AI in the Age of Fake (Imagined) Content

Editor’s Note: This paper is part of a research project, “Countering AI Disinformation and Implications for the US-ROK Alliance,” conducted by the Stimson Center’s Korea Program and generously sponsored by…

Non-Regulatory Solutions to Cybersecurity Challenges

research and development efforts to identify security weaknesses. Through methods of vulnerability research like penetration testing, Intel Security Group employs intrusion software to simulate network breaches. Another emerging leader in this area…

Time to Consider a Trilateral Asian ABM Treaty

…2001), https://www.stimson.org/images/uploads/research-pdfs/SABMDBasrur.pdf. See also Ashley Tellis, “The Evolution of U.S.-Indian Ties: Missile Defense in an Emerging Strategic Relationship,” International Security 30, no. 4 (2006): 113-151. [13] “Pakistan Conducts Successful Test…

Closing the Governance Gap in Climate, Security, and Peacebuilding

…Susanne. Addressing the Risks of Climate Change. What Role for the UN Security Council? Berlin: Stiftung Wissenschaft und Politik, 2020. Accessed July 28, 2020. https://www.swp-berlin.org/fileadmin/contents/products/research_papers/2020RP06_UNSC_Climate.pdf. At the Security Council, Angola…

Red Cell: The Chimera of Technological Superiority

…thus levels the playing field and shifts development to commercial markets. Today, private U.S. companies, such as Google, SpaceX, Amazon, and OpenAI, spend more on the research and development of…

North Africa Weekly: September 24, 2025

…Hear directly from experts, regional voices, and thought leaders shaping North Africa’s future. Google’s Managing Director for Africa on Digital Transformation Google announced four new African hubs to connect subsea…

AI Race: The Promise and Perils of Techno-Utopians

…of engineered consensus, where politics and consent of the governed disappear alongside human agency. No wonder some in the industry, like Google CEO Sundar Pichai, support integrating social scientists, philosophers,…