Download PDF
Standard Version
10 pages
Expert Version
32 pages
Table of Contents
1
Executive Summary
2
Introduction
3.0
AI Is Pivotal for National Security
3.1
Strategic Competition
3.1.1
Strategic Competition
Shifting Basis of Economic Power
3.1.2
Strategic Competition
Destabilization Through Superweapons
3.2
Terrorism
Terrorism
3.2.1
Terrorism
Bioterrorism
3.2.2
Terrorism
Cyberattacks on Critical Infrastructure
3.2.3
Terrorism
Offense-Defense Balance
3.3
Loss of Control
Loss of Control
3.3.1
Loss of Control
Erosion of Control
3.3.2
Loss of Control
Unleashed AI Agents
3.3.3
Intelligence Recursion
Intelligence Recursion
3.4
Existing AI Strategies
Existing AI Strategies
4.0
Deterrence with Mutual Assured AI Malfunction (MAIM)
4.1
MAIM Is the Default Regime
4.2
How to Maintain a MAIM Regime
5.0
Nonproliferation
Nonproliferation
5.1
Compute Security
5.1.1
Compute Security
Export Controls
5.1.2
Compute Security
Firmware-Level Features
5.2
Information Security
5.2.1
Information Security
How to Improve Information Security
5.3
AI Security
AI Security
5.3.1
AI Safeguards
Malicious Use
5.3.2
AI Safeguards
Loss of Control
6.0
Competitiveness
Competitiveness
6.1
Military Strength
6.2
Economic Security
6.2.1
Economic Security
Manufacture AI Chips
6.2.3
Economic Security
Facilitate Immigration for AI Scientists
6.3
Legal Frameworks Governing AI Agents
6.3.1
Legal Frameworks Governing AI Agents
Aligning Individual AI Agents
6.3.2
Legal Frameworks Governing AI Agents
Aligning Collectives of AI Agents
6.4
Political Stability
Political Stability
6.4.1
Political Stability
Censorship and Inaccurate Information
6.4.2
Political Stability
Automation
7
Conclusion
Conclusion
8
Appendix: FAQs
Table of contents
Download Standard Version
(10 page PDF)
Download Expert Version
(32 page PDF)
1
Executive Summary
2
Introduction
3
AI Is Pivotal for National Security
3.1
Strategic Competition
3.1.1
Strategic Competition
Shifting Basis of Economic Power
3.1.2
Strategic Competition
Destabilization Through Superweapons
3.2
Terrorism
Terrorism
3.2.1
Terrorism
Bioterrorism
3.2.2
Terrorism
Cyberattacks on Critical Infrastructure
3.2.3
Terrorism
Offense-Defense Balance
3.3
Loss of Control
Loss of Control
3.3.1
Loss of Control
Erosion of Control
3.3.2
Loss of Control
Unleashed AI Agents
3.3.3
Intelligence Recursion
Intelligence Recursion
3.4
Existing AI Strategies
Existing AI Strategies
4
Deterrence with Mutual Assured AI Malfunction (MAIM)
4.1
MAIM Is the Default Regime
4.2
How to Maintain a MAIM Regime
5
Nonproliferation
5.1
Compute Security
5.1.1
Compute Security
Export Controls
5.1.2
Compute Security
Firmware-Level Features
5.2
Information Security
5.2.1
Information Security
How to Improve Information Security
5.3
AI Security
AI Security
5.3.1
AI Safeguards
Malicious Use
5.3.2
AI Safeguards
Loss of Control
6
Competitiveness
6.1
Military Strength
6.2
Economic Security
6.2.1
Economic Security
Manufacture AI Chips
6.2.3
Economic Security
Facilitate Immigration for AI Scientists
6.3
Legal Frameworks Governing AI Agents
6.3.1
Legal Frameworks Governing AI Agents
Aligning Individual AI Agents
6.3.2
Legal Frameworks Governing AI Agents
Aligning Collectives of AI Agents
6.4
Political Stability
Political Stability
6.4.1
Political Stability
Censorship and Inaccurate Information
6.4.2
Political Stability
Automation
7
Conclusion
Conclusion
8
Appendix: FAQs