Harnessing AI to Move from Threat to Threat Reduction

…In one experiment, well-meaning researchers repurposed MegaSyn, a generative AI tool for pharmaceutical R&D, and the system identified 40,000 toxic molecules, including nerve-agents, in under six hours. These models are…
CORVI Risk Assessment: Tarawa, Kiribati

…facing a medium-high level of risk and while technical information is limited,33 Note: Iete Rouatu, et. al., “National Marine Ecosystem Valuation: Kiribati,” MACBIO, 2015, accessed April 29, 2022, https://macbio-pacific.info/wp-content/uploads/2017/08/Kiribati-MESV-Digital-LowRes.pdf. much…
Disarmament, Demobilization and Reintegration Programming With Colombia’s Youth

…peace. New York,: International Peace Institute, 2019, 3. Accessed January 21, 2020. https://www.ipinst.org/wp-content/uploads/2019/04/Young-People-as-Drivers-of-Peace_YPS-and-Sustaining-Peace-roundtable-discussion-meeting-note.pdf. 42 Footnote: United Nations. Security Council. Resolution 2419. S/res/2419. June 6, 2015. Accessed January 26, 2020. https://www.securitycouncilreport.org/atf/cf/%7B65BFCF9B-6D27-4E9C-8CD3-CF6E4FF96FF9%7D/s_res_2419.pdf….
CORVI Risk Assessment: Southern and Western Urban Corridor, Barbados

…https://habitat3.org/wp-content/uploads/Habitat-III-Report-Barbados-final.pdf. The core of the city in St. Michael’s parish – while still the most densely populated part of the country – has been declining in population for several decades.43 …
Origins, Progress, and Unfinished Business: NATO’s Protection of Civilians Policy

…New Era,” North Atlantic Treaty Organization, November 25, 2020, https://www.nato.int/nato_static_fl2014/assets/pdf/2020/12/pdf/201201-Reflection-Group-Final-Report-Uni.pdf. there is a need to review how the PoC policy has been implemented thus far and explore how it applies…
AI in the Age of Fake (Imagined) Content

Editor’s Note: This paper is part of a research project, “Countering AI Disinformation and Implications for the US-ROK Alliance,” conducted by the Stimson Center’s Korea Program and generously sponsored by…
Engineering the Mekong: How Upstream Dams are Reshaping Cambodia’s Flooded Forests

…subset of dams. Critically, no routine operational data are publicly available for the largest and most hydrologically influential dams in China. Despite these constraints, a growing body of research (Dang…
Non-Regulatory Solutions to Cybersecurity Challenges

…research and development efforts to identify security weaknesses. Through methods of vulnerability research like penetration testing, Intel Security Group employs intrusion software to simulate network breaches. Another emerging leader in this area…