Publications

CSET produces evidence-driven analysis in a variety of forms, from informative graphics and translations to expert testimony and published reports. Our key areas of inquiry are the foundations of artificial intelligence — such as talent, data and computational power — as well as how AI can be used in cybersecurity and other national security settings. We also do research on the policy tools that can be used to shape AI’s development and use, and on biotechnology.

Report

CSET’s 2024 Annual Report

Center for Security and Emerging Technology
| March 2025

In 2024, CSET continued to deliver impactful, data-driven analysis at the intersection of emerging technology and security policy. Explore our annual report to discover key research highlights, expert testimony, and new analytical tools — all aimed at shaping informed, strategic decisions around AI and emerging tech.

Filter publications
Data Visualization

ETO Scout

September 2023

Scout is ETO's discovery tool for Chinese-language writing on science and technology. Scout compiles, tags, and summarizes news and commentary from selected Chinese sources, helping English-speaking users easily keep up to date, skim the latest news, and discover new perspectives. Use the Scout web interface to browse and filter articles, or get customized updates delivered to your inbox through the Scout email service.

Translation

Translation Snapshot: Chinese Overseas Talent Recruitment

Ben Murphy
| September 6, 2023

Translation Snapshots are short posts that highlight related translations produced by CSET’s in-house translation team. Each snapshot identifies relevant translations, provides short summaries, and links to the full translations. Check back regularly for additional Translation Snapshots highlighting our work.

Data Brief

Bayh-Dole Patent Trends

Sara Abdulla and Jack Corrigan
| August 2023

This brief examines trends in patents generated through federally funded research, otherwise known as Bayh-Dole patents. We find that while Bayh-Dole patents make up a small proportion of U.S. patents overall, they are much more common in certain fields, especially in biosciences and national defense related fields. Academic institutions are major recipients of Bayh-Dole patents, and the funding landscape for patent-producing research has shifted since Bayh-Dole came into effect in 1980.

CSET submitted the following comment in response to a Request for Information (RFI) from the National Science Foundation (NSF) about the development of the newly established Technology, Innovation, and Partnerships (TIP) Directorate, in accordance with the CHIPS and Science Act of 2022.

CSET Research Analyst Dahlia Peterson testified before the U.S.-China Economic and Security Review Commission at a hearing on "China’s Challenges and Capabilities in Educating and Training the Next Generation Workforce."

Reports

U.S. Outbound Investment into Chinese AI Companies

Emily S. Weinstein and Ngor Luong
| February 2023

U.S. policymakers are increasingly concerned about the national security implications of U.S. investments in China, and some are considering a new regime for reviewing outbound investment security. The authors identify the main U.S. investors active in the Chinese artificial intelligence market and the set of AI companies in China that have benefitted from U.S. capital. They also recommend next steps for U.S. policymakers to better address the concerns over capital flowing into the Chinese AI ecosystem.

CSET Non-Resident Senior Fellow Kevin Wolf testified before the Senate Banking Committee on U.S. export control policy and opportunities.

CSET Non-Resident Senior Fellow Kevin Wolf testified before the House Foreign Affairs Oversight and Accountability Subcommittee regarding U.S. export control policy and his recommendations going forward.

CSET Non-Resident Senior Fellow Kevin Wolf testified before the United Kingdom Parliament on export controls and Russia.

Reports

Banned in D.C.

Jack Corrigan, Sergio Fontanez, and Michael Kratsios
| October 2022

U.S. federal policymakers have recently gained the authority to block government agencies and private organizations from using foreign technologies that pose national security risks. But securing U.S. networks will require them to wield those powers effectively and better coordinate supply chain security efforts across all levels of government. The authors provide an overview of federal- and state-level procurement bans and recommend ways to build stronger defense against foreign technology threats.