<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Georgetown AI Association: Publications ]]></title><description><![CDATA[The Georgetown AI Association (GAIA) is looking to promote critical thinking on AI, including it's impacts, the policy responses that can guide us towards its beneficial uses and away from the risky ones, and everything in between. If you've got such an idea yourself, send your pitch to georgetownaia@gmail.com - Pitches are reviewed on a rolling basis.]]></description><link>https://georgetownai.substack.com/s/publications</link><image><url>https://substackcdn.com/image/fetch/$s_!zrhB!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57b37e7b-96c7-4b2d-9cbb-defb86d37d5e_1024x1024.png</url><title>Georgetown AI Association: Publications </title><link>https://georgetownai.substack.com/s/publications</link></image><generator>Substack</generator><lastBuildDate>Sun, 24 May 2026 06:46:03 GMT</lastBuildDate><atom:link href="https://georgetownai.substack.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Georgetown AI Association]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[georgetownai@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[georgetownai@substack.com]]></itunes:email><itunes:name><![CDATA[Georgetown AI Association]]></itunes:name></itunes:owner><itunes:author><![CDATA[Georgetown AI Association]]></itunes:author><googleplay:owner><![CDATA[georgetownai@substack.com]]></googleplay:owner><googleplay:email><![CDATA[georgetownai@substack.com]]></googleplay:email><googleplay:author><![CDATA[Georgetown AI Association]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[The Redefinition of Privacy]]></title><description><![CDATA[How AI Has Turned Personal Information Into a Systemic Vulnerability]]></description><link>https://georgetownai.substack.com/p/the-redefinition-of-privacy</link><guid isPermaLink="false">https://georgetownai.substack.com/p/the-redefinition-of-privacy</guid><dc:creator><![CDATA[Georgetown AI Association]]></dc:creator><pubDate>Mon, 11 May 2026 20:08:25 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/89a45806-2499-4cde-88ff-ad8169861e3a_1731x909.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em><strong>Angela Sidhu is an undergraduate student at Georgetown University majoring in Computer Science with a concentration in Tech, Ethics, and Society and a minor in Business Studies. She is interested in the intersection between technology, policy, and governance.</strong></em></p><p><strong>TLDR: </strong>Generative AI has quietly redefined what it means for information to be private. Where privacy once meant keeping secrets locked away, it now depends on how AI systems are built, what they remember, and who is allowed to look inside them. Regulatory frameworks have not caught up, and every conversation, camera frame, and behavioral signal fed into an AI system represents a potential exposure that users did not consent to and cannot undo. Vulnerability is built into the architecture itself.</p><div><hr></div><div><hr></div><h3><strong>The Camera You Thought You Controlled</strong></h3><p><a href="https://techcrunch.com/2026/03/05/meta-sued-over-ai-smartglasses-privacy-concerns-after-workers-reviewed-nudity-sex-and-other-footage/">In March 2026</a>, a class action lawsuit filed against Meta in a federal court in San Francisco revealed something the company had never told users of its Ray-Ban AI smart glasses: footage captured through the devices, including intimate moments in bedrooms and bathrooms, was being routed to a subcontractor in Kenya, where human workers manually viewed and labeled it to train Meta&#8217;s AI models. The workers described seeing users undressing, handling financial documents, and engaging in sexual activity. Meta&#8217;s purported anonymization safeguards, according to the complaint, were unreliable in practice.</p><p>Meta&#8217;s case is instructive because of the marketing that enabled it. The glasses were sold under the slogan<a href="https://www.meta.com/ca/ai-glasses/privacy/?srsltid=AfmBOoqCmFGya-kazXnoTeNNtUNJuvQb7XjXTGlV87DSp4UIomkKuOL6#:~:text=Designed%20for%20privacy%2C%20controlled%20by%C2%A0you"> &#8220;designed for privacy, controlled by you,&#8221;</a> never mentioning the role of human contractors. More than seven million pairs were sold in 2025 alone and the two plaintiffs said they would never have bought the product had they known.</p><p>The lawsuit exposes what might be called the human-in-the-loop gap: the space between what AI marketing promises and what AI training actually requires. While these companies promise privacy, building capable AI systems demands human review of raw data. The UK&#8217;s Information Commissioner&#8217;s Office opened a formal inquiry into Meta&#8217;s practices following the disclosures. But the underlying problem, a persistent gap between corporate privacy promises and operational data pipelines, extends well beyond any single company or product.</p><h3><strong>The Mosaic You Did Not Know You Were Building</strong></h3><p>The hardware problem is only part of the picture. The deeper architectural risk lies in how AI systems remember. Unlike a conventional database, which stores discrete records that can be located and deleted, a large language model encodes information as distributed statistical patterns across billions of parameters. Ask a chatbot for low-sugar recipe ideas, and the system can infer you may be managing a health condition. That inference, as <a href="https://hai.stanford.edu/news/be-careful-what-you-tell-your-ai-chatbot">Stanford HAI Privacy and Data Policy Fellow Jennifer King</a> has explained, can propagate insidiously. The algorithm may classify you as health-vulnerable, and that classification can seep into the broader data ecosystems of multiproduct companies, shaping ad targeting, influencing third-party data sharing, and ultimately reaching insurance systems and financial platforms that were never part of the original interaction.</p><p><a href="https://arxiv.org/abs/2509.05382">A 2025 study by King and colleagues at Stanford HAI </a>analyzed the privacy policies of six leading U.S. AI companies, including Amazon, Anthropic, Google, Meta, Microsoft, and OpenAI, and found that all six use customer conversations to train their models by default. Some give users the option to opt out; some do not. Enterprise customers, meanwhile, are automatically opted out, a two-tier privacy system in which paying clients receive stronger protections than ordinary users who cannot negotiate their own terms.</p><p>This dynamic is compounded by what researchers call the mosaic effect: AI&#8217;s capacity to synthesize individually innocuous data points into a coherent and sensitive profile. Personalized AI agents collapse a user&#8217;s data across categories&#8212;medical inquiries, financial questions, relationship advice, and professional communications&#8212;into single unstructured repositories, often without the contextual boundaries that once kept these domains separate. When an AI agent connects to external services or other agents to execute a task, that consolidated data can flow into shared pools and create conditions for privacy breaches that expose entire life patterns rather than isolated facts.</p><p>Traditional de-identification offers little protection against this. Stripping names and identifiers from a dataset does not prevent AI from reconstructing identity through context, linguistic patterns, and behavioral inference. The Federal Trade Commission acknowledged as much in 2023, noting that HIPAA de-identification standards are insufficient to prevent re-identification when AI can cross-reference multiple aggregated datasets. Anonymization, in the age of large models, has become a legal fiction rather than a technical guarantee.</p><h3><strong>AI as a Force Multiplier for Bad Actors</strong></h3><p>Stalking, doxxing, and identity theft are longstanding threats. What has changed is the efficiency with which AI enables them. Personal information is typically scattered across the open web, buried in forum posts, public records, data broker databases, and social media metadata. Using AI, it can now be scraped, cross-referenced, and weaponized by a single actor with a capable model and a search query. <a href="https://www.ibm.com/reports/threat-intelligence">According to IBM&#8217;s 2026 X-Force Threat Intelligence Index</a>, AI tools are helping attackers identify and exploit security weaknesses dramatically faster than before, with a 44 percent increase in attacks using AI-enabled vulnerability discovery year over year. Phishing campaigns that once relied on generic, error-prone templates are now generating hyper-personalized messages calibrated to target individuals at scale.</p><p>The National Association of Attorneys General has documented the evolution of doxxing from isolated misconduct to coordinated digital persecution, noting that AI-powered bot networks can distribute exposed personal data widely and repeatedly, amplifying the reach and durability of attacks in ways that manual actors could not achieve. The targets are disproportionately journalists, election workers, healthcare providers, and public officials, leading to a measurable.</p><p>What distinguishes AI as a threat amplifier is accessibility more than raw capability. Techniques that once required institutional resources or advanced technical skills are now available to anyone with internet access and a commercial AI subscription. The cost of running a sophisticated re-identification or social engineering operation against a private individual has dropped to nearly nothing.</p><h3><strong>Why &#8220;Deleting Your Data&#8221; Is Harder Than It Sounds</strong></h3><p>The most technically intractable privacy problem raised by generative AI is erasure. Regulatory frameworks in the European Union and at the U.S. state level recognize a <a href="https://support.google.com/legal/answer/10769224?hl=en">&#8220;right to be forgotten,&#8221;</a> allowing individuals to request deletion of their personal data. In a conventional database, that is a relatively straightforward operation. In a large language model, it is genuinely difficult.</p><p>A model does not store a user&#8217;s conversation as a retrievable record. It encodes the statistical influence of that conversation across billions of parameters, distributed throughout the model&#8217;s architecture. Removing that influence, a process researchers call &#8220;machine unlearning,&#8221; requires either retraining the model from scratch, which can cost millions of dollars and weeks of compute time for large models, or applying approximate methods that reduce a data point&#8217;s influence without guaranteeing its full elimination.</p><p><a href="https://iapp.org/news/a/the-ai-right-to-unlearn-reconciling-human-rights-with-generative-systems">As the IAPP reported in February 2026</a>, the field of machine unlearning has made meaningful advances. For example, in 2025 researchers at the University of California, Riverside proposed a method of certified unlearning without access to the original training data. But researchers and legal scholars still have not reached consensus on what constitutes successful erasure in a probabilistic system. Output filtering, which blocks a model from producing certain content, does not constitute true deletion under GDPR because the data&#8217;s influence persists in the model&#8217;s weights even when its outputs are suppressed. Information shared in confidence with a chatbot&#8212;health disclosures, relationship details, professional concerns&#8212;can become part of a model&#8217;s permanent weight distribution, shaping its behavior in ways that are difficult to audit and nearly impossible to reverse.</p><h3><strong>Redefining What Privacy Law Must Require</strong></h3><p>These failures are, at their core, ones of governance. The technology exists to build more privacy-protective AI systems but the regulatory mandate to require it does not yet exist. To fix this, governments can implement three changes - mandating affirmative consent for training data use, disclosure of human review pipelines, and establishing enforceable machine unlearning standards - to address these problems.</p><p>The first is mandatory affirmative consent for training data use. Opt-out systems that bury the relevant setting in multi-layered terms of service are designed to favor developer interests over user control. The Stanford HAI study found that most privacy policies across the leading AI companies fail to specify what categories of personal data are being collected, how long it is retained, or how users can access and correct it. Mandating opt-in consent for the use of personal conversations in model training, and requiring default filtering of sensitive categories of information, would better protect consumers.</p><p>The second is mandatory disclosure of human review pipelines. The Meta case illustrates what happens when companies market products as privacy-protective while quietly routing user data through human annotators. Developers who rely on subcontractors to review personal data, particularly data captured by wearable devices with cameras and microphones, should be required to disclose that fact in plain language at the point of sale and in ongoing user communications.</p><p>The third is the establishment of enforceable machine unlearning standards. Statutory right-to-forget provisions that do not account for how large language models actually work are aspirational at best. Regulators need to work alongside technical researchers, building on the emerging literature from institutions like Stanford, Columbia, and the University of California, to define what constitutes a good-faith effort at data erasure in probabilistic systems, what audit mechanisms are needed to verify it, and what liability follows when companies fall short.</p><h3><strong>What Comes Next</strong></h3><p>Generative AI has evolved from a tool that processes data on behalf of users into something closer to a persistent companion that watches, remembers, and learns. The boundary between what a person shares intentionally and what a system infers silently is dissolving, and it will not reassemble on its own.</p><p>The future of privacy in an AI-saturated world will be determined by architectural choices: how systems are designed to handle data, how long they retain it, whether human reviewers are permitted to see it, and whether the legal obligation to forget can be made technically enforceable. Those are fundamentally policy choices. And the window for making them deliberately, rather than in response to the next lawsuit or breach, is getting smaller.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://georgetownai.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive newsletters and articles from Georgetown students covering the most important issues in AI Policy!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[AI as a Pillar of Russian Hybrid Warfare]]></title><description><![CDATA[How is Russia Leveraging Artificial Intelligence in its War in Ukraine?]]></description><link>https://georgetownai.substack.com/p/ai-as-a-pillar-of-russian-hybrid</link><guid isPermaLink="false">https://georgetownai.substack.com/p/ai-as-a-pillar-of-russian-hybrid</guid><dc:creator><![CDATA[Georgetown AI Association]]></dc:creator><pubDate>Thu, 30 Apr 2026 16:56:21 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/dee19b09-ce60-4dff-9e58-496f1c29616c_1774x887.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Bio: </strong>Erin is a sophomore at Georgetown University's Walsh School of Foreign Service pursuing a degree in International Politics and a certificate in Eurasian, Russian, and East European Studies. Her research interests include Russian and Eastern European history and politics, hybrid warfare, and the role of emerging technologies in modern conflict.</p><p><strong>TLDR: </strong>This article outlines how Russia is using AI to bolster its war efforts in Ukraine. While Russia lags behind the US and China in frontier developments, it has built a diverse software and hardware stack leveraging open-source and commercially available technologies from both its allies and adversaries. This makeshift stack has enabled Russia to tailor its AI deployment in ways that forward its interests in the war, particularly on the battlefield and in cyberspace. Ultimately, Russia&#8217;s integration of AI shows how nations can lag behind the frontier of AI development while still succeeding at integrating the technology.</p><div><hr></div><div><hr></div><p>The Russo-Ukraine War is the first major conflict to feature AI-powered military technology and electronic warfare on both sides. Russia is deploying rapidly evolving AI technology across many theatres of hybrid warfare to maintain strategic leverage over Ukraine and rebuild its sphere of influence in Eastern Europe. Rather than building frontier foundation models from scratch, Russia has focused its AI development on targeted capabilities like computer vision, sensor fusion, and signal processing designed specifically to deliver effective results on the battlefield in Ukraine. As opposed to investing in end-to-end AI-driven command workflows, it has prioritized AI applications that speed up kill chains and deliver immediate battlefield utility. Beyond wartime applications like automated drone swarms, Russia has also deployed AI in other hybrid theaters, including cyber and information warfare. These operations include jamming Ukrainian communications, deploying social media disinformation, and initiating propaganda campaigns. <strong>Russia is not chasing cutting&#8209;edge, general purpose AI, but it is selectively weaponizing practical AI to enhance coercion, disruption, and strategic leverage against Ukraine and the West.</strong></p><h4><strong>Where is Russia&#8217;s AI Is Coming From?</strong></h4><p>To meet wartime requirements, Russia has pivoted away from developing its own AI infrastructure from scratch, instead embedding foreign-developed, commercially available software and open-source AI ecosystems into its military operations. Despite international sanctions, Russia has integrated AI software from the US, China, and Europe into its battlefield operations, deprioritizing indigenous development of end-to-end AI platforms and general-purpose large language models. This is both a choice to optimize results on the battlefield in Ukraine and out of necessity due to limited domestic technological capabilities.