<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <atom:link href="https://feeds.megaphone.fm/FGP5617743572" rel="self" type="application/rss+xml"/>
    <title>Strength in Numbers</title>
    <language>en</language>
    <copyright></copyright>
    <description>Introducing Strength in Numbers, a podcast that looks at how artificial intelligence and emerging technologies are shaping national security. In each episode, we’ll look at the critical materials powering these trends and how this technology is being used on the battlefield and ask key policymakers and experts how to use these tools to make sure the United States stays competitive against potential adversaries.

Strength in Numbers is a show from the University of Virginia’s National Security Data and Policy Institute, produced by FP Studios.</description>
    <image>
      <url>https://megaphone.imgix.net/podcasts/a38054b0-013d-11f1-ba34-375a6577ebab/image/890eabbe2fc33f3aed0dc630a908683b.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress</url>
      <title>Strength in Numbers</title>
    </image>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle></itunes:subtitle>
    <itunes:author>Foreign Policy</itunes:author>
    <itunes:summary>Introducing Strength in Numbers, a podcast that looks at how artificial intelligence and emerging technologies are shaping national security. In each episode, we’ll look at the critical materials powering these trends and how this technology is being used on the battlefield and ask key policymakers and experts how to use these tools to make sure the United States stays competitive against potential adversaries.

Strength in Numbers is a show from the University of Virginia’s National Security Data and Policy Institute, produced by FP Studios.</itunes:summary>
    <content:encoded>
      <![CDATA[<p>Introducing <em>Strength in Numbers</em>, a podcast that looks at how artificial intelligence and emerging technologies are shaping national security. In each episode, we’ll look at the critical materials powering these trends and how this technology is being used on the battlefield and ask key policymakers and experts how to use these tools to make sure the United States stays competitive against potential adversaries.<br></p>
<p><em>Strength in Numbers</em> is a show from the University of Virginia’s <a href="https://nationalsecurity.virginia.edu/"><u>National Security Data and Policy Institute</u></a>, produced by FP Studios.</p>]]>
    </content:encoded>
    <itunes:owner>
      <itunes:name>FP Studios</itunes:name>
      <itunes:email>podcasts@foreignpolicy.com</itunes:email>
    </itunes:owner>
    <itunes:image href="https://megaphone.imgix.net/podcasts/a38054b0-013d-11f1-ba34-375a6577ebab/image/890eabbe2fc33f3aed0dc630a908683b.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
    <itunes:category text="Government">
    </itunes:category>
    <itunes:category text="News">
      <itunes:category text="Tech News"/>
      <itunes:category text="Politics"/>
    </itunes:category>
    <item>
      <title>Strength in Numbers Live: Industrial Policy and the AI Arms Race</title>
      <description>Strength in Numbers continues its conversation from the National Security Data and Policy Institute’s (NSDPI) annual conference by analyzing how the United States’ and China’s distinct industrial policies are shaping the AI arms race. How are the decision-making and regulatory styles of these two countries shaping this technological competition?

Host Jennifer Strong was joined on stage by panelists Philip Potter, Neil Wiley, and Lukas Filler. Potter is NSDPI’s executive director, Wiley is a former U.S. intelligence officer, and Filler is an NSDPI senior fellow and China analyst.

Additional reading:


  
The Chinese Communist Party’s Layered Artificial Intelligence Strategy



  
Artificial Intelligence Knowledge Supply Chain — National Security Data and Policy Institute



  
Breaking Defense Interviews Dr. Potter on the Future of AI Competition — National Security Data and Policy Institute</description>
      <pubDate>Wed, 01 Apr 2026 10:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Foreign Policy</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Strength in Numbers continues its conversation from the National Security Data and Policy Institute’s (NSDPI) annual conference by analyzing how the United States’ and China’s distinct industrial policies are shaping the AI arms race. How are the decision-making and regulatory styles of these two countries shaping this technological competition?

Host Jennifer Strong was joined on stage by panelists Philip Potter, Neil Wiley, and Lukas Filler. Potter is NSDPI’s executive director, Wiley is a former U.S. intelligence officer, and Filler is an NSDPI senior fellow and China analyst.

