Publications

CSET produces evidence-driven analysis in a variety of forms, from informative graphics and translations to expert testimony and published reports. Our key areas of inquiry are the foundations of artificial intelligence — such as talent, data and computational power — as well as how AI can be used in cybersecurity and other national security settings. We also do research on the policy tools that can be used to shape AI’s development and use, and on biotechnology.

Report

CSET’s 2024 Annual Report

Center for Security and Emerging Technology
| March 2025

In 2024, CSET continued to deliver impactful, data-driven analysis at the intersection of emerging technology and security policy. Explore our annual report to discover key research highlights, expert testimony, and new analytical tools — all aimed at shaping informed, strategic decisions around AI and emerging tech.

Filter publications
Data Brief

Identifying AI Research

Christian Schoeberl, Autumn Toney, and James Dunham
| July 2023

The choice of method for surfacing AI-relevant publications impacts the ultimate research findings. This report provides a quantitative analysis of various methods available to researchers for identifying AI-relevant research within CSET’s merged corpus, and showcases the research implications of each method.

Reports

Defending the Ultimate High Ground

Corey Crowell and Sam Bresnick
| July 2023

China has poured resources into improving the resilience of its space architecture. But how much progress has Beijing made? This issue brief analyzes China’s space resilience efforts and identifies areas where the United States may need to invest to keep pace.

Reports

China’s Cognitive AI Research

William Hannas, Huey-Meei Chang, Max Riesenhuber, and Daniel Chou
| July 2023

An expert assessment of Chinese scientific literature validates China's public claim to be working toward artificial general intelligence (AGI). At a time when other nations are contemplating safeguards on AI research, China’s push toward AGI challenges emerging global norms, underscoring the need for a serious open-source monitoring program to serve as a foundation for outreach and mitigation.

Data Visualization

ETO Open-source software Research and Community Activity (ORCA)

Zachary Arnold and Jennifer Melot
| July 11, 2023

ETO’s Open-source software Research and Community Activity (ORCA) tool compiles data on open-source software (OSS) used in science and technology research.

Data Snapshot

Examining Key Tech Areas in Government Contracts Data

Christian Schoeberl
| July 6, 2023

Data Snapshots are informative descriptions and quick analyses that dig into CSET’s unique data resources. This short series explores how government procurement data can shed light on federal technological interest and utilization. It analyzes contract metadata, provided in a collaborative project with Govini, to track key emerging technologies through the federal procurement process.

Data Brief

The Inigo Montoya Problem for Trustworthy AI

Emelia Probasco, Autumn Toney, and Kathleen Curlee
| June 2023

When the technology and policy communities use terms associated with trustworthy AI, could they be talking past one another? This paper examines the use of trustworthy AI keywords and the potential for an “Inigo Montoya problem” in trustworthy AI, inspired by "The Princess Bride" movie quote: “You keep using that word. I do not think it means what you think it means.”

Read our translation of a white paper by a Chinese state-affiliated think tank that emphasizes the importance of Chinese and foreign AI frameworks.

Data Brief

Building the Cybersecurity Workforce Pipeline

Luke Koslosky, Ali Crawford, and Sara Abdulla
| June 2023

Creating adequate talent pipelines for the cybersecurity workforce is an ongoing priority for the federal government. Understanding the effectiveness of current education initiatives will help policymakers make informed decisions. This report analyzes the National Centers of Academic Excellence in Cyber (NCAE-C), a consortium of institutions designated as centers of excellence by the National Security Agency. It aims to determine how NCAE-C designated institutions fare compared to other schools in graduating students with cyber-related degrees and credentials.

This is a translation of China’s plan for applying high technology to the field of transportation.

Read our original translation of revised guidelines, issued by the PRC Ministry of Science and Technology in September 2020 on the basis of previous guidelines from August 2019.