{"id":24150,"date":"2026-05-01T08:45:10","date_gmt":"2026-05-01T08:45:10","guid":{"rendered":"https:\/\/www.europesays.com\/ai\/24150\/"},"modified":"2026-05-01T08:45:10","modified_gmt":"2026-05-01T08:45:10","slug":"lawmakers-open-inquiry-into-cybersecurity-risks-posed-by-prc-origin-ai-models-deployed-in-critical-infrastructure-systems","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ai\/24150\/","title":{"rendered":"Lawmakers open inquiry into cybersecurity risks posed by PRC-origin AI models deployed in critical infrastructure systems"},"content":{"rendered":"<p>The U.S. House Committee on Homeland Security and the House Select Committee on China launched a joint investigation into national security and cybersecurity risks tied to increased use of AI models developed in China, including low-cost, open-weight, and API-accessible systems, such as DeepSeek, Alibaba, Moonshot AI, and MiniMax. Lawmakers are examining concerns that some China-based AI providers may be distilling capabilities from leading U.S. models without authorization and repackaging them into cheaper systems that may lack equivalent safety controls, before making them available to American users and organizations.<\/p>\n<p>As an initial step in the probe, Andrew R. Garbarino, a New York Republican and chairman of the House Homeland Security Subcommittee on Cybersecurity and Infrastructure Protection, and John Moolenaar, a Michigan Republican and chair of the House Select Committee on the Strategic Competition between the United States and the Chinese Communist Party sent letters to <a href=\"https:\/\/urldefense.com\/v3\/__https:\/\/house.us11.list-manage.com\/track\/click?u=98549d605f077248c2019d3db&amp;id=0d04798722&amp;e=e77c046f9f__;!!BSgrhSFG!D9WjAnUHXvICjrq5qpBMv91UmM3vsBWv9tkxsaJsvPZXOrtZA1553rkQcwcNE8Lf8qSy9LUEcVbnTgVFWDETL477xcH-Sgahrhh_LrqsINQqwygKQihVVQ$\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Anysphere<\/a> and <a href=\"https:\/\/urldefense.com\/v3\/__https:\/\/house.us11.list-manage.com\/track\/click?u=98549d605f077248c2019d3db&amp;id=8b65f3dcb0&amp;e=e77c046f9f__;!!BSgrhSFG!D9WjAnUHXvICjrq5qpBMv91UmM3vsBWv9tkxsaJsvPZXOrtZA1553rkQcwcNE8Lf8qSy9LUEcVbnTgVFWDETL477xcH-Sgahrhh_LrqsINQqwygq2sBNMA$\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Airbnb<\/a>, raising concerns about the companies\u2019 use of or exposure to these risks through PRC-developed AI.\u00a0<\/p>\n<p>The move follows an April 2026 <a href=\"https:\/\/urldefense.com\/v3\/__https:\/\/house.us11.list-manage.com\/track\/click?u=98549d605f077248c2019d3db&amp;id=c79fd2387d&amp;e=e77c046f9f__;!!BSgrhSFG!D9WjAnUHXvICjrq5qpBMv91UmM3vsBWv9tkxsaJsvPZXOrtZA1553rkQcwcNE8Lf8qSy9LUEcVbnTgVFWDETL477xcH-Sgahrhh_LrqsINQqwyhv7NaMJA$\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">memo<\/a> from the White House Office of Science and Technology Policy warning that foreign entities, primarily based in China, are conducting deliberate, industrial-scale campaigns to distill U.S. frontier AI systems through proxy accounts and other coordinated methods.<\/p>\n<p>Clearly, the investigation comes amid growing concern that PRC-based AI companies are using unauthorized model distillation and other illicit techniques to extract capabilities from leading American frontier models, then repackaging those capabilities into lower-cost models without the same safeguards included in the original American models, which are then marketed or made available to U.S. companies, developers, and consumers. While model distillation can be a legitimate AI development technique, distillation conducted through fraudulent accounts, proxy networks, evasion of access restrictions, or violations of U.S. companies\u2019 terms of service raises serious concerns about model provenance, intellectual property, cybersecurity, and <a href=\"https:\/\/industrialcyber.co\/features\/supply-chain-risk-takes-center-stage-in-cyber-sovereignty-as-hidden-dependencies-long-tail-vendors-come-into-focus\/\" rel=\"nofollow noopener\" target=\"_blank\">supply-chain<\/a> risk.<\/p>\n<p>In their letter to Anysphere, the Chairmen focus on Cursor\u2019s Composer 2 model, which was reportedly built on an open-weight model developed by Moonshot AI, a PRC-based company publicly implicated in large-scale distillation campaigns targeting American AI systems.<\/p>\n<p>In the letter to Anysphere, the Chairmen wrote, \u201cThe billions of dollars American companies invest in foundational research, compute infrastructure, and security engineering is being undercut by a sustained extraction campaign conducted at a fraction of the cost of independent development. This threat is not limited to commercial harm. American frontier AI laboratories invest heavily in security testing and in building guardrails designed to prevent their models from being used to develop weapons, automate software vulnerability discovery and exploitation, generate tailored disinformation, or assist in the synthesis of dangerous chemical or biological agents. When capabilities are stripped out through distillation and repackaged without equivalent safeguards, the resulting models may become available to hostile state actors, terrorist organizations, and criminal enterprises.