Additional reading:


  
The Chinese Communist Party’s Layered Artificial Intelligence Strategy



  
Artificial Intelligence Knowledge Supply Chain — National Security Data and Policy Institute



  
Breaking Defense Interviews Dr. Potter on the Future of AI Competition — National Security Data and Policy Institute</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em>Strength in Numbers</em> continues its conversation from the National Security Data and Policy Institute’s (NSDPI) annual conference by analyzing how the United States’ and China’s distinct industrial policies are shaping the AI arms race. How are the decision-making and regulatory styles of these two countries shaping this technological competition?</p>
<p>Host Jennifer Strong was joined on stage by panelists Philip Potter, Neil Wiley, and Lukas Filler. Potter is NSDPI’s executive director, Wiley is a former U.S. intelligence officer, and Filler is an NSDPI senior fellow and China analyst.</p>
<p>Additional reading:</p>
<ul>
  <li>
<p><a href="https://nationalsecurity.virginia.edu/research/chinese-communist-partys-layered-artificial-intelligence-strategy"><u>The Chinese Communist Party’s Layered Artificial Intelligence Strategy</u></a></p>
</li>
  <li>
<p><a href="https://nationalsecurity.virginia.edu/research/artificial-intelligence-knowledge-supply-chain"><u>Artificial Intelligence Knowledge Supply Chain — National Security Data and Policy Institute</u></a></p>
</li>
  <li>
<p><a href="https://nationalsecurity.virginia.edu/news/breaking-defense-interviews-dr-potter-future-ai-competition"><u>Breaking Defense Interviews Dr. Potter on the Future of AI Competition — National Security Data and Policy Institute</u></a><br></p>
</li>
</ul>]]>
      </content:encoded>
      <itunes:duration>2374</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b8936fa0-2d3d-11f1-832a-cb61be1be4fc]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FGP8791209426.mp3?updated=1777295183" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Strength in Numbers Live: U.S.-China Competition</title>
      <description>Strength in Numbers was recently recorded live at the annual conference of the National Security Data and Policy Institute (NSDPI). The conference hosted discussions on several of the topics we’ve covered this season—critical minerals, supply chains, the AI arms race with China—and we wanted to bring a flavor of those conversations directly to you.

Host Jennifer Strong was joined on stage by panelists Philip Potter, Neil Wiley, and Lukas Filler. Potter is NSDPI’s executive director, Wiley is a former U.S. intelligence officer, and Filler is an NSDPI senior fellow and China analyst.

Additional reading:

China’s AI/ML Data Environment

The Social Foundations of China’s Artificial Intelligence Policies</description>
      <pubDate>Wed, 25 Mar 2026 20:59:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Foreign Policy</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Strength in Numbers was recently recorded live at the annual conference of the National Security Data and Policy Institute (NSDPI). The conference hosted discussions on several of the topics we’ve covered this season—critical minerals, supply chains, the AI arms race with China—and we wanted to bring a flavor of those conversations directly to you.

Host Jennifer Strong was joined on stage by panelists Philip Potter, Neil Wiley, and Lukas Filler. Potter is NSDPI’s executive director, Wiley is a former U.S. intelligence officer, and Filler is an NSDPI senior fellow and China analyst.

Additional reading:

China’s AI/ML Data Environment

The Social Foundations of China’s Artificial Intelligence Policies</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em>Strength in Numbers</em> was recently recorded live at the annual conference of the National Security Data and Policy Institute (NSDPI). The conference hosted discussions on several of the topics we’ve covered this season—critical minerals, supply chains, the AI arms race with China—and we wanted to bring a flavor of those conversations directly to you.</p>
<p>Host Jennifer Strong was joined on stage by panelists Philip Potter, Neil Wiley, and Lukas Filler. Potter is NSDPI’s executive director, Wiley is a former U.S. intelligence officer, and Filler is an NSDPI senior fellow and China analyst.</p>
<p>Additional reading:</p>
<p><a href="https://nationalsecurity.virginia.edu/research/chinas-aiml-data-environment"><u>China’s AI/ML Data Environment</u></a></p>
<p><a href="https://nationalsecurity.virginia.edu/research/social-foundations-chinas-artificial-intelligence-policies"><u>The Social Foundations of China’s Artificial Intelligence Policies</u></a><br></p>]]>
      </content:encoded>
      <itunes:duration>2447</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[81199cde-288d-11f1-be16-f7a321eba5d5]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FGP1172528827.mp3?updated=1777295035" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Who’s winning the AI race?</title>
      <description>Is the United States in an artificial intelligence arms race with China? How are policymakers assessing possible economic and national security threats? How should China be understood as a potential peer competitor? And who’s likely to win?

China experts Dean Cheng and Lukas Filler join Strength in Numbers to discuss. Cheng is formerly of the Heritage Foundation and the author of Cyber Dragon: Inside China’s Information Warfare and Cyber Operations. And Filler is a national security strategist at the National Security Data and Policy Institute.

