Andrew J Lohn Profile
Andrew J Lohn

@AndrewJLohn

Followers
391
Following
26
Media
3
Statuses
45

Physicist/Engineer turned Policy Analyst separating fact from fiction in fields like Cyber, AI, Drones, Nanotech, etc. Opinions are mine; RT's ≠ endorsements.

Santa Monica, CA
Joined June 2013
Don't wanna be here? Send us removal request.
@AndrewJLohn
Andrew J Lohn
2 years
Hey all, big-compute and big-AI get a lot of airtime but it's also worth spending a minute to think about when AI is forced to be small and what that implies for reliability and so forth. @KyauMill21 @CSETGeorgetown https://t.co/4BVVAzZVsc
Tweet card summary image
cset.georgetown.edu
Artificial intelligence that makes news headlines, such as ChatGPT, typically runs in well-maintained data centers with an abundant supply of compute and power. However, these resources are more...
0
2
4
@AndrewJLohn
Andrew J Lohn
3 years
New paper just out that I got to watch take shape. One encouraging point that stuck out to me was that there is still room to improve safety across many dimensions; looks like we don't usually have to trade off one type of safe for another yet. https://t.co/e0WNzCDKvz
0
0
1
@AndrewJLohn
Andrew J Lohn
3 years
Today, the White House announced voluntary commitments about safety and security from seven major AI companies. John Bansemer and I recently wrote a short blog post about what that might look like. Might be worth a gander. https://t.co/hwckdQlDuP
Tweet card summary image
cset.georgetown.edu
Recent discussion of AI have focused on safety, reliability, and other risks. Lost in this debate is the real need to secure AI against malicious actors. This blog post applies lessons from traditi...
0
4
7
@CSETGeorgetown
CSET
3 years
✨New Policy Brief✨ CSET's @AndrewJLohn & Krystal Jackson, in partnership with the @turinginst, investigate the future of cybersecurity: Autonomous Cyber Defense Agents. Learn more in their new report ⬇️
Tweet card summary image
cset.georgetown.edu
The current AI-for-cybersecurity paradigm focuses on detection using automated tools, but it has largely neglected holistic autonomous cyber defense systems — ones that can act without human tasking....
1
11
19
@AndrewJLohn
Andrew J Lohn
3 years
If you're in the 'Compute for AI' world this is worth a quick look. I, for one, was surprised by some of the main results.
@CSETGeorgetown
CSET
3 years
📊📉New Data Brief📈📊 How important is computing hardware to AI progress, compared to other factors like talent and data? New survey research from CSET's @mrmusser, Rebecca Gelles, Ronnie Kinoshita, Catherine Aiken, and @AndrewJLohn provides answers 👇
0
1
5
@CSETGeorgetown
CSET
3 years
✨New Report✨ AI systems are being rapidly deployed, but many have vulnerabilities that are hard to study + mitigate. In our report produced w/ @StanfordCyber, 17 coauthors from policy research, law, industry + government propose steps to reduce risks:
Tweet card summary image
cset.georgetown.edu
Artificial intelligence systems are rapidly being deployed in all sectors of the economy, yet significant research has demonstrated that these systems can be vulnerable to a wide array of attacks....
1
15
30
@AndrewJLohn
Andrew J Lohn
3 years
Who likes tons of data compiled into an easy-to-use and free interface? Want to do bibliometrics or understand the semiconductor supply chain or know which country is doing what in AI? Visit
Tweet card summary image
eto.tech
Creating high-quality data resources to inform critical decisions on emerging technology issues
0
4
8
@CSETGeorgetown
CSET
3 years
In a world where some hackers are making millions of dollars at a time, there’s also the question of who would turn them in at all. That said, it’s not unheard of for hackers to turn on each other, CSET's @AndrewJLohn told @washingtonpost's @timstarks.
Tweet card summary image
washingtonpost.com
Now it's looking for tips on hacks related to elections and critical infrastructure.
0
2