\u201d<\/p>\n<p>Flagging the April 21 announcement, where Cursor announced a partnership with Chainguard, an open-source security company, to steer AI-generated code toward vetted open-source components and reduce the risk that developers unknowingly pull vulnerable or malicious libraries and container images into production environments, the letter highlighted that the \u201cdevelopment is notable because it reflects an apparent acknowledgment by Cursor that agentic and \u2018vibe coded\u2019 development can cause dependency selection and package inclusion decisions to occur at a scale and speed that outpaces ordinary human review, and because it highlights that the security of an AI coding environment depends not only on the model itself, but also on the provenance and integrity of the packages, libraries, and images the system recommends, retrieves, or incorporates into downstream software.\u201d\u00a0<\/p>\n<p>They added that in environments handling sensitive government, defense-industrial, or critical infrastructure code, those software supply chain risks carry obvious national security implications.<\/p>\n<p>The House committees are requesting detailed records from Anysphere as part of an investigation into national security risks linked to the theft of U.S. AI capabilities, the use of PRC-developed open-weight models, and their integration into tools used across the American economy, including in government, defense, and critical infrastructure contexts. The request is due May 13, 2026, and focuses on any ties to Chinese AI firms, including Moonshot AI, DeepSeek, MiniMax, Alibaba, Zhipu AI, ByteDance, Tencent, and Baidu, such as partnerships, licensing arrangements, technical collaborations, and financial relationships.<\/p>\n<p>Lawmakers are also seeking extensive documentation on Anysphere\u2019s use of Moonshot AI\u2019s Kimi K2.5 model in its Composer 2 product, including alternative models considered, risk assessments, legal and security analyses, and decisions around disclosure of model provenance. In addition, the request covers detailed technical explanations of data flows in Cursor products, third-party data handling agreements, security testing of integrated models, and steps taken to prevent data exposure to PRC-linked systems. It also asks how Anysphere ensures compliance with U.S. security standards, verifies model integrity, and discloses model origin and risks to customers.<\/p>\n<p>The letter adds, \u201cThe Committees further request that appropriate personnel from Anysphere appear for an in-person briefing on these matters, including the issues identified in this letter and Anysphere\u2019s response thereto, no later than May 20, 2026.\u201d<\/p>\n<p>\u00a0In their letter to Airbnb, the Chairmen say they are investigating what they describe as a broader pattern of PRC-based AI labs allegedly using adversarial distillation to extract capabilities from leading U.S. frontier models, redistributing them as open-weight systems, and embedding those models into widely used American products. They frame this as part of a wider Chinese state-linked effort to accelerate AI development through espionage, intellectual property theft, and other unlawful or deceptive means, raising concerns about the downstream use of PRC-origin models in commercial and public-sector systems in the U.S.<\/p>\n<p>The letter specifically questions Airbnb\u2019s reported use of Alibaba\u2019s Qwen model in customer service, citing its \u2018fast and cheap\u2019 performance as justification, while warning of national security and data security risks. It outlines three main concerns: ideological control and censorship embedded in Chinese AI systems under PRC law, elevated safety vulnerabilities and higher failure rates in resisting malicious prompts compared with U.S. models, and data exposure risks when using API-based foreign models that may be subject to PRC legal obligations requiring cooperation with state authorities. The Committees argue these factors make the adoption of such models a structural national security risk rather than a simple cost or performance decision.<\/p>\n<p>The Committees are requesting extensive documentation from Airbnb as part of a joint investigation into its use of PRC-origin AI models. The request covers identification of all Chinese-developed models currently used, tested, or evaluated by Airbnb, including how each is deployed, how it is accessed (API, self-hosted, or third-party), and whether any independent security testing of model weights was conducted before use.