Blockchain in China

…Ledger Technology: Beyond Blockchain,” 2016, https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/492972/gs-16-1-distributed-ledger-technology.pdf.    meaning that data are not deleted, but rather that a change is notated at the end of the chain. Each block is  “hashed” with…

The U.S.-China Strategic Rivalry and its Implications for Pakistan

…Foreign Policy at Brookings, Paper 14, March 2017, https://www.brookings.edu/wp-content/uploads/2017/03/acnpi_201703_strategic_chain.pdf. In addition to an escalating nuclear arms race in South Asia, U.S.-China tensions pose the added risk that Washington and Beijing…

Harnessing AI to Move from Threat to Threat Reduction

…In one experiment, well-meaning researchers repurposed MegaSyn, a generative AI tool for pharmaceutical R&D, and the system identified 40,000 toxic molecules, including nerve-agents, in under six hours. These models are…

Securing the Future: Building the US Nuclear Security Workforce Pipeline

…RAND Corporation, 2022): 4. https://www.rand.org/content/dam/rand/pubs/research_reports/RRA1200/RRA1227-1/RAND_RRA1227-1.pdf Some staff of the Nuclear Regulatory Commission (NRC) are also part of the U.S. government nuclear security workforce, although they were not a direct focus…

CORVI Risk Assessment: Tarawa, Kiribati

…facing a medium-high level of risk and while technical information is limited,33  Note: Iete Rouatu, et. al., “National Marine Ecosystem Valuation: Kiribati,” MACBIO, 2015, accessed April 29, 2022, https://macbio-pacific.info/wp-content/uploads/2017/08/Kiribati-MESV-Digital-LowRes.pdf.    much…

Disarmament, Demobilization and Reintegration Programming With Colombia’s Youth

…peace. New York,: International Peace Institute, 2019, 3. Accessed January 21, 2020. https://www.ipinst.org/wp-content/uploads/2019/04/Young-People-as-Drivers-of-Peace_YPS-and-Sustaining-Peace-roundtable-discussion-meeting-note.pdf.  42 Footnote: United Nations. Security Council. Resolution 2419. S/res/2419. June 6, 2015. Accessed January 26, 2020. https://www.securitycouncilreport.org/atf/cf/%7B65BFCF9B-6D27-4E9C-8CD3-CF6E4FF96FF9%7D/s_res_2419.pdf….