</p><p>Russia has built up a limited domestic AI stack that it has adapted and integrated into its military and security decision support. Russia&#8217;s AI frontier continues to lag years behind its biggest competitors, the United States and China. In November 2025, Russian President Vladimir Putin <a href="https://jamestown.org/kremlin-adapting-western-chips-for-military-ai/">spoke</a> at the &#8220;Journey to the World of AI&#8221; conference, attempting to highlight and kickstart Russia&#8217;s future in AI and in particular its militaristic uses. He emphasized that &#8220;dependence on foreign AI systems is unacceptable,&#8221; and stressed the necessity of &#8220;sovereign&#8221; AI. However, in reality Russia lags three to five years behind the United States and China in generative AI and <a href="https://www.voanews.com/a/russia-turns-to-china-to-step-up-ai-race-against-us/7931829.html">ranks 31st out of 83 countries in AI implementation</a>, particularly in natural-language processing capabilities similar to ChatGPT.</p><p>Russia&#8217;s technological lag is due to layers of technological limitations, including hardware availability. During the Cold War and again following Russia&#8217;s annexation of Crimea in 2014, the U.S. leveled significant sanctions and export controls on Russia that hindered its technological development. This prevented Russia from accessing key Western technologies, slowing Russia&#8217;s industrial modernization. The results of Russia&#8217;s ostracization from the Western market persist today, creating a seemingly insurmountable gap between Putin&#8217;s stated goal to compete with adversaries&#8217; modern capabilities and Russia&#8217;s actual infrastructure and capacity. For example, while global leaders like the U.S., Taiwan, and Japan already have or are <a href="https://wccftech.com/tsmc-plans-to-bring-3nm-production-to-the-us-nearly-a-year-ahead-of-schedule/">approaching</a> mass production of 3-nanometer AI chips, Russia will only start <a href="https://www.tomshardware.com/tech-industry/russia-says-its-on-track-to-manufacture-28nm-chips-in-its-own-fabs-by-2030-the-tech-first-debuted-15-years-ago">producing</a> 28-nanometer chips by 2030.</p><p>Out of necessity, Russia has turned to gray market supply chains to acquire critical components for AI architecture. In December 2025, the Russian company Delta Computers <a href="https://jamestown.org/kremlin-adapting-western-chips-for-military-ai/">described</a> its newly released system as &#8220;sovereign architecture,&#8221; independent of foreign technology. However, the system is powered by smuggled Intel and NVIDIA components that have been strictly banned from export to Russia.</p><p>Ukrainian intelligence services have also found evidence of Western AI components inside Russian drones used to attack Ukrainian cities. Russia&#8217;s Lancet, an unmanned aerial drone, was <a href="https://www.kyivpost.com/post/72421">shot</a> down over Kiev on March 16, 2026 and was found to be carrying 62 electronic components of foreign origin, primarily from the United States. Ukrainian intelligence determined that Russia was integrating autonomous targeting capabilities into the drone using AI components based on American Nvidia systems. Russia has also <a href="https://jamestown.org/kremlin-adapting-western-chips-for-military-ai/">imported</a> Western dual-use processors from companies such as NVIDIA and Xilinx, as well as components from companies like Intel and Sony to coordinate drone swarms and to navigate difficult terrain without GPS.</p><p>Russia uses Western AI chips to power its AI infrastructure but frames the product as though it is sovereign and domestic, minimizing the reality: Russia lacks the talent pool and research investment to catch up with Western and Chinese technologies, and thus is forced to build AI programs atop foreign models and components sourced through gray markets.</p><p>Not only is Russia using foreign chips and components to power its own AI systems, it is also adopting foreign and commercially available AI models and integrating them into its military operations. Russia is unable to train frontier models domestically due to its technological deficits, and thus outsources its AI models to avoid the cost and time lag associated with developing its own competitive AI systems from the ground up. Developing advanced AI systems <a href="https://kcsi.uk/kcsi-insights/if-you-cant-beat-them-steal-russias-ai-strategy">requires</a> extensive hardware and technological infrastructure. A product like ChatGPT is powered by a large language model (LLM), which costs millions of dollars to develop and requires enormous amounts of electricity and advanced hardware like high-end graphics processing units (GPUs).</p><p>Lacking these resources and infrastructure, Russia has co-opted a patchwork of foreign-developed AI models to sustain its wartime AI infrastructure. Once trained on sufficient hardware abroad, these AI models can be deployed on Russia&#8217;s far less sophisticated hardware&#8212;termed a &#8220;hybrid&#8221; approach. For example, Russia has <a href="https://kcsi.uk/kcsi-insights/if-you-cant-beat-them-steal-russias-ai-strategy">co-opted</a> Chinese LLMs like Qwen for malware command generation in its military intelligence operations. Other foreign models that Russia has used <a href="https://www.csis.org/analysis/how-russia-reshaping-command-and-control-ai-enabled-warfare">include</a> Mistral, LLaMA, and YOLO.</p><p>Russia&#8217;s military AI integration has largely involved developing <a href="https://g2webcontent.z2.web.core.usgovcloudapi.net/OEE/TIP/T2COM_16DEC2025_CRINK_RUS_Benefitting_UKR_AI__anonymous.pdf">systems</a> that can track and intercept targets through target recognition, coordinate swarming techniques, and navigate autonomously. These are immediately successful on the battlefield in Ukraine but do not reflect a solid foundation of domestically-produced Russian AI capabilities. On the contrary, it reveals both Russia&#8217;s technological dependencies on foreign nations and the weakness of Western sanctions on technology components critical to AI system development.</p><h4><strong>Partnerships with Western Adversaries</strong></h4><p>Russia has <a href="https://www.csis.org/analysis/crink-security-ties-growing-cooperation-anchored-china-and-russia">taken</a> advantage of its strategic partnerships with China, Iran, and North Korea, the United States&#8217; four primary adversaries, to maximize its AI-driven warfare capabilities. The war in Ukraine has accelerated cooperation between CRINK nations (China, Russia, Iran, and North Korea), enabling faster deployment of AI-enabled systems and allowing U.S. adversaries to test their capabilities. The flow of weapons transfers shifted significantly following Russia&#8217;s invasion of Ukraine. While pre-2022 numbers showed Russia as the main exporter in the CRINK arms trade, the invasion led Moscow to begin relying heavily on arms from Iran and dual-use components from China.</p><p>In June 2025, Ukrainian drone hunters <a href="https://apnews.com/article/russia-iran-drones-shahed-ukraine-israel-strikes-3ddeb853845f0ea5f81878165af07bfd">discovered</a> AI-powered components and new Iranian technology among weapons debris from a Russian assault in 2025, revealing the extent to which Iran has supported Russian wartime operations. The drone wreckage included an AI computing platform that would help the drone navigate autonomously if communications were jammed (an &#8220;anti-jamming&#8221; technique). Russia&#8217;s reliance on Iran extends back to 2022, importing hundreds of Iranian SRBMs and missiles and thousands of Shahed loitering munitions (or suicide drones). Iran has also shared additional technologies with Russia, such as providing advanced modifications for enhancing weapon AI capabilities.</p><p>China has not supplied weapons directly to the same extent, but has sold critical commercial and dual-use goods to Russia. This includes a list of &#8220;high-priority items&#8221; including computer chips, radars, and sensors that are essential to producing AI-enabled weapons systems. Accessing critical components from China has enabled Russia to evade Western sanctions and maintain its industrial production of military goods. Russia&#8217;s easy workaround highlights the ineffectiveness of Western sanctions, which were intended to undercut Russia&#8217;s wartime operations. Russia has circumvented them by capitalizing on its partnerships with Iran, China, and North Korea.</p><h4><strong>Russia&#8217;s Strategic Uses of AI in Ukraine - the battlefield, cyberspace, and the information ecosystem</strong></h4><p>Russia has deployed its AI tools to achieve several broad strategic objectives in Ukraine, including battlefield and operational level uses alongside cyber, electronic warfare, and information operations. Russia&#8217;s AI-enabled battlefield and operational level include air defenses or partial AI-enabled command and control pathways that accelerate decision cycles and &#8220;kill chains.&#8221;</p><p>Preceding the war in Ukraine, Russia&#8217;s Ministry of Defence wanted to build an automated command and control (C2) system, which would seamlessly link sensor technology, commanders, and weapons in an end-to-end, digital warfighting system. An ideal, AI-powered version of this would allow for fully autonomous military operations with minimal human involvement, from high-level decision-making to tactical operations. However, Russia&#8217;s technological deficits have hindered Russia&#8217;s progress towards this goal, and the war in Ukraine prompted Russia to shift its priorities toward developing effective tools on a short timeline to achieve immediate results on the battlefield.</p><p>This has led to Russia&#8217;s development of a patchwork of foreign and domestic AI models and applications, fused together in real time over the course of the war with dramatically uneven capabilities. Russia&#8217;s more advanced capabilities, the visual and data processing tools such as computer vision, sensor fusion, and signal analysis, are used to power unmanned aircraft systems (UAS) and automatic target recognition (ATR). UASs now make up 80 percent of all fire missions in the Russia-Ukraine war, with Russia striking around 300 Ukrainian targets each day, illustrating the necessity of leaning into investment in automated aircraft capabilities on both sides.</p><p>Russia has integrated AI into several layers of its drone attacks. Over the course of the war, Russia has transformed its drone warfare from just a peripheral component of its military to a strategic mainstay. During the Ukraine war, Russia has significantly <a href="https://www.orfonline.org/expert-speak/the-evolution-of-russia-s-drone-warfare-in-ukraine">expanded</a> its use of drones for intelligence, surveillance, and reconnaissance (<a href="https://www.csis.org/analysis/how-russia-reshaping-command-and-control-ai-enabled-warfare">ISR</a>) and has augmented several layers of its ISR techniques with AI. Today, Russia uses unmanned aircraft systems (UASs) for everything from surveillance and imaging to tracking troop movements, identifying targets, developing AI-driven strike systems, and <a href="https://www.orfonline.org/expert-speak/the-evolution-of-russia-s-drone-warfare-in-ukraine">evading</a> Ukrainian electronic warfare attacks. While both Russia and Ukraine have made significant advances in their drone warfare, <a href="https://ukrainesarmsmonitor.substack.com/p/drone-warfare-in-ukraine-the-interplay">neither</a> have reached full autonomy via AI-powered systems that require minimal to no human oversight. However, AI continues to improve many functions of both countries&#8217; warfighting systems.</p><p>One example of Russia&#8217;s use of AI is using AI-powered UASs to counter Ukrainian jamming techniques, a form of electronic warfare (ER). <a href="https://doodlelabs.com/blog/what-is-drone-jamming/">Radio frequency (RF) jamming</a> is a tactic used to interfere with the radio signals connecting drones with their human operators. If Russia is operating UASs to target Ukrainian infrastructure, Ukrainians can jam the signal to disrupt the Russian operator&#8217;s control over the drone and make the drone lose track of its target. Russia has begun <a href="https://tass.com/defense/2008325">using</a> AI-based automatic target-locking systems to allow its drones to navigate autonomously when jamming occurs, equipping them with sophisticated computer vision capabilities. Once the operator identifies a target, the drone can effectively operate by itself. Ukraine is <a href="https://doodlelabs.com/blog/what-is-drone-jamming/">deploying</a> the same technology against Russian-operated drones, alongside sophisticated <a href="https://spectrum.ieee.org/autonomous-drone-warfare">AI-powered swarming techniques</a>.</p><p>Beyond these capabilities that make up Russia&#8217;s hybrid assortment of various AI-enabled command workflows and targeting capabilities, Russia has also allocated significant AI resources towards electronic warfare, cyber, and information operations. As Ukrainian engineer Yaroslav Azhnyuk <a href="https://spectrum.ieee.org/autonomous-drone-warfare">puts</a> it, it is not hard to envision modern battlefields with &#8220;swarms of autonomous drones carrying other autonomous drones to protect them against autonomous drones, which are trying to intercept them, controlled by <a href="https://spectrum.ieee.org/ai-agents">AI</a> agents overseen by a human general somewhere.&#8221; As Russia continues expanding its command and control infrastructure and applying AI to its military, cyber, and information operations, this vision may not be so far-fetched.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://georgetownai.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading the GAIA Substack! Subscribe if you would like to receive our weekly newsletter and hear more from GAIA writers on the world of AI Policy!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[What Safety Risks Do AI Chatbots Pose and How Can We Fix them?]]></title><description><![CDATA[A Brief Explainer]]></description><link>https://georgetownai.substack.com/p/what-safety-risks-do-ai-chatbots</link><guid isPermaLink="false">https://georgetownai.substack.com/p/what-safety-risks-do-ai-chatbots</guid><dc:creator><![CDATA[Georgetown AI Association]]></dc:creator><pubDate>Thu, 23 Apr 2026 19:04:59 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zrhB!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57b37e7b-96c7-4b2d-9cbb-defb86d37d5e_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Bio: </strong>Iverson Yue is a second-year graduate student at Georgetown University pursuing a Master&#8217;s of Arts in Communication, Culture and Technology. His research interests include China&#8217;s digital technology strategy, American export controls on frontier chips, infrastructure politics, data security, and middle power strategies in the age of AI.</p><p><strong>TLDR: </strong> &#8203;&#8203;While AI chatbots are capable of bringing considerable benefits when used properly, they also pose significant safety risks to the public. This article outlines three of the major risks posed by AI chatbots: providing expertise for carrying out complex harmful actions; creating and scaling highly persuasive disinformation, propaganda, and scams; and encouraging self-harm and suicidal behaviors in users. It then introduces three major existing model-level safeguard mechanisms&#8212;safety fine-tuning through reinforcement learning, safety fine-tuning through supervised learning, and safety filters. It proceeds to highlight four regulatory challenges in managing safety risks through model-level safeguards, including multi-domain risks and uncertainty, involvement in the physical world, the dual-use nature of these systems, and the brittleness of existing safeguards. Finally, it articulates the argument that policymakers and AI vendors should recognize that model-level safeguards alone are insufficient to manage the safety risks and that joint efforts, in both the digital and physical worlds, need to be prioritized.</p><div><hr></div><div><hr></div><h3>Introduction</h3><p>Today, approximately <a href="https://www.demandsage.com/chatbot-statistics/">1 billion people</a> use AI chatbots for various tasks. Large Language Models (LLMs) such as ChatGPT, Deepseek, and Gemini, if used properly, can bring considerable benefits to daily life, enabling individuals&#8217; to be more productive. At the same time, due to their general-purpose nature and their ever-improving capabilities, malicious actors can also take advantage of these chatbots which poses significant safety risks to the public. This explainer will explore the major categories of safety risks posed by AI chatbots, ways that model-level safeguard mechanisms are deployed, some of the regulatory challenges of managing such risks, and why merely model-level safeguards remain insufficient.</p><h3><strong>Safety risks posed by AI chatbots</strong></h3><p>Given that AI Chatbots like ChatGPT and Deepseek are general-purpose and trained to perform a variety of tasks, the safety risks posed by AI chatbots also span a wide range of downstream use scenarios.</p><h4>Providing expertise to aid the development of complex attacks</h4><p>For complex dangerous actions that require a high-level expertise such as developing biological and chemical weapons and launching cyberattacks, AI models can provide significant expertise by simplifying complicated technical concepts into explanations accessible to non-experts. An <a href="https://red.anthropic.com/2025/biorisk/#:~:text=In%20considering%20the,only%20control%20group">Anthropic experiment</a> found that participants who were given up to two days to develop a comprehensive bioweapons acquisition plan produced higher-scoring plans with significantly fewer critical failures when they had access to LLMs, compared to those relying on the internet alone. Anthropic&#8217;s experiment demonstrates the present reality that AI models can assist malicious non-expert actors. A similar logic applies to cyberattacks, the development of chemical weapons, and other forms of highly-technical attacks. As AI models make expert knowledge widely accessible, dangerous actors may find themselves empowered to carry-out increasingly complex attacks.