Insights Into Chinese Use of Generative AI and Social Bots from the Career of a PLA Researcher the Chinese Communist Party (CCP) was initially concerned about the rise of social media, considering…

Insights Into Chinese Use of Generative AI and Social Bots from the Career of a PLA Researcher the Chinese Communist Party (CCP) was initially concerned about the rise of social media, considering…
The indictment details the efforts of the defendants to steal nonpublic Trump campaign materials and engage in a “hack-and-leak” operation. On Sept. 26, a federal grand jury in the U.S. District Court…
Shifting the focus of AI liability from the systems to the builders. Editor’s note: This essay is part of a series on liability in the AI ecosystem, from Lawfare and the Georgetown Institute for Technology…
Human bias against robots could negatively impact AI policy. More than two years before the public release of ChatGPT, one of us wrote an article in this publication (based on a longer law…
How products liability law can adapt to address emerging risks in artificial intelligence. Editor’s note: This essay is part of a series on liability in the AI ecosystem, from Lawfare and the Georgetown Institute for…
AI-generated content sparks copyright battles, leaving courts to untangle thorny intellectual property issues. Editor’s note: This essay is part of a series on liability in the AI ecosystem, from Lawfare and the Georgetown Institute for Technology Law…
Federal agencies wield crucial tools for regulating AI liability but face substantial challenges in effectively overseeing this rapidly evolving technology. Editor’s note: This essay is part of a series on liability in the…
Chinese defense experts worry that AI will make it more difficult for Beijing to control and benefit from military crises. In the years since Xi Jinping assumed power, China has undertaken increasingly…
Cyber volunteers are defending the U.S. against rising cyber threats—the law can help or hinder their effectiveness. In June, the City of Cleveland was the victim of a ransomware attack, requiring services to be…