Facial recognition technology is developing rapidly and is increasingly being used in policing. What do policymakers need to understand in order to minimize the risks it poses, while also maximizing its benefits?
This report is the technical documentation for a tool that tracks Chinese government–supported development finance projects that used or enabled artificial intelligence technology in the Global South between 2000 and 2017.
The authors analyze a new project finance dataset on China's development-funded artificial intelligence (AI) export projects — adding interview-based country case studies — to better understand China's AI exports and their impact on developing countries.
The China AI Exports Database (CAIED) tracks Chinese government-supported development finance projects that utilized or enabled Artificial Intelligence (AI) technology in the Global South between 2000 and 2017.
Policymakers and cybersecurity analysts should avoid messaging that emphasizes the risk that cryptanalytically relevant quantum computers developed in secret could be imminent or already operational. There is already more than enough reason to upgrade our communications systems to resist attacks from quantum computers as soon as possible.
This paper presents an in-depth evaluation of differentially private synthetic data sets created for the National Institute of Standards and Technology's "Differential Privacy Synthetic Data Challenge."
This weekly recap focuses on the devastating earthquake that struck Turkey and Syria, regulating the use of facial recognition technology by law enforcement, improving data collection on gun violence, and more.
Our health is heavily influenced by our surroundings—including the health of the people around us. For digital health companies to credibly claim to improve people's health, their next step could be an increased willingness to look beyond an individualized notion of health and to work with public health agencies.
Until privacy protection laws are cemented into place, consumer privacy won't be assured unless consumers can effectively take the steps they need to take to protect their data. Tech companies might view this as a burden, but there will likely be profits for those companies that instead see it as an opportunity.
Future quantum computers could create a significant national security risk by enabling attackers to break a foundational element of security in America's networked communication infrastructure. The United States is taking strides to address national security risks from quantum computing, but there is a long road ahead.
The Supreme Court decision to overturn Roe v. Wade has providers and health advocates strategizing about how to provide more abortions where it is still legal. Expanding virtual medical visits is one popular idea. Policymakers and clinics could take steps to make telemedicine better understood, easier to use, and more equitable.
The U.S. government should consider offering a public cash bounty to anyone who can crack the new forms of encryption that are being rolled out to defend against quantum computers. If a bounty helps catch a vulnerability before it's deployed, then the modest cost of the bounty could prevent much higher costs down the line.
The demand for using software to improve health care, including software as a medical device (SaMD), is on the rise. Realizing the potential benefits of the growing demand for SaMD may require clearer and more-consistent regulation of patient safety and medical effectiveness.
In this report, researchers discuss how the United States should seek to balance the potential gains of the era of fifth-generation wireless networks with the potential loss of privacy and of control of personal data.