Additional reading:

Deeper Questions Raised by DeepSeek

DeepSeek’s Achievements and the Implications for Policy

China’s AI/ML Data Environment</description>
      <pubDate>Wed, 18 Mar 2026 16:14:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Foreign Policy</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Is the United States in an artificial intelligence arms race with China? How are policymakers assessing possible economic and national security threats? How should China be understood as a potential peer competitor? And who’s likely to win?

China experts Dean Cheng and Lukas Filler join Strength in Numbers to discuss. Cheng is formerly of the Heritage Foundation and the author of Cyber Dragon: Inside China’s Information Warfare and Cyber Operations. And Filler is a national security strategist at the National Security Data and Policy Institute.

Additional reading:

Deeper Questions Raised by DeepSeek

DeepSeek’s Achievements and the Implications for Policy

China’s AI/ML Data Environment</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Is the United States in an artificial intelligence arms race with China? How are policymakers assessing possible economic and national security threats? How should China be understood as a potential peer competitor? And who’s likely to win?</p>
<p>China experts Dean Cheng and Lukas Filler join <em>Strength in Numbers</em> to discuss. Cheng is formerly of the Heritage Foundation and the author of <em>Cyber Dragon: Inside China’s Information Warfare and Cyber Operations</em>. And Filler is a national security strategist at the National Security Data and Policy Institute.</p>
<p>Additional reading:</p>
<p><a href="https://nationalsecurity.virginia.edu/research/deeper-questions-raised-deepseek"><u>Deeper Questions Raised by DeepSeek</u></a></p>
<p><a href="https://nationalsecurity.virginia.edu/research/deepseeks-achievements-and-implications-policy"><u>DeepSeek’s Achievements and the Implications for Policy</u></a></p>
<p><a href="https://nationalsecurity.virginia.edu/research/chinas-aiml-data-environment"><u>China’s AI/ML Data Environment</u></a><br></p>]]>
      </content:encoded>
      <itunes:duration>1457</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[865d1d90-22e5-11f1-9b67-3b18727a3fad]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FGP2897036513.mp3?updated=1777295044" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How Europe Is Seeing the Rise of AI</title>
      <description>Much has been said about the United States and China’s approach to artificial intelligence, but another key player in the AI race is Europe. How are its regulators, political leaders, and industry approaching this new technology? Gabriele Mazzini, the lead architect on the EU’s landmark AI Act , joins host Jennifer Strong to discuss how this landmark legislation was brought into being—and what could now change.

The episode also features University of Virginia School of Law’s Vice Dean Ashley Deeks to discuss how AI and emerging technologies are being used for defense and what guardrails should be in place.

Additional reading:

Artificial Intelligence Knowledge Supply Chain

Tracking Advances in Multimodal AI for Time Series Analysis

DeepSeek’s Achievements and the Implications for Policy</description>
      <pubDate>Wed, 11 Mar 2026 11:48:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Foreign Policy</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Much has been said about the United States and China’s approach to artificial intelligence, but another key player in the AI race is Europe. How are its regulators, political leaders, and industry approaching this new technology? Gabriele Mazzini, the lead architect on the EU’s landmark AI Act , joins host Jennifer Strong to discuss how this landmark legislation was brought into being—and what could now change.

The episode also features University of Virginia School of Law’s Vice Dean Ashley Deeks to discuss how AI and emerging technologies are being used for defense and what guardrails should be in place.

Additional reading:

Artificial Intelligence Knowledge Supply Chain

Tracking Advances in Multimodal AI for Time Series Analysis

DeepSeek’s Achievements and the Implications for Policy</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Much has been said about the United States and China’s approach to artificial intelligence, but another key player in the AI race is Europe. How are its regulators, political leaders, and industry approaching this new technology? Gabriele Mazzini, the lead architect on the EU’s landmark AI Act , joins host Jennifer Strong to discuss how this landmark legislation was brought into being—and what could now change.</p>
<p>The episode also features University of Virginia School of Law’s Vice Dean Ashley Deeks to discuss how AI and emerging technologies are being used for defense and what guardrails should be in place.</p>
<p>Additional reading:</p>
<p><a href="https://nationalsecurity.virginia.edu/research/artificial-intelligence-knowledge-supply-chain"><u>Artificial Intelligence Knowledge Supply Chain</u></a></p>
<p><a href="https://nationalsecurity.virginia.edu/research/tracking-advances-multimodal-ai-time-series-analysis"><u>Tracking Advances in Multimodal AI for Time Series Analysis</u></a></p>
<p><a href="https://nationalsecurity.virginia.edu/research/deepseeks-achievements-and-implications-policy"><u>DeepSeek’s Achievements and the Implications for Policy</u></a><br></p>]]>
      </content:encoded>
      <itunes:duration>1442</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[492bfc70-1d40-11f1-a36c-63ea35eabeca]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FGP6696234732.mp3?updated=1777295052" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Protecting the Homeland</title>
      <description>​​How are policymakers assessing future security challenges and what is being done to mitigate those threats? George Foresman, a senior advisor at the National Security Data and Policy Institute (NSDPI), shares his experience as the first undersecretary of preparedness at the U.S. Department of Homeland Security with host Jennifer Strong.

