Publications

CSET produces evidence-driven analysis in a variety of forms, from informative graphics and translations to expert testimony and published reports. Our key areas of inquiry are the foundations of artificial intelligence — such as talent, data and computational power — as well as how AI can be used in cybersecurity and other national security settings. We also do research on the policy tools that can be used to shape AI’s development and use, and on biotechnology.

Report

CSET’s 2024 Annual Report

Center for Security and Emerging Technology
| March 2025

In 2024, CSET continued to deliver impactful, data-driven analysis at the intersection of emerging technology and security policy. Explore our annual report to discover key research highlights, expert testimony, and new analytical tools — all aimed at shaping informed, strategic decisions around AI and emerging tech.

Filter publications
Data Visualization

National Cybersecurity Center Map

Dakota Cary and Jennifer Melot
| July 2021

China wants to be a “cyber powerhouse” (网络强国). At the heart of this mission is the sprawling 40 km2 campus of the National Cybersecurity Center. Formally called the National Cybersecurity Talent and Innovation Base (国家网络安全人才与创新基地), the NCC is being built in Wuhan. The campus, which China began constructing in 2017 and is still building, includes seven centers for research, talent cultivation, and entrepreneurship; two government-focused laboratories; and a National Cybersecurity School.

Reports

China’s National Cybersecurity Center

Dakota Cary
| July 2021

China’s National Cybersecurity Center (NCC) resides on a 40 km2 plot in Wuhan. As one indication of its significance, the Chinese Communist Party’s highest-ranking members have an oversight committee for the facility. Over the next decade, the NCC will provide the talent, innovation, and indigenization of cyber capabilities that China’s Ministry of State Security, Ministry of Public Security, and People’s Liberation Army Strategic Support Force hacking teams lack. Though still under construction, the NCC’s first class of graduates will cross the stage in June 2022.

Reports

Poison in the Well

Andrew Lohn
| June 2021

Modern machine learning often relies on open-source datasets, pretrained models, and machine learning libraries from across the internet, but are those resources safe to use? Previously successful digital supply chain attacks against cyber infrastructure suggest the answer may be no. This report introduces policymakers to these emerging threats and provides recommendations for how to secure the machine learning supply chain.

Reports

Machine Learning and Cybersecurity

Micah Musser and Ashton Garriott
| June 2021

Cybersecurity operators have increasingly relied on machine learning to address a rising number of threats. But will machine learning give them a decisive advantage or just help them keep pace with attackers? This report explores the history of machine learning in cybersecurity and the potential it has for transforming cyber defense in the near future.

Reports

Research Security, Collaboration, and the Changing Map of Global R&D

Melissa Flagg, Autumn Toney, and Paul Harris
| June 2021

The global map of research has shifted dramatically over the last 20 years. Annual global investment in research and development has tripled, and the United States’ share of both global R&D funding and total research output is diminishing. The open research system, with its expanding rates of investment and interconnectedness, has delivered tremendous benefits to many nations but also created new challenges for research integrity and security.

Reports

Truth, Lies, and Automation

Ben Buchanan, Andrew Lohn, Micah Musser, and Katerina Sedova
| May 2021

Growing popular and industry interest in high-performing natural language generation models has led to concerns that such models could be used to generate automated disinformation at scale. This report examines the capabilities of GPT-3--a cutting-edge AI system that writes text--to analyze its potential misuse for disinformation. A model like GPT-3 may be able to help disinformation actors substantially reduce the work necessary to write disinformation while expanding its reach and potentially also its effectiveness.

Data Brief

AI and Industry

Eri Phinisee, Autumn Toney, and Melissa Flagg
| May 2021

Artificial intelligence is said to be transforming the global economy and society in what some dub the “fourth industrial revolution.” This data brief analyzes media representations of AI and the alignments, or misalignments, with job postings that include the AI-related skills needed to make AI a practical reality. This potential distortion is important as the U.S. Congress places an increasing emphasis on AI. If government funds are shifted away from other areas of science and technology, based partly on the representations that leaders and the public are exposed to in the media, it is important to understand how those representations align with real jobs across the country.

Data Brief

AI Hubs

Max Langenkamp and Melissa Flagg
| April 2021

U.S. policymakers need to understand the landscape of artificial intelligence talent and investment as AI becomes increasingly important to national and economic security. This knowledge is critical as leaders develop new alliances and work to curb China’s growing influence. As an initial effort, an earlier CSET report, “AI Hubs in the United States,” examined the domestic AI ecosystem by mapping where U.S. AI talent is produced, where it is concentrated, and where AI private equity funding goes. Given the global nature of the AI ecosystem and the importance of international talent flows, this paper looks for the centers of AI talent and investment in regions and countries that are key U.S. partners: Europe and the CANZUK countries (Canada, Australia, New Zealand, and the United Kingdom).

Reports

Lessons from Stealth for Emerging Technologies

Peter Westwick
| March 2021

Stealth technology was one of the most decisive developments in military aviation in the last 50 years. With U.S. technological leadership now under challenge, especially from China, this issue brief derives several lessons from the history of Stealth to guide current policymakers. The example of Stealth shows how the United States produced one critical technology in the past and how it might produce others today.

Reports

Academics, AI, and APTs

Dakota Cary
| March 2021

Six Chinese universities have relationships with Advanced Persistent Threat (APT) hacking teams. Their activities range from recruitment to running cyber operations. These partnerships, themselves a case study in military-civil fusion, allow state-sponsored hackers to quickly move research from the lab to the field. This report examines these universities’ relationships with known APTs and analyzes the schools’ AI/ML research that may translate to future operational capabilities.