Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: Across the 4th Dimension

      September 25, 2025

      Cursor vs GitHub Copilot (2025): Which AI Platform Wins for Your Node.js Dev Team?

      September 25, 2025

      NuGet adds support for Trusted Publishing

      September 25, 2025

      AWS launches IDE extension for building browser automation agents

      September 25, 2025

      Distribution Release: Kali Linux 2025.3

      September 23, 2025

      Distribution Release: SysLinuxOS 13

      September 23, 2025

      Development Release: MX Linux 25 Beta 1

      September 22, 2025

      DistroWatch Weekly, Issue 1140

      September 21, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Beyond Denial: How AI Concierge Services Can Transform Healthcare from Reactive to Proactive

      September 25, 2025
      Recent

      Beyond Denial: How AI Concierge Services Can Transform Healthcare from Reactive to Proactive

      September 25, 2025

      IDC ServiceScape for Microsoft Power Apps Low-Code/No-Code Custom Application Development Services

      September 25, 2025

      A Stream-Oriented UI library for interactive web applications

      September 24, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      FOSS Weekly #25.39: Kill Switch Phones, LMDE 7, Zorin OS 18 Beta, Polybar, Apt History and More Linux Stuff

      September 25, 2025
      Recent

      FOSS Weekly #25.39: Kill Switch Phones, LMDE 7, Zorin OS 18 Beta, Polybar, Apt History and More Linux Stuff

      September 25, 2025

      Distribution Release: Kali Linux 2025.3

      September 23, 2025

      Distribution Release: SysLinuxOS 13

      September 23, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»U.S. Lawmakers Target ‘Adversarial AI’ in Bipartisan Push to Fortify Federal Systems

    U.S. Lawmakers Target ‘Adversarial AI’ in Bipartisan Push to Fortify Federal Systems

    June 25, 2025

    No Adversarial AI Act, No Adversarial AI, AI, Artificial Intelligence

    In a significant bipartisan effort, key U.S. lawmakers today introduced the “No Adversarial AI Act,” legislation designed to erect a critical firewall between U.S. federal agencies and artificial intelligence technologies developed by foreign adversaries.

    The bill, spearheaded by Raja Krishnamoorthi (D-IL), ranking member of the House Select Committee on the Strategic Competition Between the United States and the Chinese Communist Party, and committee Chairman John Moolenaar (R-MI), aims to mitigate national security risks posed by AI systems potentially controlled by hostile foreign powers, notably the People’s Republic of China (PRC).

    The legislation has garnered bicameral support, with Representatives Ritchie Torres (D-NY) and Darin LaHood (R-IL) cosponsoring the House bill, and Senators Rick Scott (R-FL) and Gary Peters (D-MI) introducing the companion measure in the Senate.

    AI as a National Security Vulnerability

    At the heart of the “No Adversarial AI Act” is the recognition that AI, while transformative, can also be a potent tool for espionage and subversion when controlled by malicious actors. Lawmakers specifically cited concerns about companies like DeepSeek, which has alleged ties to the Chinese Communist Party and its intelligence apparatus, and whose privacy policy explicitly states that U.S. user data is stored in China.

    A prior investigation by Ranking Member Krishnamoorthi and Chairman Moolenaar into DeepSeek’s operations recommended a federal procurement prohibition on PRC-origin AI models, particularly for use on government devices. The “No Adversarial AI Act” directly addresses this recommendation.

    Also read: Taiwan’s DeepSeek Ban Reflects Global Concerns Over AI Security

    Key Provisions of the Bill to Build the Digital Wall

    The “No Adversarial AI Act” outlines a multi-pronged approach to safeguarding federal systems that includes:

