Publications | Center for Security and Emerging Technology
webCredibility Rating
High quality. Established institution or organization with editorial oversight and accountability.
Rating inherited from publication venue: CSET Georgetown
CSET's publications page aggregates policy-relevant research on AI, national security, and emerging technologies, making it a key reference hub for AI governance and safety policy analysis.
Metadata
Summary
This is the publications index for the Center for Security and Emerging Technology (CSET), a Georgetown-based think tank producing evidence-driven analysis on AI, cybersecurity, biotechnology, and national security. It hosts hundreds of reports, translations, data briefs, and testimonies covering AI governance, China's AI ambitions, supply chains, and workforce issues. The page serves as a central reference for policymakers and researchers tracking AI policy developments.
Key Points
- •CSET publishes reports, translations, data briefs, testimonies, and visualizations covering AI safety, governance, and national security.
- •Key research areas include AI foundations (talent, data, compute), cybersecurity, China's military AI, and biotechnology risk.
- •The publications index includes 236 reports, 231 translations, and 59 data briefs, among other formats.
- •Recent work covers PLA AI procurement, full-spectrum propaganda, AI implementation guidance, and China's export control regulations.
- •CSET's research directly informs high-stakes policy decisions at the intersection of emerging technology and national security.
Cited by 2 pages
| Page | Type | Quality |
|---|---|---|
| Intervention Timing Windows | Analysis | 72.0 |
| CSET (Center for Security and Emerging Technology) | Organization | 43.0 |
Cached Content Preview
Reports
CSET produces evidence-driven analysis in a variety of forms, from informative graphics and translations to expert testimony and published reports. Our key areas of inquiry are the foundations of artificial intelligence — such as talent, data and computational power — as well as how AI can be used in cybersecurity and other national security settings. We also do research on the policy tools that can be used to shape AI’s development and use, and on biotechnology.
Report
China’s Military AI Wish List
Emelia Probasco,
Sam Bresnick,
and Cole McFaul
| February 2026
This report examines thousands of Chinese-language open-source requests for proposal (RFPs) published by the People’s Liberation Army between January 1, 2023, and December 31, 2024. The RFPs the authors reviewed offer insights into the PLA’s priorities and ambitions for AI-enabled military technologies associated with C5ISRT: command, control, communications, computers, cyber, intelligence, surveillance, reconnaissance, and targeting.
Applications
Compete
Filter publications
Search
Search
Topics
CyberAI (72) China (65) Compete (60) Applications (59) Peer Watch (56) Workforce (55) Lines of Research (36) Supply Chains (26) Map of Science (22) Data (22) Bio-Risk (19) Regions (15) Talent (13) Investment (9) International standing (9) Hardware and compute (6) Cybersecurity (6) Foundations (3) Ethics (2) Data, algorithms and models (1)
Type of Publication
Reports (236) Translation (231) Data Brief (59) Data Snapshot (55) Testimony (36) Formal Response (25) Data Visualization (18) Other (5) Annual Report (4)
Sort by
Date (Newest)
Date (Oldest)
Reports
Full-Spectrum Propaganda in the Social Media Era
Josh A. Goldstein
and Renée DiResta
| April 22, 2026
In a new Security Studies article, Renee DiResta and Josh A. Goldstein lay out how state-backed propagandists run “full-spectrum” propaganda campaigns, relying on overt and covert tools across broadcast and social media.
Reports
Operationalizing AI Guidance: A Reference Guide for Translating High-Level Goals into Practical Implementation
Kyle Crichton,
Abhiram Reddy,
and Jessica Ji
| April 2026
Organizations face growing pressure to adopt artificial intelligence, but often lack practical guidance on how to do so effectively. This report bridges the gap between high-level principles and real-world implementation, offering actionable steps across the AI adoption life cycle. Drawing on over 1,200 resources, this reference guide provides practitioners with the knowledge required to operationalize AI safety, security, and governance practices within their organizations.
Translation
Cybersecurity Law of the People’s Republic of China
April 14, 2026
Read our translation
... (truncated, 6 KB total)a172739acb6bedc6 | Stable ID: sid_f1KTGEcyTA