Ben BuchananJohn BansemerDakota CaryJack LucasMicah Musser
| November 2020
Based on an in-depth analysis of artificial intelligence and machine learning systems, the authors consider the future of applying such systems to cyber attacks, and what strategies attackers are likely or less likely to use. As nuanced, complex, and overhyped as machine learning is, they argue, it remains too important to ignore.
National Academies of Sciences, Engineering, and Medicine
| November 4, 2020
CSET Founding Director Jason Matheny presented the keynote address at the virtual colloquium on the future of data science and the implications for privacy and national security hosted by the National Academies of Sciences, Engineering, and Medicine.
Psychology Today published an article on Microsoft's new Lobe application. The article featured original research from several CSET experts, including Research Fellow Zachary Arnold, Data Analyst Ilya Rahkovsky and Research Analyst Tina Huang.
One sentence summarizes the complexities of modern artificial intelligence: Machine learning systems use computing power to execute algorithms that learn from data. This AI triad of computing power, algorithms, and data offers a framework for decision-making in national security policy.
The rise of deepfakes could enhance the effectiveness of disinformation efforts by states, political parties and adversarial actors. How rapidly is this technology advancing, and who in reality might adopt it for malicious ends? This report offers a comprehensive deepfake threat assessment grounded in the latest machine learning research on generative models.
Both China and the United States seek to develop military applications enabled by artificial intelligence. This issue brief reviews the obstacles to assessing data competitiveness and provides metrics for measuring data advantage.
“These three areas—adversarial learning, cyber offense, and cyber defense—deserve a lot more attention, and quickly,” writes CSET Senior Faculty Fellow Ben Buchanan. “Policymakers have begun to consider these important issues, but the conversation must continue.”
To learn more, please review this policy. By continuing to browse the site, you agree to these terms.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.