Andrew J Lohn
@AndrewJLohn
Followers
391
Following
26
Media
3
Statuses
45
Physicist/Engineer turned Policy Analyst separating fact from fiction in fields like Cyber, AI, Drones, Nanotech, etc. Opinions are mine; RT's ≠ endorsements.
Santa Monica, CA
Joined June 2013
Hey all, big-compute and big-AI get a lot of airtime but it's also worth spending a minute to think about when AI is forced to be small and what that implies for reliability and so forth. @KyauMill21 @CSETGeorgetown
https://t.co/4BVVAzZVsc
cset.georgetown.edu
Artificial intelligence that makes news headlines, such as ChatGPT, typically runs in well-maintained data centers with an abundant supply of compute and power. However, these resources are more...
0
2
4
New paper just out that I got to watch take shape. One encouraging point that stuck out to me was that there is still room to improve safety across many dimensions; looks like we don't usually have to trade off one type of safe for another yet. https://t.co/e0WNzCDKvz
0
0
1
Today, the White House announced voluntary commitments about safety and security from seven major AI companies. John Bansemer and I recently wrote a short blog post about what that might look like. Might be worth a gander. https://t.co/hwckdQlDuP
cset.georgetown.edu
Recent discussion of AI have focused on safety, reliability, and other risks. Lost in this debate is the real need to secure AI against malicious actors. This blog post applies lessons from traditi...
0
4
7
✨New Policy Brief✨ CSET's @AndrewJLohn & Krystal Jackson, in partnership with the @turinginst, investigate the future of cybersecurity: Autonomous Cyber Defense Agents. Learn more in their new report ⬇️
cset.georgetown.edu
The current AI-for-cybersecurity paradigm focuses on detection using automated tools, but it has largely neglected holistic autonomous cyber defense systems — ones that can act without human tasking....
1
11
19
If you're in the 'Compute for AI' world this is worth a quick look. I, for one, was surprised by some of the main results.
📊📉New Data Brief📈📊 How important is computing hardware to AI progress, compared to other factors like talent and data? New survey research from CSET's @mrmusser, Rebecca Gelles, Ronnie Kinoshita, Catherine Aiken, and @AndrewJLohn provides answers 👇
0
1
5
✨New Report✨ AI systems are being rapidly deployed, but many have vulnerabilities that are hard to study + mitigate. In our report produced w/ @StanfordCyber, 17 coauthors from policy research, law, industry + government propose steps to reduce risks:
cset.georgetown.edu
Artificial intelligence systems are rapidly being deployed in all sectors of the economy, yet significant research has demonstrated that these systems can be vulnerable to a wide array of attacks....
1
15
30
Who likes tons of data compiled into an easy-to-use and free interface? Want to do bibliometrics or understand the semiconductor supply chain or know which country is doing what in AI? Visit
eto.tech
Creating high-quality data resources to inform critical decisions on emerging technology issues
0
4
8
In a world where some hackers are making millions of dollars at a time, there’s also the question of who would turn them in at all. That said, it’s not unheard of for hackers to turn on each other, CSET's @AndrewJLohn told @washingtonpost's @timstarks.
washingtonpost.com
Now it's looking for tips on hacks related to elections and critical infrastructure.
0
2
3
✨New issue brief✨ As the United States faces a growing number of threats in the cyber domain, high school cybersecurity competitions can help to train the next generation of domestic cyber talent, write Kayla Goode, @ali_craw, and Christopher Back ⬇️:
cset.georgetown.edu
In the current cyber-threat environment, a well-educated workforce is critical to U.S. national security. Today, however, nearly six hundred thousand cybersecurity positions remain unfilled across...
0
3
7
Wow! Way to go RAND. I can't think of a better person for this role than Jason (and I had been trying).
We’re thrilled to announce that Jason Matheny has been selected as our new president and CEO. He is an economist, technologist, highly regarded national security expert, and longtime civil servant. Welcome, Jason!
0
1
2
Some best practices to consider for deploying large language models from @OpenAI, @CohereAI, and @AI21Labs. Worth a look if you're sending them out into the world. https://t.co/ReYWhple23
0
1
1
CSET's @AndrewJLohn is testifying LIVE before the @SASCDems and @SASCGOP Cybersecurity Subcommittee where he will outline #AI’s capabilities and vulnerabilities within cyberspace defenses and offenses.
1
3
9
🎉New Policy Brief🎉 Managing vulnerabilities in machine learning is going to require a few changes. A new brief by @andrewjlohn and Wyatt Hoffman discusses a few of those along with what to expect for the future of cybersecurity.
cset.georgetown.edu
Like traditional software, vulnerabilities in machine learning software can lead to sabotage or information leakages. Also like traditional software, sharing information about vulnerabilities helps...
0
8
10
I think our new one is a fun and short read. On its face it's obvious that such a steep exponential can't go forever but it's not so obvious when it might stop or why.
🚨New Issue Brief🚨 Computing power is a core driver of modern #AI progress, but how much longer can computing resources keep growing? In this issue brief, @AndrewJLohn and @mrmusser argue that this growth might slow down sooner than you think.
0
2
7
Big news for CSET and for the broader AI policy world!
📣 News Release! 📣 CSET is happy to announce an increase in grant funding, bringing our total funds to more than $100 million, to continue our work at the intersection of emerging tech and security. https://t.co/rhjogLv1Bw
0
0
10
We usually envision AI conflict, crisis, and escalation as being fast but what counts as fast? Apples and Oranges but: State Dept figures Iran nuclear breakout time is 3 months. Wall clock to train a 1T-parameter language model is also 3 months.
1
0
3
Big media day for me. Was on @NPR's @Marketplace and in @WIRED! https://t.co/JzbzhnOr8M
https://t.co/ShDrFhucMI
wired.com
A new “red team” will try to anticipate and thwart attacks on machine learning programs.
0
1
5
It's not an adversarial example, the library actually changes the image to a triceratops. Far worse in some ways.
What would make a machine learning library turn a view of Georgetown University into a triceratops before classifying? @AndrewJLohn unpacks this and other supply chain threats in his latest CSET research. https://t.co/eBjgxAVibx
0
2
8
✨ New Report!✨ Machine learning depends upon a foundation that others have built, but what happens if the bricks at the bottom are not to be trusted? In a new CSET report, @AndrewJLohn discusses risks to the machine learning supply chain.
cset.georgetown.edu
Modern machine learning often relies on open-source datasets, pretrained models, and machine learning libraries from across the internet, but are those resources safe to use? Previously successful...
0
10
20