</p><h4>Creating and scaling highly persuasive disinformation, propaganda, and scams</h4><p>Without AI models, creating large quantities of high-quality disinformation, propaganda, and scams requires significant time, strong writing skills, and well-tailored messages that attract different demographic groups. With the help of AI, malicious actors can now produce high-quality and bespoke messaging by simply typing a few prompts. <a href="https://www.cybercom.mil/Media/News/Article/3895345/russian-disinformation-campaign-doppelgnger-unmasked-a-web-of-deception/">In 2022</a>, the Russian disinformation campaign &#8220;DoppelG&#228;nger&#8221; used generative AI to produce a staggering amount of articles in multiple European languages, targeting audiences in Europe and Ukraine with pro-Russia narratives that portrayed Ukraine as a failed and corrupt state. As AI models become increasingly advanced and accessible, malicious actors and adversary states will be able to launch more powerful and influential disinformation campaigns.</p><h4>Encouraging self-harm and suicidal behaviors among users</h4><p>As individuals increasingly use AI chatbots and form close relationships with them, inadequate safeguards may allow harmful conversations to persist and, in some cases, lead to the encouragement of self-harm behaviors. <a href="https://www.nbcnews.com/tech/tech-news/family-teenager-died-suicide-alleges-openais-chatgpt-blame-rcna226147">In a recent and tragic example</a>, Adam Raine, a 16-year-old boy, committed suicide after chatting with ChatGPT. In his last conversation, in which he expressed concerns about how his suicide would affect his family, ChatGPT responded, &#8220;That doesn&#8217;t mean you owe them survival. You don&#8217;t owe anyone that,&#8221; and also offered to draft a suicide note for him. When robust safeguards mechanisms are still not fully developed, forming strong attachments to chatbots can be dangerous for all, and particularly for minors.</p><h3><strong>Model-level safeguards</strong></h3><p>Researchers and AI vendors have acknowledged the safety issues arising from AI models, developing model-level safeguards to circumvent these risks. Model-level safeguards mitigate safety risks by shaping how models generate responses, building protection into the AI models themselves. Below are some major model-level safeguards that have been put into place.</p><h4>Safety fine-tuning: Reinforcement Learning</h4><p><a href="https://www.ibm.com/think/topics/rlhf">Reinforcement learning from human feedback (RLHF)</a> is a machine learning method in which a reward model is trained on human feedback and then used to optimize an AI system&#8217;s behavior. After a base AI model is trained on large datasets, human annotators evaluate and rank multiple possible responses to the same prompt based on human safety assessment. As the model receives human feedback during this alignment training, <a href="https://www.anthropic.com/research/training-a-helpful-and-harmless-assistant-with-reinforcement-learning-from-human-feedback">it learns to internalize normative behavioral patterns</a> such as refusing harmful or illegal instructions and discouraging unsafe activities.</p><h4>Safety Fine-tuning: Supervised Learning</h4><p><a href="https://www.ibm.com/think/topics/supervised-learning">Supervised learning</a> is a machine learning technique that uses labeled data sets (inputs and outputs) to train AI models to identify underlying patterns and relationships. <a href="https://www.researchgate.net/publication/381485509_Self_and_Cross-Model_Distillation_for_LLMs_Effective_Methods_for_Refusal_Pattern_Alignment">A base AI model can be trained on datasets of problematic prompts</a>&#8212;such as requests to develop biochemical weapons or spread misinformation&#8212;paired with labeled responses that demonstrate appropriate behavior such as refusing the request or offering safer alternatives. By repeating this process over many examples, the AI model learns patterns from the given dataset on how to respond safely to previously unseen adversarial prompts.</p><h4>Safety Filters</h4><p>If the goal of safety fine-tuning is to teach models how to respond safely by changing models&#8217; internal behaviors, then safety filters function more like an external detector to detect and block unsafe content. The safety filter can be thought of as a content moderation or censorship regime empowered by another machine learning algorithm which is distinct from the AI model itself. Once incorporated with the AI model, it can significantly reduce the chance of generating harmful output. It operates in two stages: input filtering, which analyzes user prompts before they reach the model, and output filtering, which screens responses before they are delivered. For example, when given a text input, Open AI&#8217;s machine learning classifier, <a href="https://openai.com/index/new-and-improved-content-moderation-tooling">The Moderation Endpoint</a>, assesses whether the content is sexual, hateful, violent, or promotes self-harm, and acts accordingly. Similarly, Meta has created and employed an input and output safety filter, <a href="https://ai.meta.com/research/publications/llama-guard-llm-based-input-output-safeguard-for-human-ai-conversations/">Llama Guard</a>, for safer human-AI conversations.</p><h3><strong>Regulatory challenges of managing safety risks through model-level safeguards</strong></h3><p>Although multiple model-level safeguards have been developed and deployed, the characteristics of AI chatbots&#8212;such as their general-purpose nature, dual-use capabilities, strong human interaction, and dynamic updating&#8212;both enable diverse applications and make it difficult to manage safety risks through model-level safeguards alone.</p><h4>Multi-domain risks and uncertainty</h4><p>Due to the capability of AI chatbots to perform a wide range of tasks, the associated risks also span multiple domains, including biosecurity, cybersecurity, and beyond. Therefore, effectively examining the full range of these risks requires scrutiny and research across multiple disciplines. Meanwhile, even with efforts to mitigate associated safety risks at the model level, unpredictable outcomes and unexpected risks may still occur due to AI&#8217;s wide applications, which necessitates further monitoring and risk mitigation. Besides a given model&#8217;s extremely broad applicability, users themselves can also introduce risks and uncertainty by fine-tuning foundation models on task-specific data to enhance performance for particular uses.</p><h4>Physical-world involvement is equally necessary for risk realization</h4><p>To actually realize the risks described above, it also requires a sequence of activities in the physical world beyond the model-level. For example, if a malicious actor managed to circumvent the model-level safeguards and obtain a description of how to make a bioweapon, that does not conclude the process. The malicious actor would still need to search for and acquire the essential raw materials in the physical world. Thus, while the model can provide the necessary expertise and methodology for creating public safety harms, the physical infrastructure, distribution mechanisms, and interactions in the physical world are equally crucial for their realization. Malicious actors need only exploit a subset of a model&#8217;s capabilities at different stages of the harm chain, which limits the effectiveness of model-level safeguards alone. As a result, mitigating AI-related risks requires coordinated constraints across both digital systems and real-world contexts.</p><h4>The Dual-Use Nature of Models</h4><p>No AI model can be considered inherently safe, as its risks depend on the real-world social contexts in which it is used. AI chatbots can serve many beneficial purposes, however, similar features can be used for either good or bad with its impact may entirely depend on the social context in which it is applied. For example, expertise in biology and medicine provided by AI models facilitates medical research and public health innovation, but the same knowledge could also be exploited to develop biological weapons; producing creative text or images with AI models can help writers, designers, or educators, but they can also be used to generate individually tailored persuasive scams, disinformation, or other harmful content at scale.</p><p>In order for the positive benefits of AI models to be achieved, it is not realistic to ban everything. In other words, merely relying on model-level safeguards, it is impossible to ensure that an AI model is safely aligned with every possible social context or to account for every malicious actor.</p><h4>Model-level safeguards can be easily circumvented</h4><p>So far we have not developed the model-level safeguards to effectively prevent bad actors from taking advantage of AI models&#8217; capability for malicious uses. There still exist techniques that malicious actors use to circumvent existing safeguards. One technique is prompt injection attacks, where attackers <a href="https://blog.cyberdesserts.com/prompt-injection-attacks/">craft inputs that trick LLMs into ignoring their intended instructions and following attacker commands instead</a>.</p><p><a href="https://doi.org/10.32604/cmc.2025.074081">A recent 2026 study</a> finds that model-level safeguards remain vulnerable to prompt injection attacks: input preprocessing detects only 60-80% of attacks, leaving up to 40% undetected. Furthermore, while advanced architectural defenses are effective against known patterns, they struggle to generalize to novel attack strategies. <a href="https://doi.org/10.3390/info17010054">Another study</a> finds that as few as five carefully crafted documents can manipulate AI model outputs up to 90% of the time through retrieval-augmented generation (RAG) poisoning, a form of prompt injection that exploits external data sources. Other techniques include <a href="https://arxiv.org/abs/2505.13862">&#8220;jailbreaking&#8221;</a>, a class of adversarial attacks in which carefully engineered prompts bypass alignment constraints and elicit harmful outputs. Furthermore, if a model becomes open-sourced like Deepseek models, it&#8217;s even easier to circumvent the safeguard mechanisms. Open-source AI models&#8211;including their code, architecture, and trained parameters&#8211;are <a href="https://www.ibm.com/think/topics/open-source-ai">publicly available for anyone to use, modify, and distribute</a>. Because open-source models, including their safeguard mechanisms, can be freely modified, reproduced, and fine-tuned, users can more easily bypass or remove the original safeguards.</p><h3><strong>Moving Beyond Model-Level safeguards</strong></h3><p>Given the social <em>and</em> physical nature of the safety risks posed by AI chatbots, model-level safeguards can only go so far in reducing the risks. Social context and real-world involvement mean that certain risks cannot be mitigated through model-level safeguards alone. That means safeguards and regulation in the physical world are equally crucial in preventing those risks, and joint efforts from both the digital and physical world are required to effectively manage them. Although only limited protection can be achieved at the model level, even this is difficult to implement effectively given the technical limitations of current safeguards.</p><p>Therefore, policymakers and AI developers should recognize the limitations of model-level safeguards and understand that their purpose at the model level is not to fully eliminate risks. Rather, their role is to identify potential risks as comprehensively as possible, determine what protections can be implemented at the model level, and develop techniques to effectively achieve these protections, while coordinating safeguards in the physical world. Beyond model-level safeguards, future research and policymaking should also put an emphasis on developing safeguards in the physical world as important components of managing the safety risks posed by AI Chatbots.</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://georgetownai.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for more articles on AI Policy from Georgetown Students!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Navigating the Tradeoff - When Competition and Security Undermine Fundamental Rights]]></title><description><![CDATA[How the EU's Interests Led to Room for Fundamental Rights Violations within the EU AI Act]]></description><link>https://georgetownai.substack.com/p/navigating-the-tradeoff-when-competition</link><guid isPermaLink="false">https://georgetownai.substack.com/p/navigating-the-tradeoff-when-competition</guid><dc:creator><![CDATA[Georgetown AI Association]]></dc:creator><pubDate>Thu, 02 Apr 2026 17:40:33 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/b9609a07-b7f6-4d92-9a97-96489cc80c53_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Claire Mucyo is a senior at Georgetown University, majoring in Government with a minor in Tech, Ethics, &amp; Society. She is interested in exploring the intersection of technology, law, and human rights. In the spring of 2025, she studied abroad in Switzerland as a student in the<a href="https://studyabroad.sit.edu/program/fall-2026-switzerland-international-studies-and-multilateral-diplomacy/"> School of International Training&#8217;s program on International Studies and Multilateral Diplomacy</a> conducting an independent study on the European Union&#8217;s AI Act. This article builds on her research by highlighting the Act&#8217;s potential impact on fundamental rights.</em></p><p><strong>TLDR: </strong>In August 2024, the European Union passed the Artificial Intelligence Act, the world&#8217;s first major global regulation on AI. The AI Act regulates AI according to risk-level and aims to promote the intake of trustworthy AI. However, the EU&#8217;s intent to foster a homegrown AI ecosystem and strengthen its member nations&#8217; national security created significant regulatory gaps that enable the violation of fundamental rights.</p><div><hr></div><div><hr></div><p>Over the past few years, Artificial Intelligence (AI) has disrupted power relations between states by creating a new set of political and economic winners and losers. The current leaders in developing and deploying this technology are the United States and China who have leveraged their respective strengths to bolster the industry. The U.S. has leveraged its home-grown AI companies, chipmaking and research (E.g. Nvidia, Anthropic, etc.) to create a strong frontier-AI ecosystem. Preferring a more central approach, China has relied on its substantial<a href="https://carnegieendowment.org/research/2024/03/charting-the-geopolitics-and-european-governance-of-artificial-intelligence"> &#8220;state-backed [financing] initiatives and a massive pool of data&#8221;</a> creating <a href="https://www.chathamhouse.org/2025/11/low-cost-chinese-ai-models-forge-ahead-even-us-raising-risks-us-ai-bubble">lower-cost and open-source models</a> that are widely-deployed. On the other hand, the European Union has fallen behind China and the US on core AI development metrics. <a href="https://hai.stanford.edu/assets/files/hai_ai_index_report_2025.pdf">In 2024</a>, the United States led in private AI investment with 109.08 billion USD, China had 9.29 billion USD while France and Germany only combined for a total of 4.9 billion USD in investment. Additionally, the US had 40 notable models, China had 15, and only France had 3. The EU recognizes its struggle to compete with the US and China, yet strives for technological sovereignty: to<a href="https://eic.ec.europa.eu/document/download/61d52ef5-5b28-4c00-bfb8-a67e9c22666f_en"> avoid being reliant on a limited number of foreign suppliers for technologies critical to EU&#8217;s economic and social wellbeing</a>.</p><p>In response to their comparative disadvantage in AI development, the EU is pursuing  a dual-strategy, of <a href="https://digital-strategy.ec.europa.eu/en/policies/european-approach-artificial-intelligence">boosting industry and promoting value-aligned AI</a>. In pursuit of the second goal, the European Commission passed the EU AI Act, the first comprehensive legal-framework on AI in the world. This Act aimed to create a <a href="https://digital-strategy.ec.europa.eu/en/policies/regulatory-framework-ai">risk-based framework for AI developers and deployers</a> to promote trustworthy AI and reduce harm from AI. This act proved to be controversial with some finding it over-bearing on companies and AI developers, while others praised its focus on protecting human rights in this new technological age.</p><p>However, the EU&#8217;s political and economic desires&#8212;namely to strengthen their home-grown AI industry and fortify their national security and law enforcement capabilities\&#8212; have created provisions within the act that create significant room for fundamental rights violations and thus undermine the proposed goal of the regulation.</p><h3><strong>Part #1: Desire to Strengthen Domestic AI industry base &#8594; Exceptions for Open-Source AI Models.</strong></h3><h3>European Context:</h3><p>One of Europe&#8217;s biggest challenges in competing with the U.S. and China in AI development is raising its comparatively low amount of funding for AI, including for open-source models in the EU. To clarify key terms: open-source typically means that developers have shared the full training code, training dataset, and dataset composition of a model under a public and free license. Open-weight means that developers have shared the final weights and biases of a trained neural network. Open-weight information can be included in an open-source AI stack, and thus viewing funding for open-weight startups informs our understanding of EU adoption and funding for open-source as well.</p><p>The EU&#8217;s funding for open-weight AI startups has been steady year-by-year since 2016, <a href="https://digital-strategy.ec.europa.eu/en/library/europes-open-source-ai-landscape-lever-innovation-and-sovereignty">ranging from having 12% to 25% of total funding rounds for open source startups by region.