China

CSET Director Dewey Murdick testified before the Senate Select Committee on Intelligence hearing on "Countering the People’s Republic of China’s Economic and Technological Plan for Dominance." Murdick discussed China's strategy to move towards self-sufficiency in key technologies and steps the United States can take to respond.

In his latest CSET brief, Research Analyst Will Hunt explains why exports controls on semiconductor manufacturing equipment against China are an important leveraging tool for the U.S. and its allies.

In an opinion piece for War of the Rocks, CSET's Alex Stephenson and Ryan Fedasiuk give a detailed analysis into the use of AI in a U.S.-Chinese conflict.

According to the Brookings Institution, CSET's report "Harnessed Lightning" gives insight into the China's AI funding.

How China’s united front system works overseas

The Strategist
| April 13, 2022

In an opinion piece for The Strategist, Ryan Fedasiuk gives an overview if China's united front system and its foreign facing role.

The China Initiative is Over — Now What?

The Wire China
| April 3, 2022

In an interview with The Wire China, Research Fellow Emily Weinstein discusses the future of research security and collaboration with China with the end of the China Initiative.

To Compete With China, America Must Compete With Itself

The National Interest
| March 26, 2022

In an opinion piece for The National Interest, Research Analysts Dakota Cary and Ali Crawford make the case for the use of U.S. federal prize competitions to spur innovation to compete with China.

Will China Set Global Tech Standards?

China File
| March 22, 2022

Director of Strategy Helen Toner explored China's tech standards in China File.

Research Analyst Dakota Cary discusses China's use of cyber schools to strengthen its cyber talent.

How China built a one-of-a-kind cyber-espionage behemoth to last

MIT Technology Review
| February 28, 2022

Dakota Cary's testimony before the U.S.-China Commission caught the attention of MIT Technology Review for his findings and recommendations on countering China's hacking capabilities.