Publications

CSET produces evidence-driven analysis in a variety of forms, from informative graphics and translations to expert testimony and published reports. Our key areas of inquiry are the foundations of artificial intelligence — such as talent, data and computational power — as well as how AI can be used in cybersecurity and other national security settings. We also do research on the policy tools that can be used to shape AI’s development and use, and on biotechnology.

Report

CSET’s 2024 Annual Report

Center for Security and Emerging Technology
| March 2025

In 2024, CSET continued to deliver impactful, data-driven analysis at the intersection of emerging technology and security policy. Explore our annual report to discover key research highlights, expert testimony, and new analytical tools — all aimed at shaping informed, strategic decisions around AI and emerging tech.

Filter publications

CSET Senior Fellow Andrew Lohn testified before the House of Representatives Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation at a hearing on "Securing the Future: Harnessing the Potential of Emerging Technologies While Mitigating Security Risks." Lohn discussed the application of AI systems in cybersecurity and AI’s vulnerabilities.

Data Brief

China’s Industrial Clusters

Anna Puglisi and Daniel Chou
| June 2022

China is banking on applying AI to biotechnology research in order to transform itself into a “biotech superpower.” In pursuit of that goal, it has emphasized bringing together different aspects of the development cycle to foster multidisciplinary research. This data brief examines the emerging trend of co-location of AI and biotechnology researchers and explores the potential impact it will have on this growing field.

CSET Senior Fellow Andrew Lohn testified before the House of Representatives Science, Space and Technology Subcommittee on Investigations and Oversight and Subcommittee on Research and Technology at a hearing on "Securing the Digital Commons: Open-Source Software Cybersecurity." Lohn discussed how the United States can maximize sharing within the artificial intelligence community while reducing risks to the AI supply chain.

CSET Senior Fellow Andrew Lohn testified before the U.S. Senate Armed Services Subcommittee on Cybersecurity hearing on artificial intelligence applications to operations in cyberspace. Lohn discussed AI's capabilities and vulnerabilities in cyber defenses and offenses.

Reports

Training Tomorrow’s AI Workforce

Diana Gehlhaus and Luke Koslosky
| April 2022

Community and technical colleges offer enormous potential to grow, sustain, and diversify the U.S. artificial intelligence (AI) talent pipeline. However, these institutions are not being leveraged effectively. This report evaluates current AI-related programs and the associated number of graduates. The authors find that few AI and AI-related degrees and certificates are being awarded today. They propose five recommendations to address existing challenges and harness the potential of these institutions to train tomorrow’s AI workforce.

Reports

The Long-Term Stay Rates of International STEM PhD Graduates

Jack Corrigan, James Dunham, and Remco Zwetsloot
| April 2022

This issue brief uses data from the National Science Foundation’s Survey of Doctorate Recipients to explore how many of the international students who earn STEM PhDs from U.S. universities stay in the country after graduation. The authors trace the journeys that these graduates take through the immigration system and find that most remain in the United States long after earning their degrees.

CSET Research Fellow Caroline Schuerger testified before the Bipartisan Commission on Biodefense hearing on "The Biological Threat Expanse" Current and Future Challenges to National Biodefense." She discussed threats to the bioeconomy and steps the U.S. and its allies can take to harness biotechnology's capabilities and raise awareness of risky research.

Reports

Securing AI

Andrew Lohn and Wyatt Hoffman
| March 2022

Like traditional software, vulnerabilities in machine learning software can lead to sabotage or information leakages. Also like traditional software, sharing information about vulnerabilities helps defenders protect their systems and helps attackers exploit them. This brief examines some of the key differences between vulnerabilities in traditional and machine learning systems and how those differences can affect the vulnerability disclosure and remediation processes.

CSET Research Analyst Dakota Cary testified before the U.S.-China Economic and Security Review Commission hearing on "China’s Cyber Capabilities: Warfare, Espionage, and Implications for the United States." Cary discussed the cooperative relationship between Chinese universities and China’s military and intelligence services to develop talent with the capabilities to perform state-sponsored cyberespionage operations.

Data Brief

Chinese and U.S. University Rankings

Jack Corrigan and Simon Rodriguez
| January 2022

The strength of a country’s talent pipeline depends in no small part on the quality of its universities. This data brief explores how Chinese and U.S. universities perform in two different global university rankings, why their standings have changed over time, and what those trends mean for graduates.