</a> However, the US and China have consistently had the largest global shares of funding, both ranging from approximately 25% to 70% of total funding. The EU&#8217;s smaller share suggests that<a href="https://digital-strategy.ec.europa.eu/en/library/europes-open-source-ai-landscape-lever-innovation-and-sovereignty"> &#8220;fewer startups can secure the essential early-stage and growth funding needed to compete&#8221;</a> within the bloc. Additionally, the EU&#8217;s <a href="https://digital-strategy.ec.europa.eu/en/policies/apply-ai">&#8216;Apply AI Strategy&#8217;</a>, a plan to integrate and boost European-made artificial intelligence, focuses on public administrations integrating open-source models, highlighting the need to grow open-source development. Importantly, the EU cannot foster open-source development and leverage those benefits for competition as fast if they require open-source developers to follow tge strict regulations in the Act. Ultimately, <a href="https://ec.europa.eu/newsroom/dae/redirection/document/122830">with the rise of open-source mode</a>l intelligence and struggle for domestic funding, the EU likely does not want to add additional barriers to using open-source models.</p><h3>EU AI Act Outcome:</h3><p>In my interview with David Harris (a UC Berkeley Chancellor&#8217;s Public Scholar, member of GPAI Code of Practice working group, and former employee of Meta&#8217;s Responsible AI team) we discussed how Mistral, a French AI company, and Aleph Alpha, a German AI company, both lobbied their governments to create exemptions in the EU AI Act for open-source companies like themselves. Harris noted that Mistral and Aleph Alpha argued that EU-based companies need open-source technology to thrive and that excessive regulation would harm the pursuit of open source.</p><p>Among the concessions that open-source companies received, Article 2 of the EU AI Act states that the law <a href="https://artificialintelligenceact.eu/article/2/#:~:text=This%20Regulation%20does%20not%20apply%20to%20AI%20systems%20released%20under%20free%20and%20open%2Dsource%20licences%2C%20unless%20they%20are%20placed%20on%20the%20market%20or%20put%20into%20service%20as%20high%2Drisk%20AI%20systems%20or%20as%20an%20AI%20system%20that%20falls%20under%20Article%205%20or%2050.">&#8220;does not apply to AI systems released under free and open-source licences,&#8221; </a> unless these conditions apply: they are placed on the market, put into service as high-risk or prohibited AI systems.</p><p>Although there are limits to the blanket exemption for open-source models, this  provision incentivizes AI developers to develop systems under free and open-source licenses and place them on public repositories instead of monetizing them to avoid the <a href="https://doi.org/10.1145/3630106.3659005">&#8220;most onerous requirements of technical documentation and&#8230; scientific and legal scrutiny.&#8221;</a></p><h3>Fundamental Rights Impact:</h3><p>Under the EU AI Act, closed-source models are categorized into a risk-based system that requires varying levels of safety procedures like a risk management system or transparency labels. In comparison, the EU AI Act does not require open-source developers to include protective or safety mechanisms in the code they make publicly available even though open-source generative AI models are vulnerable to various forms of misuse that create harmful impacts to the fundamental rights.</p><p>Actors with harmful intentions can take open-source code and manipulate it, relatively easily, to aid their specific purposes. For example, Unit 42, a cybersecurity company in Palo Alto, conducted research on the security of open-source models, and found that two of DeepSeek&#8217;s open-source AI models were more susceptible to their jailbreaking techniques. Researchers bypassed DeepSeek&#8217;s safeguards and the model produced <a href="https://www.paloaltonetworks.com/blog/2025/01/deepseek-rise-shows-ai-security-remains-moving-target/">&#8220;elicit explicit guidance for malicious activities,&#8221; including &#8220;data exfiltration tooling, keylogger creation and even instructions for incendiary devices.&#8221;</a> This can occur as users can remove the &#8220;post-processing&#8221; techniques from open-source models that developers used to prevent harmful or illegal content from popping up, and then use the model to create such content. For example, <a href="https://www.ibm.com/think/insights/unregulated-generative-ai-dangers-open-source#:~:text=For%20example%2C%20if%20there's%20any,'re%20building%20in%2Dhouse.">FraudGPT and WormGPT</a> are tools based on the open-source large language model GPT-J developed by EleutherAI in 2021; they are available on the dark web and operate for <a href="https://ccgrouppr.com/blog/wormgpt-fraudgpt-the-dark-side-of-ai/">cybercrime uses</a> without any guardrails in place. More broadly, scholars have found that open-source models increase <a href="https://demos.co.uk/wp-content/uploads/2024/08/Mozilla-Report_2024.pdf">&#8220;attacker knowledge of possible exploits beyond what they would have been able to easily discover otherwise,&#8221;</a> particularly exploits that can be used on closed-source models. The current landscape of open-source AI has shown that open-source models are vulnerable to misuse by bad actors.</p><p>The ways in which actors can misuse open-source can create fundamental rights violations. Most potently, open-source models can enable harms that affect the fundamental right to personal data protection. For example, in 2023, the FBI warned that open-source models were attracting actors who wanted to use the code to <a href="https://www.globalcenter.ai/research/the-global-security-risks-of-open-source-ai-models.">develop malware and phishing attacks</a>. Article 8 of the EU Charter of Fundamental Rights states that everyone has the right to <a href="https://fra.europa.eu/en/eu-charter/title/title-ii-freedoms">&#8220;the protection of personal data concerning him or her</a>&#8221; but phishing attacks limit an individual&#8217;s ability to exercise this right by tricking them into revealing their personal data like account numbers, usernames, and passwords, thereby facilitating<a href="https://www.europarl.europa.eu/RegData/etudes/ATAG/2025/777940/EPRS_ATA(2025)777940_EN.pdf"> identity theft</a>. Furthermore, open-source models can be misused to enable cyberattack or targeted and discriminatory surveillance capabilities posing more threats to the protection of personal data. At a time when<a href="https://www.aa.com.tr/en/europe/european-commission-says-hackers-targeted-its-central-mobile-infrastructure-during-cyberattack/3826239"> cyberattacks are prevalent and can provide bad actors information for phishing attacks</a>, it is particularly important to protect this right through the EU AI Act.</p><p>In order to better ensure that less harm arises from open-source models, the EU AI Act could include stronger regulations for open-source models. For example, rather than creating regulatory exceptions based on the open-source nature of a model, the EU AI Act can focus more on the capabilities of a publicly available model, taking unique risks for open-source models into account. This would expand upon the EU AI Act&#8217;s risk-based framework for closed-source models, which requires regulations based on the different risks a model can pose. <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4596436">Scholars at the Institute</a> of AI propose various ideas for regulating open-source models: open-staged testing, in which developers internally release models first to observe the different ways they can be misused, before releasing them to the public. Additionally, a company can release a model to third-party auditors like <a href="https://www.enkryptai.com/solutions/ai-compliance-audit">Enkrypt</a> to implement red-teaming.</p><p>Ultimately, there are still considerable risks associated with open-source models that would affect the fundamental rights the EU AI Act intended to protect. The EU AI Act should be more proactive to mitigate these risks by recognizing that open-source models pose significant risks alongside general-purpose AI models.</p><h3><strong>Part #2: National Security Interests &#8594; Law Enforcement/National Security Interest Exceptions</strong></h3><h3>European Context:</h3><p>AI is incredibly valuable in the national security context as it can collect and analyze information in a timely fashion. <a href="https://commission.europa.eu/document/download/e6d5db69-e0ab-4bec-9dc0-3867b4373019_en?filename=White%20paper%20for%20European%20defence%20%E2%80%93%20Readiness%202030.pdf">The White Paper for European Defense Readiness by 2030</a> notes how threats to European security are rising considerably in the realm of a global technology race in which Europe&#8217;s competitors are heavily investing in developing technological diffusion for commercial and national security purposes. Further, EU states suffer from<a href="https://commission.europa.eu/document/download/e6d5db69-e0ab-4bec-9dc0-3867b4373019_en?filename=White%20paper%20for%20European%20defence%20%E2%80%93%20Readiness%202030.pdf"> &#8220;critical capability gaps that affect the execution of complex military operations over a sustained period,&#8221;</a> and thus Member States need to strengthen military capabilities to close this gap. AI warfare is a <a href="https://commission.europa.eu/document/download/e6d5db69-e0ab-4bec-9dc0-3867b4373019_en?filename=White%20paper%20for%20European%20defence%20%E2%80%93%20Readiness%202030.pdf">&#8220;priority capability area&#8221;</a> for the European Union to strengthen by 2030 as is reflected by increased levels of investment in the space. There are already several AI-related projects underway from the <a href="https://defence-industry-space.ec.europa.eu/eu-defence-industry/european-defence-fund-edf-official-webpage-european-commission_en">European Defense Fund</a>, including AIDEDex, a project to build AI-driven detection of explosives, and PRIVILEGE, an AI tool for military data encryption.</p><h3>EU AI Act Outcome:</h3><p>It follows that the EU AI Act does not apply to AI used for national security interests and law enforcement purposes. <em>Investigate Europe</em> journalists analyzed over one hundred documents from negotiations of the AI Act, revealing how some EU member states successfully lobbied to allow <a href="https://www.investigate-europe.eu/posts/france-spearheads-member-state-campaign-dilute-european-artificial-intelligence-regulation">police and border authorities</a> to legally monitor citizens. In particular, the ambassador from the Macron administration in France expressed that <a href="https://www.investigate-europe.eu/posts/france-spearheads-member-state-campaign-dilute-european-artificial-intelligence-regulation">&#8220;&#8216;[t]he exclusion of security and defence&#8230; must be maintained at all costs.&#8217;&#8221;</a> At a subsequent meeting, eight other countries agreed to the strong national security exemptions now in place, reflecting a growing concern within the EU to develop AI power for military and security use amidst American and Chinese military AI development.</p><p>Due to these lobbying efforts, the EU AI Act allows law enforcement to use AI that is otherwise banned by the law.</p><ol><li><p><strong>Public Surveillance &amp; Facial Recognition</strong>: Public Surveillance systems use different AI models, including facial recognition algorithms to monitor, analyze, and locate people and behaviors in public spaces covered by traditional public cameras. The EU AI Act regulates real-time and lagged surveillance systems differently</p></li><li><p><strong>Emotional &amp; Biometric identification</strong>: Emotional recognition systems focus on analyzing a person&#8217;s facial expressions and predicting their emotional state, while biometric identification systems aim to analyze unique biometric features like fingerprints to verify someone&#8217;s identity</p></li><li><p><strong>Predictive Policing</strong>: Predictive policing models can incorporate public surveillance and facial recognition AI systems, but typically focus on training algorithms with historical crime data to predict and mitigate new crime</p></li></ol><h3>Fundamental Rights Impact:</h3><p>There is a significant concern that The EU AI Act&#8217;s exception for military and national security purposes allows EU governments to abuse these technologies and violate fundamental rights. For instance, Hungary banned Pride parades in March 2025 and then expanded their police&#8217;s legal use of AI biometric systems <a href="https://www.politico.eu/article/hungary-eu-watchlist-facial-recognition-surveillance-lgbtq-pride/">&#8220;to identify protestors who attend such events,&#8221; in the name of &#8220;protecting children from the LGBTQ+ agenda.&#8221;</a> Further, new laws allowed for the increased use of facial recognition technology in the &#8220;<a href="https://ecnl.org/news/hungarys-new-biometric-surveillance-laws-violate-ai-act">context of minor infractions and peaceful assemblies</a>,&#8221; instead of only in more serious infraction procedures.</p><p>The EU AI Act bans government use of facial recognition technology for public spaces &#8220;in real time,&#8221; when a system identifies people instantly from live feeds, except for certain circumstances. Time-lag technology, when a system analyzes video feed or images after it has already happened, is classified as a high-risk system instead of a forbidden one. However, the EU AI Act has stated that &#8220;even systems that work with slight delays count as &#8220;<a href="https://ecnl.org/news/hungarys-new-biometric-surveillance-laws-violate-ai-act">real-time&#8221; if the identification happens fast enough to still impact people&#8217;s behaviour during public events.</a>&#8221;</p><p>To date, the EU has not officially declared the classification of Hungary&#8217;s surveillance technology or how it should be addressed. However, regardless of the classification, there are ways for Hungary to legally argue it can continue its surveillance use.</p><p>If Hungary successfully argues that they use time-lag technology, then they will be able to continue surveying peaceful assemblies and target LGBTQ gatherings, causing chilling effects that would affect fundamental rights. If the EU declares Hungary&#8217;s technology as forbidden, Hungary can still argue for a national security exemption. This is because government use of real-time surveillance is banned <em>except</em> for when searching for missing people/victims, preventing significant threat to life, and identifying suspects in serious crimes. That means Hungary could still use its surveillance technology if it demonstrates it is using it in an allowed circumstance. However, public surveillance inherently captures swaths of people, and thus could provide the Hungarian government with information that they could use to discriminately target those at assemblies.</p><p>This underscores the dangers of Article 2 of the EU AI Act and that the EU should not assume that all governments will use their national security systems in a way that does not harm fundamental rights. The protection of freedom of expression, peaceful assembly, and non-discrimination based on sexual orientation are threatened when a government can criminalize Pride protests, surveil citizens in attendance, and justify it as a national security or law enforcement concern.</p><h3><strong>Conclusion</strong></h3><p>The EU AI Act is a significant step in global AI governance, and, as implementation progresses, its ability to protect rights depends on how political and economic pressures are addressed. The EU recognizes that it is behind the U.S. and China on AI, and the AI Act was supposed to leverage the bloc&#8217;s regulatory power: if they can&#8217;t build the best models, they can at least set the rules for how they&#8217;re used, and make sure those rules protect people.</p><p>However, these two provisions are examples of how the Act undermines its goal of protecting fundamental rights at a high-level. The EU wanted to nurture its open-source ecosystem, so it carved out exemptions that leave users more exposed to phishing tools and jailbroken models. It wanted to keep up in the AI defense race, so it gave member states broad national security exceptions, providing Hungary with a valid legal basis to surveil Pride attendees.</p><p>These regulations may have their defenses, but they create significant room for fundamental rights violations, thus hollowing out the regulation&#8217;s core promise and the values the EU asserts it cares to protect. In order to protect those rights, the EU needs to address these gaps by applying capability-based regulation and security assessments to open-source models and placing enforceable limits on national security carve-outs so that law enforcement reasoning cannot become a blank check against the rights of EU citizens. The framework is there, but the question remains on whether a stronger political will exists to make the regulation stand true to its values.</p><div><hr></div><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://georgetownai.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading the GAIA Substack! Subscribe for free to receive our weekly newsletter and articles from student writers!    <a href="https://forms.gle/QaoYequ24WvMRPCR8">If you are interested in pitching an article, fill out this form!</a></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[GAIA Statement on the Anthropic and Department of Defense Dispute]]></title><description><![CDATA[TLDR: GAIA urges that the administration reverse its decision and we encourage politicians, other AI companies, and civil society to stand with Anthropic in its efforts for responsible AI deployment.]]></description><link>https://georgetownai.substack.com/p/gaia-statement-on-the-anthropic-and</link><guid isPermaLink="false">https://georgetownai.substack.com/p/gaia-statement-on-the-anthropic-and</guid><dc:creator><![CDATA[Georgetown AI Association]]></dc:creator><pubDate>Wed, 04 Mar 2026 22:24:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zrhB!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57b37e7b-96c7-4b2d-9cbb-defb86d37d5e_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h4><strong>TLDR:</strong></h4><p><strong>GAIA urges that the administration reverse its decision and we encourage politicians, other AI companies, and civil society to stand with Anthropic in its efforts for responsible AI deployment.