Reports

CSET produces evidence-driven analysis in a variety of forms, from informative graphics and translations to expert testimony and published reports. Our key areas of inquiry are the foundations of artificial intelligence — such as talent, data and computational power — as well as how AI can be used in cybersecurity and other national security settings. We also do research on the policy tools that can be used to shape AI’s development and use, and on biotechnology.

Report

CSET’s 2025 Annual Report

Center for Security and Emerging Technology
| March 31, 2026

Each year, CSET’s annual report highlights our work and impact across technology and security issues. It shows how our research, convening, and engagement contribute to important policy conversations on emerging technologies.

In 2025, CSET advanced its mission to inform high-stakes decisions through rigorous, evidence-based analysis of the security implications of emerging technologies. Our independent research examines issues at the intersection of technology and security.

You can view a web version of our annual report or download it below.

Filter publications

See our original translation of a National Development and Reform Commission Press Conference from October 2020.

See our original translation of a 2012 document from the PRC State Administration of Science, Technology and Industry for National Defense.

Reports

Mapping U.S. Multinationals’ Global AI R&D Activity

Roxanne Heston and Remco Zwetsloot
| December 2020

Many factors influence where U.S. tech multinational corporations decide to conduct their global artificial intelligence research and development (R&D). Company AI labs are spread all over the world, especially in North America, Europe and Asia. But in contrast to AI labs, most company AI staff remain concentrated in the United States. Roxanne Heston and Remco Zwetsloot explain where these companies conduct AI R&D, why they select particular locations, and how they establish their presence there. The report is accompanied by a new open-source dataset of more than 60 AI R&D labs run by these companies worldwide.

See our original translation of a 2010 PRC regulation, meant to increase private investors' role in the Chinese economy.

See our original translation of a study by a PRC government cybersecurity center that analyzes the structure of China's complement of cybersecurity and IT security professionals.

Reports

Hacking AI

Andrew Lohn
| December 2020

Machine learning systems’ vulnerabilities are pervasive. Hackers and adversaries can easily exploit them. As such, managing the risks is too large a task for the technology community to handle alone. In this primer, Andrew Lohn writes that policymakers must understand the threats well enough to assess the dangers that the United States, its military and intelligence services, and its civilians face when they use machine learning.

Reports

Universities and the Chinese Defense Technology Workforce

Ryan Fedasiuk and Emily S. Weinstein
| December 2020

To help U.S. policymakers address long-held concerns about risks and threats associated with letting Chinese university students or graduates study in the United States, CSET experts examine which forms of collaboration, and with which Chinese universities, pose the greatest risk to U.S. research security.

See our original translation of a statistical report by the PRC Ministry of Science and Technology detailing changes in China's research and development personnel pool.

See our original translation of the Chinese Communist Party (CCP) proposal—approved at the Fifth Plenum of the 19th CCP Central Committee in late October 2020—on China's 14th Five-Year Plan.

Reports

Automating Cyber Attacks

Ben Buchanan, John Bansemer, Dakota Cary, Jack Lucas, and Micah Musser
| November 2020

Based on an in-depth analysis of artificial intelligence and machine learning systems, the authors consider the future of applying such systems to cyber attacks, and what strategies attackers are likely or less likely to use. As nuanced, complex, and overhyped as machine learning is, they argue, it remains too important to ignore.