Former Deputy National Security Advisor Anne Neuberger also joins the series to recount how the U.S. government responded to the most ambitious cybercrime to date: Salt Typhoon.

Finally, NSDPI’s research associate Nathan Timbs shares how open-source data is helping to track illicit networks and bring them into the open. 

Additional reading: Precursors, Ports, and Pills: Inside the China-Mexico-U.S. Fentanyl Supply Chain</description>
      <pubDate>Wed, 04 Mar 2026 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>4</itunes:episode>
      <itunes:author>Foreign Policy</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>​​How are policymakers assessing future security challenges and what is being done to mitigate those threats? George Foresman, a senior advisor at the National Security Data and Policy Institute (NSDPI), shares his experience as the first undersecretary of preparedness at the U.S. Department of Homeland Security with host Jennifer Strong.

Former Deputy National Security Advisor Anne Neuberger also joins the series to recount how the U.S. government responded to the most ambitious cybercrime to date: Salt Typhoon.

Finally, NSDPI’s research associate Nathan Timbs shares how open-source data is helping to track illicit networks and bring them into the open. 

Additional reading: Precursors, Ports, and Pills: Inside the China-Mexico-U.S. Fentanyl Supply Chain</itunes:summary>
      <content:encoded>
        <![CDATA[<p>​​How are policymakers assessing future security challenges and what is being done to mitigate those threats? <strong>George Foresman</strong>, a senior advisor at the National Security Data and Policy Institute (NSDPI), shares his experience as the first undersecretary of preparedness at the U.S. Department of Homeland Security with host Jennifer Strong.</p>
<p>Former Deputy National Security Advisor <strong>Anne Neuberger </strong>also joins the series to recount how the U.S. government responded to the most ambitious cybercrime to date: Salt Typhoon.</p>
<p>Finally, NSDPI’s research associate <strong>Nathan Timbs</strong> shares how open-source data is helping to track illicit networks and bring them into the open. </p>
<p>Additional reading:<a href="https://nationalsecurity.virginia.edu/research/precursors-ports-and-pills-inside-china-mexico-us-fentanyl-supply-chain"> <u>Precursors, Ports, and Pills: Inside the China-Mexico-U.S. Fentanyl Supply Chain</u></a></p>]]>
      </content:encoded>
      <itunes:duration>1740</itunes:duration>
      <guid isPermaLink="false"><![CDATA[9b07e018-1737-11f1-99aa-67d2057d9a10]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FGP1557567944.mp3?updated=1777295085" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Can the U.S. Build What It Needs?</title>
      <description>U.S. Sens. Mark Warner and Jack Reed join Strength in Numbers to share their assessments of the defense industrial base. Does the United States have access to the tools and materials needed to be secure? How is the country adapting to technological changes on the battlefield? And is the United States going to be able to outbuild competitors—or is it simply too late? 

Additional reading:

Chinese Investment in Mineral Resources — National Security Data and Policy Institute

Building a Glass Fortress: China’s Delicate Trade Dominance in Critical Materials — National Security Data and Policy Institute

NSDPI Co-Launches the 2026 Data-to-Impact Challenge — National Security Data and Policy Institute</description>
      <pubDate>Wed, 25 Feb 2026 12:03:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Foreign Policy</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>U.S. Sens. Mark Warner and Jack Reed join Strength in Numbers to share their assessments of the defense industrial base. Does the United States have access to the tools and materials needed to be secure? How is the country adapting to technological changes on the battlefield? And is the United States going to be able to outbuild competitors—or is it simply too late? 