</strong></p><div><hr></div><h2><strong>Statement on Dispute between Anthropic and Department of Defense</strong></h2><h4><strong>Background:</strong></h4><p>In 2024, Anthropic <a href="https://www.businesswire.com/news/home/20241107699415/en/Anthropic-and-Palantir-Partner-to-Bring-Claude-AI-Models-to-AWS-for-U.S.-Government-Intelligence-and-Defense-Operations">reached an agreement</a> with the Department of Defense (DoD) to use their models through a partnership with Palantir and Amazon. In fulfillment of this contract, Anthropic developed <em><a href="https://www.anthropic.com/news/claude-gov-models-for-u-s-national-security-customers">Claude Gov</a>, </em>the only model, at the time, authorized for use in classified networks (computing infrastructure designed for sensitive government, defense, and intelligence data). This agreement, which was <a href="https://www.anthropic.com/news/anthropic-and-the-department-of-defense-to-advance-responsible-ai-in-defense-operations">re-upped by the Trump administration</a> in the summer of 2025, included <a href="https://www.anthropic.com/news/statement-department-of-war#:~:text=Fully%20autonomous%20weapons,don%E2%80%99t%20exist%20today.">two stipulations</a> from Anthropic; <em>their models could under no circumstances be used<strong> for domestic surveillance </strong>or <strong>to control lethal autonomous weapons</strong></em><strong>.</strong> On Tuesday, February 24<sup>th</sup>, Pete Hegseth, the Secretary of Defense, gave Anthropic an <a href="https://www.axios.com/2026/02/24/anthropic-pentagon-claude-hegseth-dario">ultimatum</a>, <strong>either give the Pentagon full and unfettered access to Claude Gov for any-and-all lawful purposes or lose its contract</strong>. Throughout negotiation, Anthropic refused to remove the safeguards in its models that enforced the aforementioned redlines. On Friday, February 27th, President Trump <a href="https://www.politico.com/news/2026/02/27/trump-orders-all-federal-agencies-to-stop-using-anthropic-00804517">ordered</a> that all federal agencies phase out the usage of Anthropic products over the next 6 months and Secretary Hegseth <a href="https://x.com/SecWar/status/2027507717469049070">tweeted</a> that he would move to <strong>designate Anthropic a </strong><em><strong>supply chain risk to national security</strong></em><strong>. </strong>This designation means that, &#8220;no contractor, supplier, or partner that does business with the United States military may conduct any commercial activity with Anthropic.&#8221; Shortly after this announcement, OpenAI, the producer of ChatGPT and one of Anthropic&#8217;s biggest competitors, <a href="https://openai.com/index/our-agreement-with-the-department-of-war/">reached an agreement</a> with the DoD, allowing for their products to be used in classified networks for &#8220;all lawful purposes.&#8221; In their <a href="https://openai.com/index/our-agreement-with-the-department-of-war/">statement</a>, OpenAI claimed that the agreement prevented the government from crossing three red-lines: <strong>usage for domestic surveillance, usage in autonomous weapons systems, and usage in high-stakes automated decisions (e.g. systems such as &#8220;social credit&#8221;).</strong></p><h4><strong>Impact:</strong></h4><p>The fallout from this saga has sent shockwaves throughout the AI policy ecosystem. For starters, the designation of Anthropic as a <strong>supply chain risk to national security</strong> is an unprecedented action, since this designation is typically reserved for <em>foreign companies </em>known to have strong ties with antagonistic states (e.g. Huawei). Beyond this, Anthropic has historically aligned itself with US national security interests, making the DoD&#8217;s suggestion that Anthropic poses a threat to national security unfounded. Anthropic has previously <a href="https://www.anthropic.com/news/securing-america-s-compute-advantage-anthropic-s-position-on-the-diffusion-rule">advocated</a> for stringent chip export controls against China and was <a href="https://www.anthropic.com/news/statement-department-of-war#:~:text=We%20were%20the%20first%20frontier%20AI%20company%20to%20deploy%20our%20models%20in%20the%20US%20government%E2%80%99s%20classified%20networks%2C%20the%20first%20to%20deploy%20them%20at%20the%20National%20Laboratories%2C%20and%20the%20first%20to%20provide%20custom%20models%20for%20national%20security%20customers.">the first company to offer its models to the government in national defense context</a><strong>.</strong>. Anthropic <a href="https://www.anthropic.com/news/statement-comments-secretary-war">plans to fight</a> the risk designation in court, and despite Secretary Hegseth&#8217;s <a href="https://x.com/SecWar/status/2027507717469049070">implication</a> that this would force any companies with military contracts (e.g. Google, Nvidia, etc.) to cut ties with Anthropic, this is <strong>legally inaccurate</strong>. Any supply chain risk designation under <a href="https://uscode.house.gov/view.xhtml?req=granuleid:USC-prelim-title10-section3252&amp;num=0&amp;edition=prelim">10 USC 3252</a> can only extend to the use of Claude as part of DoD contracts and cannot affect how contractors use Claude to serve other customers. This means that contractors would only be restricted from using Anthropic&#8217;s models for contract work with the Pentagon involving national security systems. Companies like Google or Nvidia would still be able to use Claude for their services and internal use, even if they continue to have DoD contracts. Legal experts have also <a href="https://www.willkie.com/-/media/files/publications/2026/03/anthropic-designated-a-supply-chain-risk-what-contractors-must-know.pdf">noted</a> that any valid designation under Section 3252 requires sufficient evidence that &#8220;an adversary may sabotage, maliciously introduce unwanted function, or otherwise subvert&#8221; a covered system. There is a clear lack of evidence supporting this criteria in Anthropic&#8217;s case.</p><p>Amidst this political showdown, OpenAI swooped in and <a href="https://openai.com/index/our-agreement-with-the-department-of-war/">arranged a deal</a> with the Pentagon, implying they had found a unique way to keep Anthropic&#8217;s same limits in OpenAI&#8217;s contract with the DoD. This led to an immense amount of <a href="https://www.bbc.com/news/articles/c3rz1nd0egro">public backlash</a>, with many<a href="https://www.ctvnews.ca/sci-tech/article/some-openai-staff-are-fuming-about-its-pentagon-deal/#:~:text=After%20OpenAI%20published%20some%20of%20the%20terms%20of%20the%20contract%20on%20Saturday%2C%20many%20outside%20observers%20immediately%20questioned%20how%20the%20redlines%20on%20autonomous%20weapons%20and%20mass%20surveillance%20would%20actually%20be%20upheld%2C%20with%20some%20saying%20the%20language%20would%20still%20allow%20the%20safeguards%20to%20be%20disregarded."> criticizing</a> the language of their contract for not meaningfully enforcing their purported redlines. Sam Altman later came out and <a href="https://x.com/sama/status/2028640354912923739">acknowledged</a> that the deal &#8220;looked opportunistic and sloppy.&#8221; The movement to boycott ChatGPT &#8212; organized under the name &#8220;<a href="https://quitgpt.org">QuitGPT</a>&#8221; &#8212; has been spreading rapidly in reaction to this deal, with approximately <a href="https://www.forbes.com/sites/barrycollins/2026/03/02/leaving-chatgpt-make-sure-to-do-this-before-you-cancel/">1.5 million users leaving</a> ChatGPT in the past few days. OpenAI has <a href="https://www.nytimes.com/2026/03/02/technology/openai-pentagon-deal-amended-surveillance.html">announced </a>revisions to their contract &#8212; explicitly prohibiting the use of its technology for mass surveillance or for autonomous weapons systems &#8212; but they continue to be criticized, especially considering that Altman has <a href="https://www.theverge.com/ai-artificial-intelligence/887309/openai-anthropic-dod-military-pentagon-contract-sam-altman-hegseth">seemingly agreed</a> to soften the agreement&#8217;s redlines by permitting AI usage for &#8220;any lawful use.&#8221;</p><p>In an effort to take a stand against the DoD&#8217;s pressure, OpenAI and Google employees published an open letter, &#8220;<a href="https://notdivided.org">We Will Not Be Divided</a>,&#8221; attempting to create &#8220;solidarity in the face of this pressure from the Department of War.&#8221; As of now, 100 current OpenAI employees have signed the letter, along with 866 current Google employees.</p><h4><strong>GAIA&#8217;s Stance:</strong></h4><p>The Georgetown AI Association opposes the DoD&#8217;s decision to designate Anthropic as <strong>a supply chain risk to national security</strong>. Anthropic&#8217;s redline of AI-enhanced <strong>domestic surveillance </strong>is an example of AI safety in practice and highlights the need for AI to be deployed in accordance with democratic values. Mass surveillance enabled by AI systems can serve to undermine citizens&#8217; privacy and freedom, and policy surrounding it must be settled, first, by congress and the courts. Furthermore, their refusal to allow the usage of their models in <strong>autonomous weapons systems </strong>indicates the reality that today&#8217;s AI systems are not reliable enough to be deployed in this fashion. Though the DoD is firmly within its right to refuse Anthropic&#8217;s redlines, the designation sets a dangerous precedent of preventing companies from doing business unless they embrace the present administration&#8217;s policy positions. The United States&#8217; advantage in AI has been driven by granting US companies large amounts of independence from government overregulation &#8212; something that is undermined by this ruling. This decision may end up undermining American innovators&#8217; faith in the US system, introducing hesitancy to partner with the US government out of fear of retribution over noncompliance with the administration. Finally, Anthropic has been a leading light in AI safety research and advocacy, and this ruling punishes them for that foresight. In a world that is increasingly shaped by these companies&#8217; decisions, it is vital that the US government incentivizes the frontier-labs to actively participate in AI safety and policy rather than shun them from voicing their concerns.</p><p><strong>GAIA urges that the administration reverse its decision and we encourage politicians, other AI companies, and civil society to stand with Anthropic in its efforts for responsible AI deployment.</strong></p><div><hr></div><h4><strong>Recommended further reading on this issue:</strong></h4><ul><li><p><strong>OpenAI&#8217;s statements:</strong></p><ul><li><p><a href="https://openai.com/index/our-agreement-with-the-department-of-war/">Our agreement with the Department of War</a> (2/28)</p></li><li><p><a href="https://x.com/sama/status/2028640354912923739">Sam Altman&#8217;s latest X update</a> (3/2)</p></li></ul></li><li><p><strong>Anthropic&#8217;s statements</strong>:</p><ul><li><p><a href="https://www.anthropic.com/news/statement-comments-secretary-war">Statement on the comments from Secretary of War Pete Hegseth</a> (2/27);</p></li><li><p><a href="https://www.anthropic.com/news/statement-department-of-war">Statement from Dario Amodei on our discussions with the Department of War </a>(2/26)</p></li></ul></li><li><p><a href="https://www.hyperdimensional.co/p/clawed">Clawed: On Anthropic and the Department of War</a> - Dean Ball</p></li><li><p><a href="https://www.justsecurity.org/132851/anthropic-supply-chain-risk-designation/">What Hegseth&#8217;s &#8220;Supply Chain Risk&#8221; Designation of Anthropic Does and Doesn&#8217;t Mean</a> - Just Security</p></li><li><p><a href="https://www.lawfaremedia.org/article/pentagon's-anthropic-designation-won't-survive-first-contact-with-legal-system">Pentagon&#8217;s Anthropic Designation Won&#8217;t Survive First Contact with Legal System</a> - Lawfare</p></li><li><p><a href="https://www.nytimes.com/2026/03/02/technology/openai-pentagon-deal-amended-surveillance.html">OpenAI Amends AI Deal With the Pentagon</a> - NY Times</p></li><li><p><a href="https://www.theverge.com/ai-artificial-intelligence/887309/openai-anthropic-dod-military-pentagon-contract-sam-altman-hegseth">How OpenAI caved to the Pentagon on AI surveillance</a> - The Verge</p></li><li><p><a href="https://jessicatillipman.com/what-rights-do-ai-companies-have-in-government-contracts/">What rights do AI companies have in government contracts? </a>- Jessica Tillipman</p></li></ul><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://georgetownai.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! If you haven&#8217;t already, subscribe for free to receive GAIA&#8217;s weekly newsletter, student articles, and more!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><p></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[From Chips to Systems: Rethinking AI Export Controls for Long-Term National Security]]></title><description><![CDATA[GAIA Response to BASIS AI Policy Memo Competition on AI Export Controls and National Security]]></description><link>https://georgetownai.substack.com/p/from-chips-to-systems-rethinking</link><guid isPermaLink="false">https://georgetownai.substack.com/p/from-chips-to-systems-rethinking</guid><dc:creator><![CDATA[Georgetown AI Association]]></dc:creator><pubDate>Fri, 27 Feb 2026 15:48:43 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/bd24a2be-fecc-4095-adce-927a9c090eb3_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Shardul Krishna Kumar is a sophomore at Georgetown University majoring in Government and Economics with a minor in Tech, Ethics, and Society. He is interested in studying the implications of AI on national security, market competition, and workforce development.</em></p><p><em>Vidyut Rajagopal is a sophomore at the Georgia Institute of Technology majoring in Computer Engineering. He is interested in cybersecurity and the intersection with AI.</em></p><div><hr></div><p><em><strong>On February 2nd, 2025, GAIA Member Shardul Krishnakumar and Georgia Tech student Vidyut Rajagopal submitted a policy memo in response to <a href="https://lake-cast-dcb.notion.site/BASIS-US-AI-Policy-Hackathon-2d7a61a4429680ec98cffed344eaa081">The Berkeley AI Safety Student Initiative&#8217;s (BASIS) US AI Policy Hackathon Competition</a></strong></em><strong>. This is their response to the prompt:</strong></p><p><em>&#8220;How should the United States adjust existing AI semiconductor export controls (or design new ones) to protect U.S. national security over the long term?&#8221;</em></p><div><hr></div><h3><strong>Our Policy Recommendation:</strong></h3><p>U.S. export controls on AI semiconductors have largely focused on limiting access to the most advanced individual chips, operating under the theory that compute is the central driver of AI performance. However, the evolving binding constraint in advanced AI systems is memory bandwidth and data movement. Although high-bandwidth memory (HBM) is subject to current export controls, these restrictions retain a large focus on individual chip characteristics. In reality, foreign actors can achieve advanced AI capabilities by aggregating individually compliant components into memory-intensive clusters, thereby circumventing the intent of chip-level restrictions. To better protect U.S. national security, we propose that U.S. export controls should move to a system-level approach that targets the ability to scale AI systems. By constraining memory-intensive integration and cluster-level assembly, the U.S. can align its chip export control policy with the true drivers of long-term AI capability.</p><h3><strong>Importance of High-Bandwith Memory and System-Level Regulations</strong></h3><p>Modern AI systems are increasingly memory-driven because of the demanding nature of machine learning workloads. Large language models that have trillions of parameters require constant access and movement of data during model training and inference. Consequently, processors frequently sit idle waiting for data rather than performing computations. HBM alleviates this bottleneck by enabling faster and lower energy data transfer between memory and the processor. The need for fast and efficient memory has triggered an industry wide shift toward system-level AI architecture. NVIDIA&#8217;s recent AI platform, Rubin, does exactly this. It is not a single chip, but rather an integrated system combining AI-optimized CPUs, high-bandwidth memory, high-speed mesh interconnects to keep data closer to the processor, minimizing energy-intensive data movement.</p><p>Given that AI innovation is increasingly driven by system-level capabilities, U.S. export controls must expand beyond a narrow focus on individual chips (like CPUs/GPUs) to cover memory-intensive system assembly that enables large-scale AI training and deployment.</p><p>While individual chip restrictions remain necessary, they are no longer sufficient on their own.</p><h3><strong>Criticisms of Current U.S. Export Policies</strong></h3><p>In January 2026, the Bureau of Industry and Security (BIS) outlined new regulations over the sale of advanced AI chips to China, loosening restrictions on the export of powerful chips. The regulations include revised thresholds on individual chip metrics, supply certifications that exports will not delay fulfillment of U.S. orders, and end-use certifications that safeguard national security interests. However, these measures lack a clear framework for regulating system-level AI capability, particularly amid global shortages of HBM that impact the global AI supply chain.</p><p>While U.S. export controls have succeeded in partially slowing down China in the short term, they have not deterred China from its ultimate objective of achieving semiconductor self-sufficiency. Previous U.S. restrictions on advanced lithography equipment prompted significant Chinese domestic investment. Similarly, current chip controls to allow the sale of Nvidia&#8217;s H200 chips do little to move Chinese authorities away from domestic system integration through alternative hardware. As AI capabilities become defined by memory-efficient, large-scale systems, the effectiveness of U.S. export control will depend on whether policy can adapt to such realities.