November 30, 2023
Behind China’s Plans to Build AI for the World
This fall, the Western world has galvanized around a blitz of AI initiatives, statements and multilateral deals — not least the Biden administration’s executive order and the U.K.’s Bletchley declaration — all geared to setting global rules for a fast-moving, competitive and possibly dangerous new technology.
China is taking a different path, one that could give it a lead while the West talks.
To compete with China’s efforts, the United States needs a far more expansive vision of how to empower other nations with the education, tools and infrastructure needed to jump start their own AI efforts
Rather than competing with the West to write the rules of the road for AI, Beijing is instead building the road itself, working with allies and client nations to construct Chinese-built AI ecosystems that could pose global risks if they take root and expand.
Read the full article and more from POLITICO Magazine.
More from CNAS
-
Technology & National Security
CNAS Insights | Bridging Washington and Silicon ValleyThe recent friction between Anthropic and the Pentagon has made me reflect on the painful chasm that opened between Washington and Silicon Valley following leaks from Edward S...
By Anne Neuberger
-
Technology & National Security
The Geopolitics of 6G with Vivek Chilukuri, Michael Calabrese, and Lindsay GormanVivek Chilukuri, senior fellow and program director at the Center for a New American Security, joined POLITICO Policy Outlook to discuss the geopolitical implications of 6G, t...
By Vivek Chilukuri
-
Technology & National Security
Two Illegal Biolabs Reveal Gaps in U.S. BiosecurityThis article was originally published in Lawfare.Last month, law enforcement officials launched an investigation into a suspected biolab in the Las Vegas home of Chinese natio...
By Sam Howell
-
Technology & National Security
CNAS Insights | America’s AI Cyber Defense Gap Needs Congress to ActTwice in the past five months, the U.S. Congress has allowed the authorization for U.S. cyber threat intelligence sharing to lapse. In each case, it managed only short-term ex...
By Spencer Michaels, Janet Egan & Michael Daniel