Additional reading:

Chinese Investment in Mineral Resources — National Security Data and Policy Institute

Building a Glass Fortress: China’s Delicate Trade Dominance in Critical Materials — National Security Data and Policy Institute

NSDPI Co-Launches the 2026 Data-to-Impact Challenge — National Security Data and Policy Institute</itunes:summary>
      <content:encoded>
        <![CDATA[<p>U.S. Sens. Mark Warner and Jack Reed join <em>Strength in Numbers</em> to share their assessments of the defense industrial base. Does the United States have access to the tools and materials needed to be secure? How is the country adapting to technological changes on the battlefield? And is the United States going to be able to outbuild competitors—or is it simply too late? </p>
<p>Additional reading:</p>
<p><a href="https://nationalsecurity.virginia.edu/research/chinese-investment-mineral-resources"><u>Chinese Investment in Mineral Resources — National Security Data and Policy Institute</u></a></p>
<p><a href="https://nationalsecurity.virginia.edu/research/building-glass-fortress-chinas-delicate-trade-dominance-critical-materials"><u>Building a Glass Fortress: China’s Delicate Trade Dominance in Critical Materials — National Security Data and Policy Institute</u></a></p>
<p><a href="https://nationalsecurity.virginia.edu/news/nsdpi-co-launches-2026-data-impact-challenge"><u>NSDPI Co-Launches the 2026 Data-to-Impact Challenge — National Security Data and Policy Institute</u></a><br></p>]]>
      </content:encoded>
      <itunes:duration>1411</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b263b024-1242-11f1-8ed9-6f0cf42e5030]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FGP6489878502.mp3?updated=1777295095" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Critical Minerals, Supply Chains, and Control</title>
      <description>Evan Smith, CEO and co-founder of Altana, joins host Jennifer Strong to assess the state of critical mineral supply chains today. Who controls the materials? Why is such a vital part of national security controlled by an economic adversary? And, more importantly, what can be done to regain control of this important resource?

Margaret Foster, a data scientist and scholar at the University of Virginia, then joins the podcast to share how she uses data and artificial intelligence to identify and mitigate potential supply chain chokepoints. 

Additional reading:

Microelectronics Supply Chain Analysis — National Security Data and Policy Institute

 Microelectronics Supply Chain Analysis: Critical Components — National Security Data and Policy Institute

Microelectronics Supply Chain Analysis: Vulnerability — National Security Data and Policy Institute

Microelectronics Supply Chain Analysis: Lock-In and Substitutability — National Security Data and Policy Institute</description>
      <pubDate>Wed, 18 Feb 2026 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Foreign Policy</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Evan Smith, CEO and co-founder of Altana, joins host Jennifer Strong to assess the state of critical mineral supply chains today. Who controls the materials? Why is such a vital part of national security controlled by an economic adversary? And, more importantly, what can be done to regain control of this important resource?

Margaret Foster, a data scientist and scholar at the University of Virginia, then joins the podcast to share how she uses data and artificial intelligence to identify and mitigate potential supply chain chokepoints. 

Additional reading:

Microelectronics Supply Chain Analysis — National Security Data and Policy Institute

 Microelectronics Supply Chain Analysis: Critical Components — National Security Data and Policy Institute

Microelectronics Supply Chain Analysis: Vulnerability — National Security Data and Policy Institute

Microelectronics Supply Chain Analysis: Lock-In and Substitutability — National Security Data and Policy Institute</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Evan Smith, CEO and co-founder of Altana, joins host Jennifer Strong to assess the state of critical mineral supply chains today. Who controls the materials? Why is such a vital part of national security controlled by an economic adversary? And, more importantly, what can be done to regain control of this important resource?</p>
<p>Margaret Foster, a data scientist and scholar at the University of Virginia, then joins the podcast to share how she uses data and artificial intelligence to identify and mitigate potential supply chain chokepoints. </p>
<p>Additional reading:</p>
<p><a href="https://nationalsecurity.virginia.edu/research/microelectronics-supply-chain-analysis"><u>Microelectronics Supply Chain Analysis — National Security Data and Policy Institute</u></a></p>
<p><a href="https://nationalsecurity.virginia.edu/research/microelectronics-supply-chain-analysis-critical-components"> <u>Microelectronics Supply Chain Analysis: Critical Components — National Security Data and Policy Institute</u></a></p>
<p><a href="https://nationalsecurity.virginia.edu/research/microelectronics-supply-chain-analysis-vulnerability"><u>Microelectronics Supply Chain Analysis: Vulnerability — National Security Data and Policy Institute</u></a></p>
<p><a href="https://nationalsecurity.virginia.edu/research/microelectronics-supply-chain-analysis-lock-and-substitutability"><u>Microelectronics Supply Chain Analysis: Lock-In and Substitutability — National Security Data and Policy Institute</u></a><br></p>]]>
      </content:encoded>
      <itunes:duration>1689</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8bbf9d98-0c57-11f1-8b9c-1f05fc74ba15]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FGP8002132843.mp3?updated=1777295121" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Emerging Technologies and a New Era of Strategic Anxiety</title>
      <description>How is artificial intelligence shaping the big questions in national security today? Host Jennifer Strong is joined first by Zack Kass, former head of Go To Market at OpenAI, to hear his take on how this new technology is nothing short of “revolutionary.” Then the National Security Data and Policy Institute’s executive director, Phil Potter, shares how AI is quickening the pace of change and driving current national security concerns.