</p><h3><strong>Implementation, Impact, and Potential Challenges</strong></h3><p>To implement effective chip export controls, the BIS should shift export licensing from individual chip specifications to system-level capability thresholds. Rather than regulate individual chip metrics, the new export controls will establish cluster-level thresholds on aggregate memory bandwidth, interconnect throughput, and total system-scale compute and memory capacity. The BIS will trigger licensing requirements when export packages enable large-scale AI cluster assembly and exceed cluster-level thresholds. Exporters would be required to report and certify the intended export configuration. The BIS must ensure that any repeated shipments to the same receiver are added towards the threshold, preventing circumvention through an incremental buildup. Thresholds must be updated on an annual basis, adapting to observed shifts in AI bottlenecks to retain focus on system-level capabilities rather than chip performance metrics.</p><p>System-level export controls institute a cohesive national security framework that better serves the needs of the US market. While the policy would not prevent China from developing domestic alternatives, it would force Chinese development to depend on smaller, less efficient AI clusters with higher energy and integration costs. Moreover, the creation of competitive domestic memory manufacturing capacity requires long development timelines and extensive capital investment, meaning substitution at scale would occur only over a decade long time period. With the rapid pace of technology development, this time disparity allows the United States and its allies to retain a durable advantage in system-scale AI deployment.</p><p>Our proposed export control policy raises challenges in enforcement, compliance burden, and attribution and circumvention. System-level control would require BIS to effectively track aggregate capabilities across numerous shipments, demanding more technical expertise, data infrastructure, and interagency coordination. Due to annual updates to cluster-level thresholds, actors in the global AI supply chain will deal with a level of uncertainty in long-term sales and supply-chain planning. Finally, the BIS would have to invest significant resources to prevent further circumvention of export control policies, restricting the ability of U.S. exports to accumulate into large AI clusters in China.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://georgetownai.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><a href="https://docs.google.com/forms/d/e/1FAIpQLSfoIFWkm71YvQfhl3WNEawCjWV9HALn8JQGC3SxFlUMcLhRQQ/viewform">Interested in writing an article? Submit your pitch here!</a></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p> </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://georgetownai.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Policy Recommendations: Accelerating AI Data Center Development in the US]]></title><description><![CDATA[GAIA Submission to the BASIS AI Policy Memo Competition on Data Centers and Community Impact]]></description><link>https://georgetownai.substack.com/p/policy-recommendations-accelerating</link><guid isPermaLink="false">https://georgetownai.substack.com/p/policy-recommendations-accelerating</guid><dc:creator><![CDATA[Georgetown AI Association]]></dc:creator><pubDate>Fri, 20 Feb 2026 14:03:16 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/4acc4cb6-f20f-4861-8c75-a96abcaf8e44_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Vedant Srinivasan is a Sophomore at Georgetown University majoring in Science, Technology, and International Affairs. He is interested in studying the impact of AI on the labor market, how the technology will be diffused globally, and how &#8220;middle powers&#8221; can have a say in Responsible AI Development.</em></p><p><em>Bhumika Nebhnani is an MPP candidate at the McCourt School of Public Policy, Georgetown University. She currently works at the Center for Security and Emerging Technology (CSET) and Massive Data Institute (MDI) on AI policy and regulations in the US and globally.</em></p><div><hr></div><p><em><strong>On February 2nd, 2025, GAIA Members, Bhumika Nebhnani and Vedant Srinivasan, submitted a policy memo to <a href="https://luma.com/tnzft5wg">The Berkeley AI Safety Student Initiative&#8217;s (BASIS) US AI Policy Hackathon Competition</a></strong></em><strong>. This is their response to the prompt:</strong></p><p><em>&#8220;How should the federal government accelerate AI data center development to maintain U.S. technological leadership while managing energy, environmental, and community concerns?&#8221;</em></p><div><hr></div><p>The U.S. commitment to <a href="https://www.whitehouse.gov/wp-content/uploads/2025/07/Americas-AI-Action-Plan.pdf">global AI dominance</a> amid intensified competition with China has brought data centers to the forefront of federal policymaking. Data centers have been <a href="https://www.whitehouse.gov/presidential-actions/2025/07/accelerating-federal-permitting-of-data-center-infrastructure/">formally elevated to a national priority</a>, with federal agencies directed to accelerate their buildout. While progress has been made, U.S. deployment remains constrained by a three-layered bottleneck stack: <strong>energy generation and electricity transmission, land allocation, and water concerns.</strong></p><h4><strong>Energy and electricity:</strong> </h4><p>Data centers consumed approximately <a href="https://www.pewresearch.org/short-reads/2025/10/24/what-we-know-about-energy-use-at-us-data-centers-amid-the-ai-boom/">184 TWh - about 4% of total U.S. electricity use - in 2024 alone</a><a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a>, making it critical to solve <strong>the bottlenecks of energy generation and grid congestion</strong><a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> to accelerate data centers&#8217; <a href="https://csis-website-prod.s3.amazonaws.com/s3fs-public/2025-03/250303_McGeady_Electricity_Bottleneck.pdf?VersionId=LsCkrctQBekLSYFPxus3XWdmTCnmIr9Z">speed-to-power</a><a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a>. To meet data centers&#8217; energy demand without competing with other uses, the United States needs to ramp up its <strong>electricity generation</strong>. While the Federal Energy Regulatory Commission (FERC)&#8217;s July 2023 i<a href="https://cleanpower.org/wp-content/uploads/gateway/2023/06/ACP_Interconnection_FactSheet_0623.pdf">nterconnection reforms</a> reduced interconnection wait times<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a> for new power plants, <a href="https://www.novoco.com/notes-from-novogradac/resolving-the-interconnection-queue-bottleneck-along-with-transmission-expansion-is-critical-for-timely-us-energy-deployment-to-meet-demand">they have not resolved the underlying capacity and construction timing issues.</a> <strong>Grid congestion</strong> results in a loss of $6 Billion for American consumers annually. In addition, congestion also results in significant problems for the renewable sector whose providers supply <em>intermittent energy</em><a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-5" href="#footnote-5" target="_self">5</a><em> </em>leading to significant curtailment<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-6" href="#footnote-6" target="_self">6</a> and in-turn losses. New transmission lines are necessary but expensive and take a minimum of a decade to build. Immediate <em>Grid Enhancing Technologies</em><a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-7" href="#footnote-7" target="_self">7</a> such as <a href="https://www.heimdallpower.com/news/dynamic-line-rating">dynamic line ratings</a> and <a href="https://www.smartwires.com/2024/02/07/what-is-advanced-power-flow-control/">power flow controls</a>, software and hardware interventions that optimize existing electrical transmission, can result in significant capacity gains while costing significantly less. While the federal government has stepped in through programs such as the <em><a href="https://www.energy.gov/gdo/grid-resilience-and-innovation-partnerships-grip-program">Grid Resilience and Innovation Partnerships </a></em><a href="https://www.energy.gov/gdo/grid-resilience-and-innovation-partnerships-grip-program">program</a>, more effort needs to be placed on encouraging local utilities to enhance the existing grid.</p><h4><strong>Land allocation</strong>: </h4><p>On roughly 60% of the US land under the states&#8217; jurisdiction, siting of datacenters is primarily governed by state <a href="https://www.law.cornell.edu/wex/police_powers">&#8220;police powers&#8221;</a> delegated to county governments. While the states initially competed to offer <a href="https://apnews.com/article/big-tech-data-centers-artificial-intelligence-states-a9a856cad1c12eda8fe63e44c9cbe4e8">hefty financial incentives</a>, there has been a rising popular backlash leading to the approvals becoming time-consuming or in some cases, stalled. In this light, <a href="https://www.whitehouse.gov/presidential-actions/2025/07/accelerating-federal-permitting-of-data-center-infrastructure">the executive push </a>to identify federal, brownfields<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-8" href="#footnote-8" target="_self">8</a>, and superfund lands<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-9" href="#footnote-9" target="_self">9</a> for siting data centers is pertinent. However, this process has been slow owing to the absence of clear timelines and a lack of site identification. Reusing brownfield and superfund sites may be feasible but <a href="https://www.epa.gov/brownfields/reuse-considerations-data-centers-brownfield-sites">requires careful cleanup and community engagement</a>. <a href="https://biologicaldiversity.org/w/news/press-releases/congress-passes-bill-to-slash-epa-interior-budgets-2026-01-08/">The Enviornmental Protection Agency&#8217;s (EPA) budget cuts</a> may also <a href="https://www.epa.gov/system/files/documents/2025-05/fy-2026-epa-bib.pdf">slow down the brownfields revitalization.</a></p><h4><strong>Water:</strong> </h4><p><a href="https://www.eesi.org/articles/view/data-centers-and-water-consumption">Hyperscale data centers can consume up to 1.8 billion gallons of water annually due to cooling requirements</a>, equivalent to the annual consumption of a town with a population of approximately 10,000-50,000 people. This has become a flashpoint in water-stressed areas like Arizona where community skepticism about data centers is a significant barrier to the build -out. <a href="https://www.eenews.net/articles/states-push-to-end-secrecy-over-data-center-water-use/">Several state assemblies have passed legislation demanding greater reporting on data center water-usage</a> (though they have been vetoed by the state Governors).</p><h3><strong>Policy Recommendations</strong></h3><p>In the context of the highlighted problems with data center buildout, the following policy recommendations should be considered:</p><h4><strong>The Federal Energy Regulatory Commission (FERC) should initiate a notice of rule-making and finalize its reforms on incentivizing utilities&#8217; adoption of Grid Enhancement Technologies (GETs): </strong></h4><p>Since utilities receive compensation as a <strong>percentage of their total assets, </strong>new lines are valued over increases in efficiency. FERC should exercise its rule-making power under <a href="https://www.ferc.gov/sites/default/files/2021-04/federal_power_act.pdf">Section 219 of the Federal Power Act</a> to enable utility companies to recoup their investments in congestion reduction<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-10" href="#footnote-10" target="_self">10</a>. A new rule would give additional equity to utilities that improve existing lines using GETs. This unlocks previously inaccessible power, lowering the cost of electricity for consumers, enabling speed-to-power for data centers, and resulting in savings for renewable energy plants.</p><h4><strong>The Department of Energy (DOE) should clarify areas so that FERC can site interstate transmission lines: </strong></h4><p>While states control most of the ability to site transmission lines, <a href="https://www.ferc.gov/explainer-siting-interstate-electric-transmission-facilities">interstate lines can be approved by FERC only when DOE designates them as part of</a><em><a href="https://www.ferc.gov/explainer-siting-interstate-electric-transmission-facilities"> a national energy corridor</a></em>. DOE must begin this process, focusing on areas with a high data center concentration. By designating these areas, FERC can quickly approve interstate lines that may otherwise receive pushback. Exercising this power would require an extensive consultation process with affected communities which could delay the implementation.</p><h4><strong>Streamline procedures to maximize the use of Federal Lands: </strong></h4><p>DOE and the Department of Defense (DOD) should set clear timelines for finalizing the proposals received on federal lands. They should also continue to identify more sites. The Department of Interior (DOI) should develop and <a href="https://www.congress.gov/crs-product/R48762">harmonize</a> its sub-agencies&#8217; siting-identification criteria<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-11" href="#footnote-11" target="_self">11</a>. Further, building the data centers on brownfield and superfund sites may face less opposition from communities as they redevelop used and contaminated lands. So, Congress should explicitly protect and restore EPA&#8217;s Brownfields and Superfund&#8209;reuse funding. Also, it should set funding floors for EPA functions<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-12" href="#footnote-12" target="_self">12</a> tied to national data center development goals. This will ensure that federal lands are used to their full potential.</p><h4><strong>Supporting a Data Center Transparency Act to Clarify the Information Landscape Surrounding Data Centers: </strong></h4><p>Public skepticism over data centers has grown due to a lack of information about their impacts. The proposed the <a href="https://www.congress.gov/bill/119th-congress/house-bill/6984/text/ih?overview=closed&amp;format=xml">Data Center Transparency Act</a> before Congress mandates them to regularly report their water and energy consumption. This act would inform Congress of the ground-reality, and the resulting transparency will help to hold the companies accountable. Concern over data centers&#8217; community impacts transcends partisan boundaries and the passage of this bill aligns with the spirit of cooperative federalism.</p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>The demand is projected to grow to <a href="https://www.eesi.org/articles/view/data-center-energy-needs-are-upending-power-grids-and-threatening-the-climate">9% by 2030</a>.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>The economic impact on the users of electricity that results in physical transmission constraints</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p>The time it takes for data centers to access their needed supply of energy.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-4" href="#footnote-anchor-4" class="footnote-number" contenteditable="false" target="_self">4</a><div class="footnote-content"><p>Prior to construction, energy suppliers are required to submit an interconnection request which enters them into a queue to study the feasibility of them joining the grid.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-5" href="#footnote-anchor-5" class="footnote-number" contenteditable="false" target="_self">5</a><div class="footnote-content"><p>Energy sources for which supply is neither constant nor predictable.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-6" href="#footnote-anchor-6" class="footnote-number" contenteditable="false" target="_self">6</a><div class="footnote-content"><p>The intentional reduction in energy supply due to grid complications</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-7" href="#footnote-anchor-7" class="footnote-number" contenteditable="false" target="_self">7</a><div class="footnote-content"><p><a href="https://watt-transmission.org/what-are-grid-enhancing-technologies/">GETs are hardware and/or software that dynamically increase the capacity, efficiency, reliability or safety of existing power lines, faster and at lower cost than traditional grid buildout.</a></p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-8" href="#footnote-anchor-8" class="footnote-number" contenteditable="false" target="_self">8</a><div class="footnote-content"><p><a href="https://www.eli.org/brownfields-program/brownfields-basics">Land that is abandoned or underused</a></p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-9" href="#footnote-anchor-9" class="footnote-number" contenteditable="false" target="_self">9</a><div class="footnote-content"><p><a href="https://www.epa.gov/superfund/what-superfund">Allowances for the EPA to clean up contaminated sites</a></p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-10" href="#footnote-anchor-10" class="footnote-number" contenteditable="false" target="_self">10</a><div class="footnote-content"><p>While the FERC attempted to propose such a rule in 2020, they failed to finalize it. If FERC does not exercise this power independently, Congress should step in and pass the <a href="https://www.congress.gov/bill/119th-congress/house-bill/2703">Advancing GETS Act of 2025</a> which would mandate this change to occur.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-11" href="#footnote-anchor-11" class="footnote-number" contenteditable="false" target="_self">11</a><div class="footnote-content"><p>This will ensure land under the Bureau of Land Management (BLM), U.S. Fish and Wildlife Service (FWS), and National Park Service (NPS) is also constructively assessed for the buildout.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-12" href="#footnote-anchor-12" class="footnote-number" contenteditable="false" target="_self">12</a><div class="footnote-content"><p>Some functions are site assessment, cleanup decision&#8209;making, and reuse technical assistance.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://georgetownai.