Publications

CSET produces evidence-driven analysis in a variety of forms, from informative graphics and translations to expert testimony and published reports. Our key areas of inquiry are the foundations of artificial intelligence — such as talent, data and computational power — as well as how AI can be used in cybersecurity and other national security settings. We also do research on the policy tools that can be used to shape AI’s development and use, and on biotechnology.

Report

CSET’s 2024 Annual Report

Center for Security and Emerging Technology
| March 2025

In 2024, CSET continued to deliver impactful, data-driven analysis at the intersection of emerging technology and security policy. Explore our annual report to discover key research highlights, expert testimony, and new analytical tools — all aimed at shaping informed, strategic decisions around AI and emerging tech.

Filter publications
Data Snapshot

BIS Best Data Practices: Part 1

Christian Schoeberl
| November 3, 2023

Data Snapshots are informative descriptions and quick analyses that dig into CSET’s unique data resources. This is the first installment of a two-part series of data snapshots that explores export control data from the Bureau of Industry and Security (BIS), namely the 2021 and 2022 yearly reports for trade with China and Hong Kong.

Reports

Decoding Intentions

Andrew Imbrie, Owen Daniels, and Helen Toner
| October 2023

How can policymakers credibly reveal and assess intentions in the field of artificial intelligence? Policymakers can send credible signals of their intent by making pledges or committing to undertaking certain actions for which they will pay a price—political, reputational, or monetary—if they back down or fail to make good on their initial promise or threat. Talk is cheap, but inadvertent escalation is costly to all sides.

Other

Techniques to Make Large Language Models Smaller: An Explainer

Kyle Miller and Andrew Lohn
| October 11, 2023

This explainer overviews techniques to produce smaller and more efficient language models that require fewer resources to develop and operate. Importantly, information on how to leverage these techniques, and many of the subsequent small models, are openly available online for anyone to use. The combination of both small (i.e., easy to use) and open (i.e., easy to access) could have significant implications for artificial intelligence development.

In collaboration with colleagues from CNAS and the Atlantic Council, CSET Researchers Ngor Luong and Emily Weinstein provided this comment in request to Treasury's Advanced Notice of Rule-making request for public comment (TREAS-DO-2023-0009-0001).

Reports

The PRC’s Efforts Abroad

Owen Daniels
| September 2023

This report summarizes more than 20 CSET reports, translations, and data analyses to provide insight into the steps China has taken to increase its technological competitiveness beyond its own borders.

Reports

The PRC’s Domestic Approach

Owen Daniels
| September 2023

This report summarizes more than 20 CSET reports, translations, and data analyses to provide insight into China’s internal actions to advance and implement its technology-related policy goals

Data Visualization

ETO Scout

September 2023

Scout is ETO's discovery tool for Chinese-language writing on science and technology. Scout compiles, tags, and summarizes news and commentary from selected Chinese sources, helping English-speaking users easily keep up to date, skim the latest news, and discover new perspectives. Use the Scout web interface to browse and filter articles, or get customized updates delivered to your inbox through the Scout email service.

Reports

Understanding the Global Gain-of-Function Research Landscape

Caroline Schuerger, Steph Batalis, Katherine Quinn, Ronnie Kinoshita, Owen Daniels, and Anna Puglisi
| August 2023

Gain- and loss-of-function research have contributed to breakthroughs in vaccine development, genetic research, and gene therapy. At the same time, a subset of gain- and loss-of-function studies involve high-risk, highly virulent pathogens that could spread widely among humans if deliberately or unintentionally released. In this report, we map the gain- and loss-of-function global research landscape using a quantitative approach that combines machine learning with subject-matter expert review.

Data Brief

Bayh-Dole Patent Trends

Sara Abdulla and Jack Corrigan
| August 2023

This brief examines trends in patents generated through federally funded research, otherwise known as Bayh-Dole patents. We find that while Bayh-Dole patents make up a small proportion of U.S. patents overall, they are much more common in certain fields, especially in biosciences and national defense related fields. Academic institutions are major recipients of Bayh-Dole patents, and the funding landscape for patent-producing research has shifted since Bayh-Dole came into effect in 1980.

Identifying emerging technologies is critical to governments, the private sector, and researchers, but these groups lack a shared analytical approach when it comes to assessing the trajectories of new technologies. To better calibrate efforts to protect and promote emerging technologies, supply chain security research provides a mature, relevant analytical framework. This report offers policymakers a template to map emerging technology supply chains using two tools developed by CSET's Emerging Technology Observatory: the Map of Science and the Supply Chain Explorer.