Research Report Yasmeen Z Research Report Yasmeen Z

RedNote: A Threat Assessment

RedNote, a short-form video and augmented reality platform better known in Mandarin as xiaohongshu, or “little red book,” has rapidly gained traction in recent years as an alternative to the video blogging service TikTok, especially among younger users drawn to its immersive alternate reality features and tailored content feeds. Like TikTok, RedNote offers algorithmically driven entertainment; however, its underlying infrastructure and legal obligations differ in critical ways. While TikTok has faced scrutiny over its Chinese parent company, ByteDance, and its opaque data practices, RedNote is even more closely aligned with the People’s Republic of China’s (PRC) surveillance architecture. Promoted as a creative social app, RedNote conforms to PRC policy of surveillance-by-design, requiring extensive data extraction, non-transparent content moderation, and legally mandated state access to user information. This closer look examines how RedNote operates within—and extends—the global reach of China’s digital governance model.

The author, Christian Ryan, is an open-source national security researcher and a Research Fellow at Trefoil Strategies Ltd., a Pittsburgh-based risk consultancy.

Read More
Research Report James E Research Report James E

Arming Our Adversaries: The Inadequacy of US Chip Controls

US and allied export controls are failing to stop critical microelectronics from reaching sanctioned adversaries like Russia and Iran. Weak supply chain oversight, inconsistent due diligence, and industry resistance to stricter controls have enabled a global gray market for these components, undermining national security and costing American lives.

This paper analyzes the widespread availability of US components used in Russian unmanned aerial vehicles (UAVs), and specifically:

  • documents the methodology used to track critical components and their
    distribution channels;

  • presents four detailed findings that reveal significant vulnerabilities in the semiconductor supply chain and distribution networks; and

  • offers five practical recommendations for government and industry to help disrupt the flow of US technology to adversary states.

Read More