3
@CSETGeorgetown
CSET
4 years
✨New issue brief✨ As the United States faces a growing number of threats in the cyber domain, high school cybersecurity competitions can help to train the next generation of domestic cyber talent, write Kayla Goode, @ali_craw, and Christopher Back ⬇️:
Tweet card summary image
cset.georgetown.edu
In the current cyber-threat environment, a well-educated workforce is critical to U.S. national security. Today, however, nearly six hundred thousand cybersecurity positions remain unfilled across...
0
3
7
@AndrewJLohn
Andrew J Lohn
4 years
Wow! Way to go RAND. I can't think of a better person for this role than Jason (and I had been trying).
@RANDCorporation
RAND
4 years
We’re thrilled to announce that Jason Matheny has been selected as our new president and CEO. He is an economist, technologist, highly regarded national security expert, and longtime civil servant. Welcome, Jason!
0
1
2
@AndrewJLohn
Andrew J Lohn
4 years
Some best practices to consider for deploying large language models from @OpenAI, @CohereAI, and @AI21Labs. Worth a look if you're sending them out into the world. https://t.co/ReYWhple23
0
1
1
@CSETGeorgetown
CSET
4 years
CSET's @AndrewJLohn is testifying LIVE before the @SASCDems and @SASCGOP Cybersecurity Subcommittee where he will outline #AI’s capabilities and vulnerabilities within cyberspace defenses and offenses.
1
3
9
@CSETGeorgetown
CSET
4 years
🎉New Policy Brief🎉 Managing vulnerabilities in machine learning is going to require a few changes. A new brief by @andrewjlohn and Wyatt Hoffman discusses a few of those along with what to expect for the future of cybersecurity.
Tweet card summary image
cset.georgetown.edu
Like traditional software, vulnerabilities in machine learning software can lead to sabotage or information leakages. Also like traditional software, sharing information about vulnerabilities helps...
0
8
10
@AndrewJLohn
Andrew J Lohn
4 years
I think our new one is a fun and short read. On its face it's obvious that such a steep exponential can't go forever but it's not so obvious when it might stop or why.
@CSETGeorgetown
CSET
4 years
🚨New Issue Brief🚨 Computing power is a core driver of modern #AI progress, but how much longer can computing resources keep growing? In this issue brief, @AndrewJLohn and @mrmusser argue that this growth might slow down sooner than you think.
0
2
7
@AndrewJLohn
Andrew J Lohn
4 years
Big news for CSET and for the broader AI policy world!
@CSETGeorgetown
CSET
4 years
📣 News Release! 📣 CSET is happy to announce an increase in grant funding, bringing our total funds to more than $100 million, to continue our work at the intersection of emerging tech and security. https://t.co/rhjogLv1Bw
0
0
10
@AndrewJLohn
Andrew J Lohn
5 years
We usually envision AI conflict, crisis, and escalation as being fast but what counts as fast? Apples and Oranges but: State Dept figures Iran nuclear breakout time is 3 months. Wall clock to train a 1T-parameter language model is also 3 months.
1
0
3
@AndrewJLohn
Andrew J Lohn
5 years
It's not an adversarial example, the library actually changes the image to a triceratops. Far worse in some ways.
@CSETGeorgetown
CSET
5 years
What would make a machine learning library turn a view of Georgetown University into a triceratops before classifying? @AndrewJLohn unpacks this and other supply chain threats in his latest CSET research. https://t.co/eBjgxAVibx
0
2
8
@CSETGeorgetown
CSET
5 years
✨ New Report!✨ Machine learning depends upon a foundation that others have built, but what happens if the bricks at the bottom are not to be trusted? In a new CSET report, @AndrewJLohn discusses risks to the machine learning supply chain.
Tweet card summary image
cset.georgetown.edu
Modern machine learning often relies on open-source datasets, pretrained models, and machine learning libraries from across the internet, but are those resources safe to use? Previously successful...
0
10
20