Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Can Good UX Protect Older Users From Digital Scams?

      June 25, 2025

      Warp 2.0 evolves terminal experience into an Agentic Development Environment

      June 25, 2025

      Qodo launches CLI agent framework

      June 25, 2025

      Overture Maps launches GERS, a system of unique IDs for global geospatial entities

      June 25, 2025

      Microsoft Copilot is “pretty important” but customers still prefer ChatGPT — “OpenAI has done a tremendous job”

      June 25, 2025

      Will you sync your Windows 10 PC data to the cloud for free access to security updates beyond 2025?

      June 25, 2025

      Red Hat Enterprise Linux (RHEL) quietly released an official image for WSL — but most of us won’t be able to use it

      June 25, 2025

      Sam Altman says ChatGPT has evolved beyond a mere “Google replacement” — with ads potentially coming to users

      June 25, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      What Are the PHP Trends in 2025

      June 25, 2025
      Recent

      What Are the PHP Trends in 2025

      June 25, 2025

      Real-Time Observability for Node.js – Without Code Changes

      June 25, 2025

      Elevating API Automation: Exploring Karate as an Alternative to Rest-Assured

      June 25, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft Copilot is “pretty important” but customers still prefer ChatGPT — “OpenAI has done a tremendous job”

      June 25, 2025
      Recent

      Microsoft Copilot is “pretty important” but customers still prefer ChatGPT — “OpenAI has done a tremendous job”

      June 25, 2025

      Will you sync your Windows 10 PC data to the cloud for free access to security updates beyond 2025?

      June 25, 2025

      Red Hat Enterprise Linux (RHEL) quietly released an official image for WSL — but most of us won’t be able to use it

      June 25, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»U.S. Lawmakers Target ‘Adversarial AI’ in Bipartisan Push to Fortify Federal Systems

    U.S. Lawmakers Target ‘Adversarial AI’ in Bipartisan Push to Fortify Federal Systems

    June 25, 2025

    No Adversarial AI Act, No Adversarial AI, AI, Artificial Intelligence

    In a significant bipartisan effort, key U.S. lawmakers today introduced the “No Adversarial AI Act,” legislation designed to erect a critical firewall between U.S. federal agencies and artificial intelligence technologies developed by foreign adversaries.

    The bill, spearheaded by Raja Krishnamoorthi (D-IL), ranking member of the House Select Committee on the Strategic Competition Between the United States and the Chinese Communist Party, and committee Chairman John Moolenaar (R-MI), aims to mitigate national security risks posed by AI systems potentially controlled by hostile foreign powers, notably the People’s Republic of China (PRC).

    The legislation has garnered bicameral support, with Representatives Ritchie Torres (D-NY) and Darin LaHood (R-IL) cosponsoring the House bill, and Senators Rick Scott (R-FL) and Gary Peters (D-MI) introducing the companion measure in the Senate.

    AI as a National Security Vulnerability

    At the heart of the “No Adversarial AI Act” is the recognition that AI, while transformative, can also be a potent tool for espionage and subversion when controlled by malicious actors. Lawmakers specifically cited concerns about companies like DeepSeek, which has alleged ties to the Chinese Communist Party and its intelligence apparatus, and whose privacy policy explicitly states that U.S. user data is stored in China.

    A prior investigation by Ranking Member Krishnamoorthi and Chairman Moolenaar into DeepSeek’s operations recommended a federal procurement prohibition on PRC-origin AI models, particularly for use on government devices. The “No Adversarial AI Act” directly addresses this recommendation.

    Also read: Taiwan’s DeepSeek Ban Reflects Global Concerns Over AI Security

    Key Provisions of the Bill to Build the Digital Wall

    The “No Adversarial AI Act” outlines a multi-pronged approach to safeguarding federal systems that includes:

    • Establishing a Federal List of Adversarial AI: The bill mandates that the Federal Acquisition Security Council (FASC) develop a list of AI produced or developed by a foreign adversary within 60 days of the Act’s enactment. This list will then be published publicly by the Director of the Office of Management and Budget (OMB) within 180 days, and updated at least every 180 days thereafter.
    • Prohibiting Federal Use of Listed AI: Once an AI is on this list, U.S. government agencies will be barred from acquiring or using it. This prohibition extends to entities with documented ties to the Chinese Communist Party like DeepSeek.
    • Limited Exceptions with Strict Oversight: While the general rule is prohibition, the bill allows for narrow exceptions. An executive agency head may approve an exception if the AI is deemed necessary for scientifically valid research, evaluation, training, testing, analysis, counterterrorism or counterintelligence activities, or to avoid jeopardizing mission-critical functions. However, any such exception requires written notice to the Director of OMB and appropriate Congressional committees.
    • Regular Updates and Removal Process: The FASC is required to update the adversarial AI list at least every 180 days. A process is also outlined for removing AI from the list if the owner certifies it’s not produced or developed by a foreign adversary, and the FASC reviews and certifies this claim.
    • Empowering Agency Enforcement: The legislation directs executive agencies to leverage existing authorities to consider for exclusion and removal artificial intelligence provided by a covered foreign adversary entity on the list.

    What Constitutes ‘Foreign Adversary AI’?

    The bill defines “artificial intelligence” broadly, consistent with existing U.S. law. Crucially, it also provides a clear definition of “foreign adversary” and “foreign adversary entity”. A “foreign adversary entity” includes:

    • A foreign adversary.
    • A foreign person domiciled in, headquartered in, having its principal place of business in, or organized under the laws of a foreign adversary country.
    • An entity where a foreign person or combination of foreign persons described above directly or indirectly owns at least a 20 percent stake.
    • A person subject to the direction or control of any of the aforementioned.

    “Foreign adversary” is defined by reference to existing U.S. code, typically including countries like China, Russia, Iran, and North Korea.

    A New Cold War in the Digital Sphere

    Lawmakers urged approval of the measure. Ranking Member Krishnamoorthi stated, “Artificial intelligence controlled by foreign adversaries poses a direct threat to our national security, our data, and our government operations.” He stressed the necessity of a “clear firewall” to protect U.S. institutions and citizens from hostile regimes embedding their code in sensitive systems.

    Chairman Moolenaar echoed those sentiments, declaring, “We are in a new Cold War—and AI is the strategic technology at the center.” He criticized the Chinese Communist Party’s approach to AI, alleging that it “steals, scales, and subverts,” and emphasized the need to prevent U.S. government systems from being powered by tools designed to serve authoritarian interests.

    Senators Scott and Peters also highlighted the risks to national security and American data. Senator Scott warned against federal agencies using “dangerous platforms” that could subject the government to Beijing’s control, citing clear evidence of China’s potential access to U.S. user data on AI systems. Senator Peters said the legislation’s role in safeguarding U.S. government systems from AI that could compromise national security or put personal data at risk, while still allowing for legitimate scientific research and innovation.

    The “No Adversarial AI Act” represents a significant step in the U.S. effort to secure its digital infrastructure from emerging geopolitical threats, recognizing AI as a critical frontier in national security.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleBreachForums Operators Arrested by French Police
    Next Article nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery

    Related Posts

    Development

    How OpenTelemetry Improved Its Code Integrity for Arm64 by Working With Ampere

    June 25, 2025
    Development

    How to Build a Custom MCP Server with TypeScript – A Handbook for Developers

    June 25, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-50213 – Apache Airflow Providers Snowflake Special Element Injection

    Common Vulnerabilities and Exposures (CVEs)

    From Text to Action: How Tool-Augmented AI Agents Are Redefining Language Models with Reasoning, Memory, and Autonomy

    Machine Learning

    CVE-2025-4209 – “Apache HTTP Server Command Injection Vulnerability”

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-21462 – QNAP QTS Memory Corruption Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    Fortinet Security Update: Critical Patch Addressing Multiple Vulnerabilities Across Products

    June 10, 2025

    Fortinet Security Update: Critical Patch Addressing Multiple Vulnerabilities Across Products

    Fortinet has released security updates addressing multiple vulnerabilities across its product portfolio, including FortiOS, FortiAnalyzer, FortiProxy, and FortiWeb systems.
    The cybersecurity company’s …
    Read more

    Published Date:
    Jun 10, 2025 (2 hours, 45 minutes ago)

    Vulnerabilities has been mentioned in this article.

    How to Use python-A2A to Create and Connect Financial Agents with Google’s Agent-to-Agent (A2A) Protocol

    June 17, 2025

    Implement Conditional Migrations in Laravel with the New shouldRun() Method

    May 1, 2025

    CVE-2025-46534 – DanielRiera Image Style Hover DOM-Based Cross-site Scripting Vulnerability

    April 24, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.