    • Establishing a Federal List of Adversarial AI: The bill mandates that the Federal Acquisition Security Council (FASC) develop a list of AI produced or developed by a foreign adversary within 60 days of the Act’s enactment. This list will then be published publicly by the Director of the Office of Management and Budget (OMB) within 180 days, and updated at least every 180 days thereafter.
    • Prohibiting Federal Use of Listed AI: Once an AI is on this list, U.S. government agencies will be barred from acquiring or using it. This prohibition extends to entities with documented ties to the Chinese Communist Party like DeepSeek.
    • Limited Exceptions with Strict Oversight: While the general rule is prohibition, the bill allows for narrow exceptions. An executive agency head may approve an exception if the AI is deemed necessary for scientifically valid research, evaluation, training, testing, analysis, counterterrorism or counterintelligence activities, or to avoid jeopardizing mission-critical functions. However, any such exception requires written notice to the Director of OMB and appropriate Congressional committees.
    • Regular Updates and Removal Process: The FASC is required to update the adversarial AI list at least every 180 days. A process is also outlined for removing AI from the list if the owner certifies it’s not produced or developed by a foreign adversary, and the FASC reviews and certifies this claim.
    • Empowering Agency Enforcement: The legislation directs executive agencies to leverage existing authorities to consider for exclusion and removal artificial intelligence provided by a covered foreign adversary entity on the list.

    What Constitutes ‘Foreign Adversary AI’?

    The bill defines “artificial intelligence” broadly, consistent with existing U.S. law. Crucially, it also provides a clear definition of “foreign adversary” and “foreign adversary entity”. A “foreign adversary entity” includes:

    • A foreign adversary.
    • A foreign person domiciled in, headquartered in, having its principal place of business in, or organized under the laws of a foreign adversary country.
    • An entity where a foreign person or combination of foreign persons described above directly or indirectly owns at least a 20 percent stake.
    • A person subject to the direction or control of any of the aforementioned.

    “Foreign adversary” is defined by reference to existing U.S. code, typically including countries like China, Russia, Iran, and North Korea.

    A New Cold War in the Digital Sphere

    Lawmakers urged approval of the measure. Ranking Member Krishnamoorthi stated, “Artificial intelligence controlled by foreign adversaries poses a direct threat to our national security, our data, and our government operations.” He stressed the necessity of a “clear firewall” to protect U.S. institutions and citizens from hostile regimes embedding their code in sensitive systems.

    Chairman Moolenaar echoed those sentiments, declaring, “We are in a new Cold War—and AI is the strategic technology at the center.” He criticized the Chinese Communist Party’s approach to AI, alleging that it “steals, scales, and subverts,” and emphasized the need to prevent U.S. government systems from being powered by tools designed to serve authoritarian interests.

    Senators Scott and Peters also highlighted the risks to national security and American data. Senator Scott warned against federal agencies using “dangerous platforms” that could subject the government to Beijing’s control, citing clear evidence of China’s potential access to U.S. user data on AI systems. Senator Peters said the legislation’s role in safeguarding U.S. government systems from AI that could compromise national security or put personal data at risk, while still allowing for legitimate scientific research and innovation.

    The “No Adversarial AI Act” represents a significant step in the U.S. effort to secure its digital infrastructure from emerging geopolitical threats, recognizing AI as a critical frontier in national security.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleBreachForums Operators Arrested by French Police
    Next Article nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery

    Related Posts

    Development

    Beyond Denial: How AI Concierge Services Can Transform Healthcare from Reactive to Proactive

    September 25, 2025
    Development

    IDC ServiceScape for Microsoft Power Apps Low-Code/No-Code Custom Application Development Services

    September 25, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-5115 – Jetty HTTP/2 Client Resource Exhaustion Denial of Service

    Common Vulnerabilities and Exposures (CVEs)

    Microsoft wants partners to pitch Edge for Business as a secure browser solution

    Operating Systems

    CVE-2025-27998 – Steam Client Local Privilege Escalation Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    People are using ChatGPT to generate pictures of their perfect match based on looks — mine just made my brother

    News & Updates

    Highlights

    New Linux Flaws Enable Full Root Access via PAM and Udisks Across Major Distributions

    June 27, 2025

    Cybersecurity researchers have uncovered two local privilege escalation (LPE) flaws that could be exploited to…

    NVIDIA expands its AI gaming tool to more GPUs — should you trust it in-game?

    August 24, 2025

    Innovating with MongoDB | Customer Successes, May 2025

    May 20, 2025

    CVE-2025-52950 – Juniper Networks Security Director Missing Authorization Vulnerability

    July 11, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.