Harnessing AI to Move from Threat to Threat Reduction

…In one experiment, well-meaning researchers repurposed MegaSyn, a generative AI tool for pharmaceutical R&D, and the system identified 40,000 toxic molecules, including nerve-agents, in under six hours. These models are…

CORVI Risk Assessment: Tarawa, Kiribati

…facing a medium-high level of risk and while technical information is limited,33  Note: Iete Rouatu, et. al., “National Marine Ecosystem Valuation: Kiribati,” MACBIO, 2015, accessed April 29, 2022, https://macbio-pacific.info/wp-content/uploads/2017/08/Kiribati-MESV-Digital-LowRes.pdf.    much…

Disarmament, Demobilization and Reintegration Programming With Colombia’s Youth

…peace. New York,: International Peace Institute, 2019, 3. Accessed January 21, 2020. https://www.ipinst.org/wp-content/uploads/2019/04/Young-People-as-Drivers-of-Peace_YPS-and-Sustaining-Peace-roundtable-discussion-meeting-note.pdf.  42 Footnote: United Nations. Security Council. Resolution 2419. S/res/2419. June 6, 2015. Accessed January 26, 2020. https://www.securitycouncilreport.org/atf/cf/%7B65BFCF9B-6D27-4E9C-8CD3-CF6E4FF96FF9%7D/s_res_2419.pdf….

AI in the Age of Fake (Imagined) Content

Editor’s Note: This paper is part of a research project, “Countering AI Disinformation and Implications for the US-ROK Alliance,” conducted by the Stimson Center’s Korea Program and generously sponsored by…

Non-Regulatory Solutions to Cybersecurity Challenges

research and development efforts to identify security weaknesses. Through methods of vulnerability research like penetration testing, Intel Security Group employs intrusion software to simulate network breaches. Another emerging leader in this area…