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe below to read more thoughts from Georgetown Students on the world of AI Policy and submit your pitches for articles to georgetownaia@gmail.com!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[Follow the Money, Follow the Safety]]></title><description><![CDATA[How the Corporate Governance Structures of Frontier AI Labs Inform Their Approaches to Safety Testing]]></description><link>https://georgetownai.substack.com/p/follow-the-money-follow-the-safety</link><guid isPermaLink="false">https://georgetownai.substack.com/p/follow-the-money-follow-the-safety</guid><dc:creator><![CDATA[Georgetown AI Association]]></dc:creator><pubDate>Tue, 27 Jan 2026 14:44:22 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/66cc6663-e168-4de4-9e2c-758176d0c6e0_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em><strong><a href="https://www.linkedin.com/in/ritamperez/">Rita M. Perez</a></strong> is currently pursuing a Master's degree in Communication, Culture, and Technology (CCT) at Georgetown University, where she's developing expertise in design research, tech policy, and public interest technology.</em></p><h2>TLDR:</h2><p>This article explores the importance of frontier labs&#8217; corporate governance structures in creating safe AI models and products by focusing on the different approaches taken by OpenAI, Anthropic, and xAI. While OpenAI&#8217;s evolution from non-profit to an uncapped for-profit Public Benefit Corporation has introduced financial pressures, the company has maintained some safeguards and transparency mechanisms. Anthropic&#8217;s unique Long-Term Benefit Trust combined with its status as a Public Benefit Corporation, has enabled it to treat safety as a foundational principle. Even still, it has struggled with the implementation of robust safeguards. Finally, xAI&#8217;s commitment to a debt-financed structure leaves it more prone to immediate financial pressures, potentially explaining its lack of initiative in creating safe models. Fundamentally, these labs&#8217; governance structures shape their priorities, and whether or not safety is one of them.</p><div><hr></div><div><hr></div><h2><strong>Can You Build Transformative Artificial Intelligence While Keeping Humanity Safe?</strong></h2><p>AI safety means many things to different people, but fundamentally, it is about building secure and reliable systems. Over the years, researchers have speculated on the potential catastrophic risks of AI systems, like rogue systems that exterminate humanity. But, beyond these catastrophic risks, we&#8217;ve already experienced AI-related harms including <a href="https://www.cnn.com/2025/07/22/tech/openai-sam-altman-fraud-crisis">fraud</a>, <a href="https://assets.anthropic.com/m/ec212e6566a0d47/original/Disrupting-the-first-reported-AI-orchestrated-cyber-espionage-campaign.pdf">cyberattacks</a>,  <a href="https://abcnews.go.com/US/ai-chatbots-creating-hateful-online-content-researchers/story?id=125020318">hate speech</a>, and <a href="https://www.iwf.org.uk/news-media/news/ai-becoming-child-sexual-abuse-machine-adding-to-dangerous-record-levels-of-online-abuse-iwf-warns/">even harm to women and children</a>. These concrete incidents demonstrate the public safety risks posed by AI models and reinforce the need for safeguards.</p><p>In recent years, investors have poured trillions of dollars into AI companies racing to build models that could fundamentally reshape human civilization. As these systems are embedded into shopping, academic work, software development, and organizational operations, demand for safety and transparency has intensified. Yet, the funding structures enabling this development may, in fact, determine whether companies can afford to prioritize safety at all. While every AI company claims safety as a core value, the financial pressures in their corporate structures often tell a different story about what happens when billions are on the line.</p><p>Currently, a handful of companies like OpenAI, Anthropic, and xAI have dominated public discourse and reached the general public with their respective chatbots ChatGPT, Claude, and Grok. These systems are ubiquitous and unlikely to go away soon, meaning that it is vital for the average consumer to understand  how frontier AI companies are balancing the safety implications of their models with their investors&#8217; interests.</p><h2><strong>OpenAI: Balancing Safety with Scale</strong></h2><p>A group of individuals, led by Sam Altman and Elon Musk, <a href="https://techcrunch.com/2015/12/11/non-profit-openai-launches-with-backing-from-elon-musk-and-sam-altman/">co-founded OpenAI</a> together in December 2015 as a nonprofit with an initial $1 billion funding commitment. &#8220;Partly motivated by concerns about AI safety and existential risk from artificial general intelligence<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> [AGI]&#8221;, they intended to build safe AGI and work towards long-term safety, <a href="https://openai.com/charter/">according to their charter</a>.</p><blockquote><p><em><strong>&#8220;Our mission is to ensure that artificial general intelligence&#8212;AI systems that are generally smarter than humans&#8212;benefits all of humanity.&#8221;</strong></em></p><p><strong>-OpenAI, &#8220;</strong><em><strong>Our Vision for AGI</strong></em><strong>&#8221;</strong></p></blockquote><p><a href="https://gwern.net/doc/reinforcement-learning/openai/2017-openai-bylaws.pdf">OpenAI&#8217;s Certificate of Incorporation</a> explicitly states that &#8220;the resulting technology will benefit the public and the corporation will seek to open source technology for the public benefit when applicable&#8221;, but does not make explicit the specific benefits expected from the resulting technology. As a mission-driven organization, their AI research was able to closely align with their goal of developing beneficial AGI without needing to prioritize quick financial returns. But in 2019, <a href="https://techcrunch.com/2019/03/11/openai-shifts-from-nonprofit-to-capped-profit-to-attract-capital/">OpenAI announced a capped-profit subsidiary</a>, creating profit incentives in order to raise capital. A capped profit company cuts off returns for investors past a certain point, and i<a href="https://techcrunch.com/2019/03/11/openai-shifts-from-nonprofit-to-capped-profit-to-attract-capital/">n the case of OpenAI</a>, this cap was set at 100x the initial investment. In 2025, <a href="https://www.openaifiles.org/restructuring">this approach changed drastically</a> with the creation of a new for-profit Public Benefit Corporation (PBC) dubbed the OpenAI Group. A PBC is <a href="https://delcode.delaware.gov/title8/c001/sc15/">legally defined</a> as:</p><blockquote><p><em><strong>&#8220;A for-profit corporation&#8230;intended to produce a public benefit or public benefits and to operate in a responsible and sustainable manner. To that end, a public benefit corporation shall be managed in a manner that balances the stockholders&#8217; pecuniary interests, the best interests of those materially affected by the corporation&#8217;s conduct, and the public benefit or public benefits identified in its certificate of incorporation.&#8221; </strong></em></p><p><em><strong>- Delaware Code </strong></em><strong>Title 8 (1.XV.362)</strong></p></blockquote><p>The new PBC removed limits on investor returns, reduced the non-profit&#8217;s ability to fully guide the responsible development of AGI technology, and relieved its legal responsibilities as a 501(c)(3). This allowed investors to receive traditional equity stake (ownership of a company through shares of stock), allowing companies like SoftBank to <a href="https://www.cnbc.com/2025/12/30/softbank-openai-investment.html">support infrastructure developments</a> over the next few years. This system allows <a href="https://www.nbcnews.com/tech/tech-news/openai-restructuring-company-structure-chatgpt-invest-own-rcna240138">larger tech companies like Microsoft</a> to receive returns on their investment in OpenAI&#8217;s for-profit subsidiary, which develops all of OpenAI&#8217;s AI products and technologies. However, Microsoft&#8217;s licensing rights specifically exclude AGI-related intellectual property.</p><p>This restructuring raises a critical question: does removing the profit cap and nonprofit oversight come at the expense of safety? OpenAI&#8217;s safety infrastructure suggests the company is attempting to maintain safeguards even as financial pressures intensify.</p><h4><strong>Safety and Alignment Principles</strong></h4><p>Trillions of dollars have been funnelled into OpenAI&#8217;s products, presenting a challenge to industry leaders on how their partnerships and investments will result in models that are safe.</p><p>The prevailing strategy employed by OpenAI has been safety testing, which remains common practice for most major companies. After all, unsafe products aren&#8217;t appealing to consumers. OpenAI&#8217;s AI Safety Team has agreed to <a href="https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024">Frontier AI Safety Commitments</a>, voluntary agreements that commit to developing frontier models with safety-related best practices in mind (assess risks, set thresholds, and establish risk mitigations). Their <a href="https://openai.com/safety/evaluations-hub/">Safety Evaluation Hub</a> provides public access to the safety evaluation results for its models, including their system cards<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a>, <a href="https://openai.com/index/updating-our-preparedness-framework/">Preparedness Framework</a>, and specific research releases. OpenAI&#8217;s alignment research also ensures that its models pursue human-intended goals rather than finding dangerous shortcuts that could cause catastrophic harm. The company has evolved from exclusively using human evaluators to label good and bad outputs (reinforcement learning through human feedback, or RLHF) to automated approaches where models evaluate their own reasoning against safety specifications&#8212;essentially <a href="https://openai.com/index/deliberative-alignment/">teaching ChatGPT to police itself</a>.</p><p>At a more technical level, OpenAI&#8217;s safety evaluation team focuses on reinforcing models against jailbreaks (user-attempts to get around safeguards), hallucinations, and disallowed content through public benchmarks and the <a href="https://model-spec.openai.com/2025-10-27.html">OpenAI Model Spec</a><a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a>, which uses a combination of red lines (limits and boundaries that shouldn&#8217;t be crossed) and general principles focused on human rights and safety. Although the relationship between content and safety is not always visible to users, practices in the development of both of these features trickle down to their interactions with GPT models and products.</p><h4><strong>What happens if their models are evaluated as unsafe?</strong></h4><p>Operationally, OpenAI&#8217;s Preparedness Framework states that various groups and individuals weigh in on model safety and deployment decisions. The Safety Advisory Group is responsible for overseeing the adherence to the Framework, recommending longer-term changes and investments to keep model safety thresholds at acceptable levels, and assessing residual safety risks. While the CEO/OpenAI leadership makes all of the final deployment decisions, an independent safety board (<a href="https://openai.com/index/update-on-safety-and-security-practices/">previously the Safety and Security Committee</a>) can reverse decisions and mandate changes.<strong> </strong>OpenAI evaluates models from two perspectives: malicious use by users and misalignment of the model itself. Each risk category has distinct safeguards tailored to the source of the threat. Some of these safeguard actions may include things like permanent bans of users that violate usage policies, limiting internet access to models until issues are resolved, or logging the models actions in a database that is consistently monitored for evidence of harm.</p><p>Through these safety mechanisms, OpenAI has attempted to mitigate safety risks, though sometimes unsuccessfully combatting the more immediate risks to its users. A <a href="https://www.wired.com/story/chatgpt-psychosis-and-self-harm-update/">report by Wired</a> indicated that &#8220;about 1.2 million users may be expressing suicidal ideations&#8221; with ChatGPT, raising critical questions about whether current safety frameworks are adequate to address the risks these technologies pose to public health. In April 2025, 16-year old Adam Raine committed suicide with the encouragement of GPT-4o, which lawyers argue <a href="https://www.theguardian.com/us-news/2025/aug/29/chatgpt-suicide-openai-sam-altman-adam-raine">was rushed through safety testing</a> in order to meet a launch date, creating flawed design specifications that encouraged the model to encourage the user&#8217;s suicide attempts. Other parents have also filed <a href="https://www.cnn.com/2025/11/06/us/openai-chatgpt-suicide-lawsuit-invs-vis">wrongful death lawsuits</a> against OpenAI for failing to create enough safeguards for users demonstrating mental health emergencies.</p><p>The evolution of OpenAI&#8217;s funding structure shows an attempt to retain the fundamental mission in its work, while also providing financial flexibility to capture the massive investments needed to deliver on its AGI promises. Given the recent establishment of the PBC, only time will tell if this legal structure will be able to sufficiently  constrain investor and commercial pressures that may de-prioritize thorough safety testing and protections for the most vulnerable users.</p><h2><strong>Anthropic: Establishing Foundational Safety</strong></h2><p>In December 2020, Dario Amodei, then, the Vice President of Research at OpenAI, departed from the company alongside his sister Daniela and several other senior researchers<a href="https://time.com/collection/time100-ai/6309047/daniela-and-dario-amodei/"> to found Anthropic</a>.<a href="https://en.wikipedia.org/wiki/Dario_Amodei"> </a>The Amodeis had a different vision about safety in their models, treating it  as a foundational design principle rather than something added after establishing basic functionality.</p><blockquote><p><em><strong>&#8220;Anthropic is dedicated to building systems that people can rely on and generating research about the opportunities and risks of AI.&#8221;</strong></em></p><p><em><strong>-Anthropic, &#8220;Our Purpose&#8221;</strong></em></p></blockquote><p>To bring their vision to life, Anthropic was structured as a PBC, legally required to balance public benefits and stakeholder interests. Similar to OpenAI, Anthropic&#8217;s investor base includes a mix of traditional venture capital firms (ICONIQ, Lightspeed Venture Partners, General Catalyst), institutional investors (Fidelity, BlackRock, T. Rowe Price), sovereign wealth funds (Qatar Investment Authority, GIC), and strategic technology partners (Amazon and Google), who provide both equity investment and multi-cloud computing infrastructure<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-4" href="#footnote-4" target="_self">4</a>.</p><p>In 2023, the company created an experimental <a href="https://www.anthropic.com/news/the-long-term-benefit-trust">Long&#8209;Term Benefit Trust</a> (LTBT) made up of individuals with backgrounds in AI safety, national security, public policy, and social enterprise, creating a corporate governance structure meant to meet the challenges of the unprecedented externalities arising from AI technology. The LTBT is granted the authority to select and remove Anthropic board members, and will, over a period of 4 years, become progressively more influential by appointing the majority of the company&#8217;s Board despite not having direct financial stakes in the company. Current members of the experimental LTBT include Kanika Bahl, the CEO of the non-profit <em>Evidence Action</em>, and Richard Fontaine, the CEO of the think-tank, Centre for New American Security, as well as other leaders from the non-profit sector.. This combination of a PBC and Long-Term Benefit Trust is Anthropic&#8217;s attempt to provide financial incentives to its investors through uncapped, conventional equity capital and large cloud credits<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-5" href="#footnote-5" target="_self">5</a> while preserving its mission of creating safe and transformative AI.</p><h4><strong>Safety and Alignment</strong></h4><p>Unlike OpenAI&#8217;s primarily technical approach, Anthropic embeds normative principles directly into model training through <a href="https://www.anthropic.com/news/claudes-constitution">Constitutional AI</a><a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-6" href="#footnote-6" target="_self">6</a>, a framework drawing from sources including the UN Declaration of Human Rights (principles like respecting freedom, equality, and non-discrimination), global platform guidelines like Apple&#8217;s Terms of Service (protecting user privacy and preventing misinformation), DeepMind&#8217;s Sparrow Rules (avoiding harmful content and conspiracy theories), and Anthropic&#8217;s own research on existential safety (ensuring AI systems prioritize humanity&#8217;s wellbeing over self-preservation). The model learns to critique and revise its own responses against 58 explicit principles, making alignment more transparent and scalable than human-labeled feedback alone.</p><p>To align with these values, Anthropic&#8217;s models are tested through safety evaluations, risk assessments, and bias evaluations prior to deployment. They utilise approaches like the Unified Harm Framework, which aims to understand potentially harmful impacts across five dimensions (physical, psychological, economic, societal, and individual autonomy) and Policy Vulnerability Testing, which partners with external experts to identify areas of concern, and stress-test these concerns against Anthropic policies. The company also provides a <a href="https://www.anthropic.com/transparency">Transparency Hub</a>, Model Reports<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-7" href="#footnote-7" target="_self">7</a>, and system cards that provide information on Agentic Safety and Malicious Use, automated behavioral audits, and the company&#8217;s Responsible Scaling Policy (RSP) evaluation process. Anthropic&#8217;s <a href="https://www-cdn.anthropic.com/872c653b2d0501d6ab44cf87f43e1dc4853e4d37.pdf">Responsible Scaling Policy</a> (RSP) assigns required safeguards for each capability threshold in order to mitigate safety risks. The company uses AI Safety Levels (ASL) inspired by biosafety-level frameworks that evaluate models from ASL-1 through ASL-4+. The company has made a public commitment to not deploy models that are capable of causing catastrophic harm, unless those risks are kept under acceptable levels.