Intelligence
CSIS scholars explain and interpret developments in the intelligence community and provide recommendations for how it can work more securely and efficiently to protect the U.S. homeland.
Photo: Maksym/Adobe Stock
How Open-Source, Real-Time Data Can Defeat China at the Edge of Its Influence
Commentary by Emily Harding — April 29, 2026
Section 702: Why Do We Need It?
Critical Questions by Emily Harding — April 24, 2026
Why Open-Source Intelligence Is a Powerful Weapon Against Fentanyl
Commentary by Julia Dickson, Christina Nordby, and Emily Harding — April 22, 2026
Closing the Local Knowledge Gap in U.S. Competition with China
Commentary by Emily Harding and Julia Dickson — April 15, 2026
Past Events
Photo: CSIS
Military Planning, Intelligence, and Algorithmic Warfare in the Iran Campaign
Photo: Kostiantyn Liberov/Libkos/Getty Images
Are Russia and Ukraine Headed to 2 Million Casualties?
China’s Campaign to Steal America’s Secrets: A Talk with David R. Shedd
Photo: Betty Laura Zapata/Bloomberg via Getty Images
China’s New London “Super Embassy”: Soft Power Hub or Security Risk?
One Million Casualties: Russia’s Losses on the Battlefield
Photo: Anna Moneymaker/Getty Images
Can Ukraine Survive Without U.S. Aid?
Photo: CSIS
Ukraine in the Balance: A Battlefield Update on the War in Ukraine
Photo: Damian Sobczyk/Adobe Stock
Fireside Chat with Andrew Shearer
Related Programs
Experts
All Intelligence Content
Filter by
A U.S. Campaign to Exploit Beijing’s Weaknesses
Brief by Nicholas Harrington — May 13, 2026
Is the United States Prepared for a War with China?
Brief by Seth G. Jones — May 12, 2026
The Geometry of Coercion: Tracking the PRC’s Maritime and Air Pressure on Taiwan
Report by Jose M. Macias III and Benjamin Jensen — May 5, 2026
“The Geometry of Coercion: Tracking the PRC’s Maritime and Air Pressure on Taiwan”: Audio Brief with Jose M. Macias III
Podcast Episode by Jose M. Macias III — May 5, 2026
How Open-Source, Real-Time Data Can Defeat China at the Edge of Its Influence
Commentary by Emily Harding — April 29, 2026
The Iranian Cyber Threat to U.S. Critical Infrastructure
Critical Questions by Nikita Shah — April 27, 2026
Closing the Local Knowledge Gap in U.S. Competition with China
Commentary by Emily Harding and Julia Dickson — April 15, 2026
Iran’s Next Move: How to Counter Tehran’s Multidomain Punishment Campaign
Commentary by Benjamin Jensen — March 23, 2026
Demystifying Iranian Cyber Operations in the U.S.-Iran Conflict
Commentary by Nikita Shah — March 20, 2026
Military Planning, Intelligence, and Algorithmic Warfare in the Iran Campaign
Event — March 17, 2026