Additional reading:

Artificial Intelligence Knowledge Supply Chain — National Security Data and Policy Institute

The Social Foundations of China’s Artificial Intelligence Policies — National Security Data and Policy Institute</description>
      <pubDate>Wed, 11 Feb 2026 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Foreign Policy</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>How is artificial intelligence shaping the big questions in national security today? Host Jennifer Strong is joined first by Zack Kass, former head of Go To Market at OpenAI, to hear his take on how this new technology is nothing short of “revolutionary.” Then the National Security Data and Policy Institute’s executive director, Phil Potter, shares how AI is quickening the pace of change and driving current national security concerns.

Additional reading:

Artificial Intelligence Knowledge Supply Chain — National Security Data and Policy Institute

The Social Foundations of China’s Artificial Intelligence Policies — National Security Data and Policy Institute</itunes:summary>
      <content:encoded>
        <![CDATA[<p>How is artificial intelligence shaping the big questions in national security today? Host Jennifer Strong is joined first by Zack Kass, former head of Go To Market at OpenAI, to hear his take on how this new technology is nothing short of “revolutionary.” Then the National Security Data and Policy Institute’s executive director, Phil Potter, shares how AI is quickening the pace of change and driving current national security concerns.</p>
<p>Additional reading:</p>
<p><a href="https://nationalsecurity.virginia.edu/research/artificial-intelligence-knowledge-supply-chain"><u>Artificial Intelligence Knowledge Supply Chain — National Security Data and Policy Institute</u></a></p>
<p><a href="https://nationalsecurity.virginia.edu/research/social-foundations-chinas-artificial-intelligence-policies"><u>The Social Foundations of China’s Artificial Intelligence Policies — National Security Data and Policy Institute</u></a><br></p>]]>
      </content:encoded>
      <itunes:duration>2225</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7a62b88e-06ce-11f1-ab76-8bc9c476abad]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FGP5816847219.mp3?updated=1777295128" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Coming Soon—Strength in Numbers</title>
      <description>Coming soon: Strength in Numbers. A show from the University of Virginia’s National Security Data and Policy Institute, produced by FP Studios. How are artificial intelligence and other emerging technologies shaping national security? In each episode, we’ll look at the critical materials powering these trends and how this technology is being used on the battlefield and ask key policymakers and experts how to use these tools to make sure the United States stays competitive against potential adversaries.</description>
      <pubDate>Wed, 04 Feb 2026 11:00:00 -0000</pubDate>
      <itunes:episodeType>trailer</itunes:episodeType>
      <itunes:author>Foreign Policy</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Coming soon: Strength in Numbers. A show from the University of Virginia’s National Security Data and Policy Institute, produced by FP Studios. How are artificial intelligence and other emerging technologies shaping national security? In each episode, we’ll look at the critical materials powering these trends and how this technology is being used on the battlefield and ask key policymakers and experts how to use these tools to make sure the United States stays competitive against potential adversaries.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Coming soon: <em>Strength in Numbers</em>. A show from the University of Virginia’s <a href="https://nationalsecurity.virginia.edu/"><u>National Security Data and Policy Institute</u></a>, produced by FP Studios. How are artificial intelligence and other emerging technologies shaping national security? In each episode, we’ll look at the critical materials powering these trends and how this technology is being used on the battlefield and ask key policymakers and experts how to use these tools to make sure the United States stays competitive against potential adversaries.</p>]]>
      </content:encoded>
      <itunes:duration>162</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d8b67894-013d-11f1-aa13-ef7c3bae66dd]]></guid>
      <enclosure url="https://traffic.megaphone.fm/FGP8183649746.mp3" length="0" type="audio/mpeg"/>
    </item>
  </channel>
</rss>
