Technology shapes power.
Collaboration shapes solutions.
The Center for Security, Innovation and New Technology brings together scholars, practitioners, and students to address the security challenges of our digital age. Based at American University’s School of International Service, we explore the risks and opportunities of emerging technologies—from cyber conflict and spyware to disinformation and frontier innovations—combining technical insight with social science to inform policy, foster innovation, and advance a more secure future.

What We Do
Research
We conduct research on the opportunities and challenges of emerging and digital technologies, including the geopolitical and societal impacts of AI, quantum computing, and cyber threats.

Engagement
We engage policymakers, experts, and students to shape technology and security policy through events, publications, and hands-on training.

Community
We build diverse communities collaborating across sectors to advance innovative, policy-focused research on technology and global security.
Recent Publications
Supply-chain decoupling doesn’t stop rival nations from hacking each other and can make it worse. A cyber-espionage expert explains what does work.
Between 2010 and 2022, 80 countries enacted new legislation or amended existing laws in an attempt to curb the spread of misinformation online. This sharp and global adoption of misinformation laws, however, cannot be explained by the sudden emergence of false or misleading information, as these problems have existed for a very long time.
Insecure software is a national security risk, costs the U.S. billions of dollars annually, and exposes users’ information to malicious actors. Software developers (vendors) who fail to securely develop their products currently face few legal repercussions, even if they engage in industry-agreed bad practices.
In a given month, more than 100 million people open Pokémon Go—the app that allows users to superimpose the world’s most profitable media franchise onto reality using only their smartphone. Using their phone camera and a flick of the wrist, they captured tiny digital monsters at the park, at the office, sometimes in active minefields, and, yes, in the bathroom.
Who else was watching?
Cyber espionage is the use of cyber tools and techniques to gather intelligence or steal sensitive information from targeted entities. This form of espionage poses significant risks to national security, economic stability and corporate integrity. Given the complex and often hidden nature of cyber espionage activities, accurately measuring their costs presents a significant challenge.
In recent years, countries in the Sahel region of Africa have faced widespread insecurity and instability. Stretching across the northern tier of sub-Saharan Africa, Sahel countries Niger, Mali, and Burkina Faso have all experienced a series of military coups and rising levels of right-wing extremism.
While social media disinformation has received significant academic and policy attention, more consequential forms of intentional manipulation target the underlying digital infrastructures upon which society depends.
Disinformation spread via digital technologies is accelerating and exacerbating violence globally. There is an urgency to understand how coordinated disinformation campaigns rely on identity-based disinformation that weaponizes racism, sexism, and xenophobia to incite violence against individuals and marginalized communities, stifle social movements, and silence the press.
As cyber threats become increasingly central to international politics, state-sponsored cyber attacks have become an instrument of geopolitical leverage.
What impact do foreign authoritarian influence operations (FIOs) have on democracy? Through an examination of democratic attitudes in 15 African countries between 2009 and 2023, we present preliminary but compelling evidence that autocrats export authoritarianism.
For almost a decade, the study of misinformation has taken priority among policy circles, political elites, academic institutions, non-profit organizations, and the media.
The Mythical Beasts project addresses this meaningful gap in contemporary public analysis on spyware proliferation, pulling back the curtain on the connections between 435 entities across forty-two countries in the global spyware market. These vendors exist in a web of relationships with investors, holding companies, partners, and individuals often domiciled in different jurisdictions.
Upcoming Events
Social media and online games share a number of trust and safety issues, but the communities focused on those spaces are siloed and rarely interact. As a result, they miss out on valuable opportunities to learn from a comparable sector on key topics like pro-social design and safety by design and let opportunities to influence policy go unseized. This conference will bring together experts from civil society, the gaming industry, government, and academia to discuss trust and safety issues in online games, compare best practices, and exchange knowledge.
Profs and Pints DC presents: “State-Sponsored Cyber Espionage,” an examination of hackers as instruments of economic warfare, with William Akoto, assistant professor at American University’s School of International Service and leading expert on the political economy of cyber conflict.
Part of an ongoing project with the Center’s 'Technology, Security, and The Geopolitics of the Firm' initiative, this session follows up on our discussion of private sector costs with one focused on public sector costs. The roundtable will address the following questions: What types of costs do governments suffer from cyber espionage? Does reputational impact matter to states? What is the role of the state in protecting the private sector when the state is the ultimate target? And how do states interact with one another when dealing with cyber espionage?
In the News & Community
CSINT Director Dr. Bradshaw will be attending the American Political Science Association General Conference in Vancouver, Canada from September 11th - September 14th. If you’re in town, come join us for paper presentations on “the three faces of transnational repression” “the Wagner Groups social media messaging during military operations” and “relational power in quantum computing”
At the 2025 International Communication Association (ICA) Conference, CSINT Director, Dr. Samantha Bradshaw, presented her latest research examining the conditions under which social media companies comply with government requests to access user data.
The Technology Governance Policy Challenge is a two-day event for graduate students who compete to develop the best ideas in addressing longer-term governance challenges associated with new and emerging technology. Participating student teams draw inspiration from a real-world case study and present their proposals to a distinguished panel of judges comprising industry experts, government representatives, and faculty members.