<\/p>\n<p>Lawmakers are also seeking detailed technical disclosures on how user and corporate data flows to PRC-linked model providers, including infrastructure routes, server locations, and any entities subject to Chinese jurisdiction. In addition, the request demands internal analyses comparing PRC and non-PRC models, assessments of training data provenance and potential adversarial distillation, documentation of supply chain and model integrity audits, communications with Chinese AI providers, and records of all Airbnb customer and employee data processed by these models over time.<\/p>\n<p>The Committees further request that appropriate personnel from Airbnb appear for an in-person briefing on these matters, including the issues identified in this letter and Airbnb\u2019s response thereto, no later than May 20, 2026.\u00a0<\/p>\n<p>In March, the Subcommittee on Cybersecurity and Infrastructure Protection <a href=\"https:\/\/urldefense.com\/v3\/__https:\/\/house.us11.list-manage.com\/track\/click?u=98549d605f077248c2019d3db&amp;id=d6edc47218&amp;e=e77c046f9f__;!!BSgrhSFG!D9WjAnUHXvICjrq5qpBMv91UmM3vsBWv9tkxsaJsvPZXOrtZA1553rkQcwcNE8Lf8qSy9LUEcVbnTgVFWDETL477xcH-Sgahrhh_LrqsINQqwyilmJhvtw$\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">held a hearing<\/a> to evaluate the growing national security and economic risks posed by AI, robotics, and autonomous sensing technologies developed by companies linked to the PRC. Witnesses testified that technologies developed within adversarial controlled ecosystems can create significant vulnerabilities, enable surveillance, expose sensitive data, and provide access to critical infrastructure systems.<\/p>\n<p>The World Economic Forum (WEF) <a href=\"https:\/\/industrialcyber.co\/threat-landscape\/anthropics-mythos-signals-new-era-of-autonomous-cyber-threats-raising-stakes-for-ai-governance-and-cyber-resilience\/\" rel=\"nofollow noopener\" target=\"_blank\">warned<\/a> last week that the emergence of advanced AI systems such as Anthropic\u2019s Mythos marks a turning point for <a href=\"https:\/\/industrialcyber.co\/reports\/sans-2026-report-flags-cybersecurity-skills-crisis-putting-critical-infrastructure-and-ot-sectors-at-measurable-breach-risk\/\" rel=\"nofollow noopener\" target=\"_blank\">cybersecurity<\/a>, in which machines can autonomously identify previously unknown vulnerabilities, generate exploits, and execute complex attack pathways with minimal human input. This shift collapses the traditional gap between defenders and attackers, accelerating both threat discovery and weaponization while raising concerns that existing security models are ill-equipped to manage the speed and scale of AI-driven cyber risk.\u00a0<\/p>\n<p>\t\t<img loading=\"lazy\" decoding=\"async\" width=\"96\" height=\"96\" src=\"data:image\/svg+xml,%3Csvg%20xmlns=\" https:=\"\" alt=\"\" data-lazy-src=\"https:\/\/www.europesays.com\/ai\/wp-content\/uploads\/2026\/04\/Anna-Ribeiro-min-96x96.jpg\"\/><\/p>\n<p>&#13;<br \/>\n\t\t\t\t\tAnna Ribeiro\t\t\t\t<\/p>\n<p>&#13;<br \/>\n\t\t\t\t\tIndustrial Cyber News Editor. Anna Ribeiro is a freelance journalist with over 14 years of experience in the areas of security, data storage, virtualization and IoT.\t\t\t\t<\/p>\n<p>\t<a class=\"post-author-link\" href=\"https:\/\/industrialcyber.co\/author\/annaribeiro\/\" rel=\"nofollow noopener\" target=\"_blank\"><\/p>\n","protected":false},"excerpt":{"rendered":"The U.S. House Committee on Homeland Security and the House Select Committee on China launched a joint investigation&hellip;\n","protected":false},"author":2,"featured_media":24151,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[24,2539,2477,16464,25,2661,5970,692,6454,7181,6010,16465,9892,16466,930,9603,1896],"class_list":{"0":"post-24150","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ai","8":"tag-ai","9":"tag-airbnb","10":"tag-alibaba","11":"tag-anysphere","12":"tag-artificial-intelligence","13":"tag-critical-infrastructure","14":"tag-cyber-attacks","15":"tag-cyber-risk","16":"tag-cyber-threats","17":"tag-cybersecurity-risk","18":"tag-deepseek","19":"tag-homeland-security","20":"tag-industrial","21":"tag-infrastructure-protection","22":"tag-minimax","23":"tag-moonshot-ai","24":"tag-national-security"},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/24150","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/comments?post=24150"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/posts\/24150\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media\/24151"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/media?parent=24150"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/categories?post=24150"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ai\/wp-json\/wp\/v2\/tags?post=24150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}