Verification Methods for International AI Agreements

17 Pages Posted: 25 Sep 2024

See all articles by Akash Wasil

Akash Wasil

Georgetown University

Tom Reed

Independent

Jack Miller

University of Cambridge

Peter Barnett

Independent

Date Written: August 26, 2024

Abstract

What techniques can be used to verify compliance with international agreements about advanced AI development? In this paper, we examine 10 verification methods that could detect two types of potential violations: unauthorized AI training (e.g., training runs above a certain FLOP threshold) and unauthorized data centers. We divide the verification methods into three categories: (a) national technical means (methods requiring minimal or no access from suspected non-compliant nations), (b) access-dependent methods (methods that require approval from the nation suspected of unauthorized activities), and (c) hardware-dependent methods (methods that require rules around advanced hardware). For each verification method, we provide a description, historical precedents, and possible evasion techniques. We conclude by offering recommendations for future work related to the verification and enforcement of international AI governance agreements.

Keywords: Artificial intelligence, national security, global security, international governance, AI governance, AI policy, intelligence, international law

Suggested Citation

Wasil, Akash and Reed, Tom and Miller, Jack and Barnett, Peter, Verification Methods for International AI Agreements (August 26, 2024). Available at SSRN: https://ssrn.com/abstract=4938419 or http://dx.doi.org/10.2139/ssrn.4938419

Akash Wasil (Contact Author)

Georgetown University ( email )

Washington, DC 20057
United States

Tom Reed

Independent ( email )

Jack Miller

University of Cambridge ( email )

Peter Barnett

Independent ( email )

Do you have a job opening that you would like to promote on SSRN?

Paper statistics

Downloads
30
Abstract Views
350
PlumX Metrics