Content

Report

Sep 9, 2024

Sharing the post carbon economy means building a resilient EV supply chain

By Sarah Bauerle Danzman

In this report Sarah Bauerle Danzman advances the policy discussion by compiling trade, investment, and EV industrial policy data across the G20, and offers six recommendations to the G20 to build a resilient EV supply chain.

Brazil China

Report

Sep 5, 2024

Supporting credible elections to advance democracy globally in 2024 and beyond

By Katherine Ellena, Mario Mitre, and Patrick Quirk

The US and its allies support free and fair elections to strengthen democracy, ensuring global stability and security. This paper explores how US foreign aid for elections is a wise investment, highlighting priority elections in 2024 and 2025 where focused assistance can uphold democratic values and foster citizens' trust in the democratic process.

Africa Elections

Report

Sep 5, 2024

China’s Middle East policy shift from “hedging” to “wedging”

By Jonathan Fulton, Michael Schuman

Beijing's diplomacy on the Gaza crisis has been unusually active, and gradually, the intentions behind China's intervention have become clear. Beijing's response demonstrates a changing approach to the region, one intended to leverage Beijing's influence to upset American policy and promote its own vision for the international order.

China Economy & Business

Report

Sep 4, 2024

Mythical Beasts and where to find them: Mapping the global spyware market and its threats to national security and human rights

By Jen Roberts, Trey Herr, Nitansha Bansal, and Nancy Messieh, with Emma Taylor, Jean Le Roux, and Sopo Gelava

The Mythical Beasts project pulls back the curtain on the connections between 435 entities across forty-two countries in the global spyware market.

Cybersecurity

Conflict, Risk, and Tech

Sep 4, 2024

Mythical Beasts and where to find them: Data and methodology

By Jen Roberts, Trey Herr, Nitansha Bansal, and Nancy Messieh, with Emma Taylor, Jean Le Roux, and Sopo Gelava

Learn more about the methodology and dataset behind Mythical Beasts and where to find them: Mapping the global spyware market and its threats to national security and human rights

Cybersecurity

Report

Sep 4, 2024

Mythical Beasts and where to find them

By Jen Roberts, Trey Herr, Nitansha Bansal, and Nancy Messieh, with Emma Taylor, Jean Le Roux, and Sopo Gelava

Mythical Beasts and Where to Find Them: Mapping the Global Spyware Market and its Threats to National Security and Human Rights is concerned with the commercial market for spyware and provides data on market participants.

Cybersecurity

Report

Sep 4, 2024

Forging the 5G future: Strategic imperatives for the US and its allies

By Ngor Luong

5G technology is a critical pillar of U.S. national security, economic prosperity, and geopolitical influence in the twenty-first century.

China Technology & Innovation

Issue Brief

Aug 30, 2024

South Asia’s political parties need internal reforms to revitalize regional democracy

By Steve Cima, Geoffrey MacDonald, James Storen

This paper is the third in the Freedom and Prosperity Center's "State of the Parties" series analyzing the strength of multi-party systems in different regions of the world.

Democratic Transitions Elections

Issue Brief

Aug 30, 2024

Unloved but indispensable: Political parties in Europe

By Paul McCarthy, Thibault Muzergues, Patrick Quirk

The experience of the past decade has shown that despite their unpopularity, political parties remain indispensable for the functioning of democracies in Europe—when they are present, plural, and organized, democracy is doing well. To prove this assertion, this paper will look at four telling examples in recent European history.

Democratic Transitions Elections

Issue Brief

Aug 19, 2024

AI in cyber and software security:  What’s driving opportunities and risks?

By Maia Hamin, Jennifer Lin, Trey Herr

This issue brief discusses the drivers of evolving risks and opportunities presented by generative artificial intelligence (GAI), particularly in cybersecurity, while acknowledging the broader implications for policymakers and for national security.

Artificial Intelligence Cybersecurity