Initiative.

CSET's Director of Strategy Helen Toner guest-starred on the EE Times' podcast to discuss what safe and reliable AI looks like.

CSET submitted this comment to the Office of Science and Technology Policy and the National Science Foundation to support the work of the National Artificial Intelligence Research Resource (NAIRR) Task Force to develop an implementation roadmap that would provide AI researchers and students across scientific disciplines access to computational resources, high-quality data, educational tools, and user support.

CSET Legislation Tracker

Daniel Hague Jennifer Melot
| September 2021

The CSET Legislation Tracker serves as a resource to identify and monitor U.S. federal legislation related to emerging technology and national security, with a particular focus on measures relevant to CSET’s key areas of inquiry such as research security, S&T development, and funding for hardware design and manufacturing capabilities. The tracker includes identifying information for each piece of legislation, links to related CSET analyses, and access to associated congressional hearings, among other items.

According to a CSET report, tech professionals expressed positive and neutral views on working with the U.S. Department of Defense.

Robot Hacking Games

Dakota Cary
| September 2021

Software vulnerability discovery, patching, and exploitation—collectively known as the vulnerability lifecycle—is time consuming and labor intensive. Automating the process could significantly improve software security and offensive hacking. The Defense Advanced Research Projects Agency’s Cyber Grand Challenge supported teams of researchers from 2014 to 2016 that worked to create these tools. China took notice. In 2017, China hosted its first Robot Hacking Game, seeking to automate the software vulnerability lifecycle. Since then, China has hosted seven such competitions and the People’s Liberation Army has increased its role in hosting the games.

The transfer of national security relevant technology—to peer competitors especially—is a well-documented problem and must be balanced with the benefits of free exchange. The following propositions covering six facets of the transfer issue reflect CSET’s current recommendations on the matter.

CSET Director Dewey Murdick and Director of Operations Tessa Baker spoke with Georgetown's The Hoya about CSET's new $42 million grant.