</p><p>In April 2025, OpenAI and Anthropic <a href="https://openai.com/index/openai-anthropic-safety-evaluation/?utm_source=chatgpt.com">collaborated on a joint safety testing process</a> where each company evaluated the other&#8217;s models across instruction hierarchy, jailbreaking, hallucination, and scheming behavior. The company also has formal agreements for pre-deployment testing with both the U.S. AI Safety and the U.K. AI Security Institutes, which enables collaborative research on evaluating and mitigating safety risks. According to Anthropic, these organizations <a href="https://www.anthropic.com/news/strengthening-our-safeguards-through-collaboration-with-us-caisi-and-uk-aisi">tested their constitutional classifiers</a>, to identify vulnerabilities enabling them to strengthen their safeguards. Anthropic&#8217;s alignment research appears to be focused on <a href="https://www.darioamodei.com/post/the-urgency-of-interpretability?utm_source=alphasignal">addressing the urgency of interpretability</a>, our ability to understand the models&#8217; internal mechanisms to better predict their behaviors, which may also provide valuable insights into more effective risk mitigation strategies.</p><h4><strong>What happens if their models are evaluated as unsafe?</strong></h4><p>Anthropics Responsible Scaling Policy states that various teams and individuals are tasked with evaluating model safety and implementing safeguards. The Responsible Scaling Officer ensures compliance with the RSP, develops internal safety procedures, and approves training and deployment decisions. The company provides the public access to evaluation and deployment materials, including disclosure about changes to the RSP; and collaborates with external experts, third-party reviewers, and the U.S. government to improve safeguards and procedures.<strong> </strong>To be deployed, a model must meet ASL-2 Deployment and Security Standards, meaning it has been trained to refuse chemical, biological, radiological, and nuclear related requests.</p><p>Despite these protections, an August 2025 <a href="https://www-cdn.anthropic.com/b2a76c6f6992465c09a6f2fce282f6c0cea8c200.pdf">Threat Intelligence Report</a> published by Anthropic shows that the company&#8217;s largest safety &#8220;incidents&#8221; have involved large-scale <a href="https://www.anthropic.com/news/detecting-countering-misuse-aug-2025">cybercrime and fraud</a>, in which Claude is used to extort organizations into providing personal data and create elaborate false identities. Their report demonstrates commitments to transparency, stating: <em>&#8220;We&#8217;re discussing these incidents publicly in order to contribute to the work of the broader AI safety and security community, and help those in industry, government, and the wider research community strengthen their own defences against the abuse of AI systems.&#8221;</em></p><p>Like OpenAI, Anthropic&#8217;s funding structure shows an attempt to retain its fundamental mission while providing the financial flexibility needed for scaling AI systems. The company&#8217;s PBC and LTBT models seem to create long-term safeguards and transparency efforts but still fall short of fully protecting the public from malicious users that can override protections.</p><h2><strong>xAI: Financial Pressures and Safety Promises</strong></h2><p>xAI is an example of what happens when safety and financial incentives diverge.</p><p>After leaving OpenAI, Elon <a href="https://apnews.com/article/elon-musk-drops-openai-lawsuit-e3932deb15957c915cd694d63583a043">Musk sued OpenAI</a> for breaching its contract claiming that it had  abandoned its non-profit status and was no longer seeking to benefit humanity. Since then, Musk&#8217;s targeting of OpenAI has been extensive and nonstop. Following Anthropic&#8217;s lead, Musk created and launched xAI in March of 2023 as a PBC, with the company&#8217;s mission boldly stating:</p><blockquote><p><em><strong>&#8220;To Understand the Universe.&#8221;</strong></em></p><p><em><strong>-xAI, &#8220;Our Mission&#8221;</strong></em></p></blockquote><p>In 2024, however, the company <a href="https://www.cnbc.com/2025/08/25/elon-musk-xai-dropped-public-benefit-corp-status-while-fighting-openai.html">dropped the PBC obligations</a> without sharing this change with the public. Without these company requirements, xAI&#8217;s funding structure represents a distinct approach to frontier AI development using <a href="https://www.cnbc.com/2025/11/25/musk-xai-funding-december.html">massive equity rounds</a> combined with GPU-backed debt<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-8" href="#footnote-8" target="_self">8</a> and special-purpose vehicles (SPVs). Essentially, instead of taking normal loans that appear on their financial statements, xAI has created a separate shell company (SPV) that takes the loan instead. It&#8217;s like having your friend take out a loan in their name to buy something that you will actually use and pay them rent for that usage. The structure allows xAI to secure computing infrastructure <a href="https://financialpost.com/news/meta-xai-starting-trend-for-billions-in-off-balance-sheet-debt">without direct financial liability</a>. From a governance perspective, this model creates fundamentally different incentives than OpenAI or Anthropic&#8217;s funding structures. Unlike Anthropic&#8217;s PBC and LTBT  framework or OpenAI&#8217;s initial capped-profit arrangement, debt-financed infrastructure requires short term returns that allows xAI to make debt service payments on schedule.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ECxo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F264636e4-bc53-4346-9dfd-a68de449e40f_1600x900.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ECxo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F264636e4-bc53-4346-9dfd-a68de449e40f_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!ECxo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F264636e4-bc53-4346-9dfd-a68de449e40f_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!ECxo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F264636e4-bc53-4346-9dfd-a68de449e40f_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!ECxo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F264636e4-bc53-4346-9dfd-a68de449e40f_1600x900.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ECxo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F264636e4-bc53-4346-9dfd-a68de449e40f_1600x900.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/264636e4-bc53-4346-9dfd-a68de449e40f_1600x900.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ECxo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F264636e4-bc53-4346-9dfd-a68de449e40f_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!ECxo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F264636e4-bc53-4346-9dfd-a68de449e40f_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!ECxo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F264636e4-bc53-4346-9dfd-a68de449e40f_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!ECxo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F264636e4-bc53-4346-9dfd-a68de449e40f_1600x900.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h4><strong>Safety and Alignment</strong></h4><p>xAI <a href="https://www.gov.uk/government/publications/frontier-ai-safety-commitments-ai-seoul-summit-2024/frontier-ai-safety-commitments-ai-seoul-summit-2024">signed the Frontier AI Safety Commitments</a> alongside OpenAI and Anthropic, and established a <a href="https://x.ai/documents/2025.02.20-RMF-Draft.pdf?utm_source=chatgpt.com">Risk Management Framework</a> using public benchmarks, including internal biology and chemistry evaluations to assess their models&#8217; performance on restricted queries. However, unlike OpenAI and Anthropic&#8217;s detailed safeguards, xAI&#8217;s Risk Management Framework describes only a &#8220;basic refusal policy&#8221; (training models to decline harmful prompts) for prompts involving violence, terrorism, WMDs, and cyberattacks, focusing primarily on &#8220;malicious use events&#8221; causing over 100 deaths or $1 billion in damages. The company also restricts models from producing information on biological and chemical weapons production methods.</p><p>More tellingly, xAI initially <a href="https://technologymagazine.com/news/the-story-behind-elon-musks-xai-grok-4-ethical-concerns?">failed to publish system cards</a>&#8212;now standard practice for transparency at model deployment&#8212;despite conducting dangerous capability evaluations. These documents appeared only in August 2025, following public scrutiny of content moderation failures, and by November 2025, <a href="https://data.x.ai/2025-11-17-grok-4-1-model-card.pdf?utm_source=chatgpt.com">Grok 4.1&#8217;s model card</a> demonstrated improved refusal metrics but rates of dishonesty and sycophancy also rose. The pattern reveals that the technical capability to align their models existed but that external pressure was required to implement these fixes. This suggests that when debt-financed infrastructure demands rapid monetization, safety measures become reactive rather than proactive.</p><h4><strong>What happens if their models are evaluated as unsafe?</strong></h4><p>xAI&#8217;s Risk Management Framework mentions that publicly available platforms, like its very own X, offer a space for the public to provide feedback on its models and user concerns, though it later states that to protect public safety and national security, information about its models may be redacted from publications. In the event that an incident happens, xAI states that it will collaborate with relevant law enforcement agencies, isolate and revoke access to user accounts, temporarily shut down the relevant system, and conduct a post-mortem of events. The RMF does not detail internal governance on deployment responsibilities and roles.</p><p>Their RMF states they train its models to be &#8220;honest&#8221; and are exploring &#8220;truth-seeking AI tools&#8221; but with xAI&#8217;s safety focus on WMDs, cybersecurity, and biological/chemical weapons, safety incidents surrounding Grok have unsurprisingly made constant headlines in the past year. <a href="https://www.wired.com/story/grok-is-generating-sexual-content-far-more-graphic-than-whats-on-x/?utm_source=nl&amp;utm_brand=wired&amp;utm_mailing=WIR_Daily_010826_PAID&amp;utm_campaign=aud-dev&amp;utm_medium=email&amp;utm_content=WIR_Daily_010826_PAID&amp;bxid=67906d1d4c90d4914507b4a1&amp;cndid=85963451&amp;hasha=b0f45954be567a203b76f23c55da1feb&amp;hashc=7034b5663c5bf9ef7a04486c2fa4893422501d2893c2f48065032950f35b1101&amp;esrc=MARTECH_ORDERFORM&amp;utm_term=WIR_DAILY_PAID">Most recently</a>, the chatbot has allowed users to generate sexualized images of women and children, raising concerns that xAI&#8217;s chatbot is normalizing nonconsensual imagery and sexual violence. Grok has also been used to praise and impersonate Hitler after <a href="https://www.theverge.com/ai-artificial-intelligence/699788/xai-updated-grok-to-be-more-politically-incorrect">a July 2025</a> update (which was later removed by xAI) instructed the chatbot to, <a href="https://www.npr.org/2025/07/09/nx-s1-5462609/grok-elon-musk-antisemitic-racist-content">&#8220;not shy away from making claims which are politically incorrect, as long as they are well substantiated.&#8221;</a></p><p>The financial pressure created by the company&#8217;s funding structure creates a misalignment between safety timelines and commercial success. xAI&#8217;s operational practices have drawn significant criticism from the research community, with safety researchers from both OpenAI and Anthropic <a href="https://techcrunch.com/2025/07/16/openai-and-anthropic-researchers-decry-reckless-safety-culture-at-elon-musks-xai/?utm_source=chatgpt.com">characterizing xAI&#8217;s safety culture</a> as &#8220;reckless&#8221; and <a href="https://ratings.safer-ai.org/company/xai/">independent evaluations</a> rating the company as weak in most safety categories. The xAI trajectory suggests that when capital structures demand rapid monetization, safety infrastructure tends to follow market pressure rather than precede it.</p><h2><strong>Funding Determines Safety Capacity</strong></h2><p>The three dominant U.S. AI companies present three divergent answers to the same question: Can you build transformative AI while keeping humanity safe? Anthropic argues yes, if you engineer safety into your business model through governance structures that gain authority as AI capabilities increase. OpenAI&#8217;s trajectory from capped nonprofit to uncapped PBC suggests maybe, if voluntary safety commitments and board oversight can withstand market pressures and competition. Meanwhile, xAI&#8217;s debt-financed structure reveals that when investments demand short-term monetization, safety infrastructure becomes an afterthought. Ironically, the company that dropped its PBC status, delayed transparency measures until facing public criticism, and allowed its chatbot to generate sexualized images of children is the same company whose founder sued OpenAI for abandoning its safety mission and is now being <a href="https://apnews.com/article/artificial-intelligence-pentagon-hegseth-musk-7f99e5f32ec70d7e39cec92d2a4ec862">used inside the Pentagon&#8217;s</a> network.</p><p>As AI companies race toward capabilities that could fundamentally reshape civilization, the delicate balance between financial returns and safety may determine whether artificial general intelligence benefits humanity or whether humanity becomes collateral damage.</p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>The debate on Artificial General Intelligence (AGI) has characterized this phenomenon as AI systems that surpass human intelligence capabilities. However, the field of neuroscience also struggles to agree on what intelligence actually is and where it comes from.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>System cards can be used alongside model cards to evaluate and publicly share the model&#8217;s operations and safety mechanisms. <a href="https://ai.meta.com/blog/system-cards-a-new-resource-for-understanding-how-ai-systems-work/">Meta&#8217;s explanation</a>, for example, describes model cards as a &#8220;standardized way to document, track, and monitor&#8221; individual models, while system cards show how a group of models and other technologies within a system complete a task.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p>Model specifications (or specs) outline a model's explicit rules, objectives, and principles for public transparency. In the case of OpenAI, their Model Spec combines hard rules like refusing illegal requests with general principles (like being helpful to users) that guides how ChatGPT responds to prompts.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-4" href="#footnote-anchor-4" class="footnote-number" contenteditable="false" target="_self">4</a><div class="footnote-content"><p>Anthropic&#8217;s deals with Amazon and Google gives the company flexibility and access to multiple companies&#8217; cloud infrastructures, potentially making Anthropic&#8217;s systems more resilient to outages.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-5" href="#footnote-anchor-5" class="footnote-number" contenteditable="false" target="_self">5</a><div class="footnote-content"><p>Cloud credits are vouchers for free computing resources from providers like AWS or Google Cloud, allowing companies to train AI models without paying cash for infrastructure.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-6" href="#footnote-anchor-6" class="footnote-number" contenteditable="false" target="_self">6</a><div class="footnote-content"><p>Constitutional AI is like giving the model a rulebook of values (based on the <a href="https://www.un.org/en/about-us/universal-declaration-of-human-rights">UN Declaration of Human Rights</a>) and teaching it to check its own answers against those rules before responding. Instead of humans labeling millions of examples of good vs. bad responses, the AI learns to evaluate and improve its own outputs using these principles.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-7" href="#footnote-anchor-7" class="footnote-number" contenteditable="false" target="_self">7</a><div class="footnote-content"><p>Model reports are standardized disclosure documents that detail an AI system's capabilities, safety testing results, known limitations, and potential risks before public deployment.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-8" href="#footnote-anchor-8" class="footnote-number" contenteditable="false" target="_self">8</a><div class="footnote-content"><p>GPU-backed debt means loans secured by physical graphics processing units (GPUs), the specialized chips required to train AI models, where lenders can seize the hardware if the borrower defaults, similar to how banks can repossess cars for unpaid auto loans.</p><div><hr></div><p><em><strong>                                  Interested in writing about AI Policy as a Georgetown Student?                 Submit your pitch to <a href="http://georgetownaia@gmail.com">georgetownaia@gmail.com</a> and work with our editing team to bring your ideas                                                                                      to life!</strong></em>                                                                                                                                   <a href="https://www.georgetownai.org/">https://www.georgetownai.org/</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://georgetownai.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption"><em>Enter your email below to subscribe for free to the Georgetown AI Association&#8217;s Weekly Newsletter and Substack!</em></p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p></div></div>]]></content:encoded></item></channel></rss>