Skip to content
The Cross Border Report

The Cross Border Report

The Cross Border Report
The Cross Border Report
  • How U.S.-China Trade Tensions Ripple Through Global Markets
    Global Markets

    How U.S.-China Trade Tensions Ripple Through Global Markets

    ByAlek Cesareo Lopez October 6, 2025October 8, 2025

    U.S.-China trade makes up a substantial portion of each country’s international transactions. In2024, China was the fourth-largest goods trading partner of the U.S., bringing in upwards of$582.5 billion in total trade and making it a central driver of economic activity for both nations.China is a key player for American exports, providing the U.S. with markets…

    Read More How U.S.-China Trade Tensions Ripple Through Global MarketsContinue

  • The Weaponization of Global Financial Infrastructure: SWIFT as a Tool of Economic Warfare
    Sanctions

    The Weaponization of Global Financial Infrastructure: SWIFT as a Tool of Economic Warfare

    ByBradley Gullett September 25, 2025October 2, 2025

    Sanctions are an increasingly common tool being used to apply pressure and punishment to bad actors and adversaries on the global stage. Disconnecting financial institutions from SWIFT is a relatively new lever for conducting economic warfare. First, what is SWIFT, and what role does it play in the global financial system? What is SWIFT? SWIFT…

    Read More The Weaponization of Global Financial Infrastructure: SWIFT as a Tool of Economic WarfareContinue

  • Can Stablecoins Improve Cross-Border Payments?
    Money Movement

    Can Stablecoins Improve Cross-Border Payments?

    ByBradley Gullett July 31, 2025July 31, 2025

    If the wildly successful IPO of Circle Internet Group (CRCL) and the passage of the GENIUS Act are any indication of the relevance of crypto and digital assets in today’s economy, the back half of the decade could see a revolutionary level of adoption. But how integral will stablecoins be when it comes to everyday…

    Read More Can Stablecoins Improve Cross-Border Payments?Continue

  • How Dual Exchange Rate Systems Create Global Security Vulnerabilities
    Illicit Finance

    How Dual Exchange Rate Systems Create Global Security Vulnerabilities

    ByBradley Gullett June 13, 2025June 13, 2025

    The Wall Street Journal recently reported that Iraq had become a hotbed for financial exploitation by Iranian-backed Iraqi militias¹. The scheme resembled the following series of steps: Essentially, financial arbitrage was conducted against a system with more than one exchange rate. For context, when governments try to protect official reserves by restricting access to foreign…

    Read More How Dual Exchange Rate Systems Create Global Security VulnerabilitiesContinue

  • Introducing The Cross Border Report: A New Voice on Finance & Geopolitical Risk
    Introduction

    Introducing The Cross Border Report: A New Voice on Finance & Geopolitical Risk

    ByBradley Gullett May 21, 2025May 22, 2025

    Soon after starting my first full-time job as an anti-money laundering analyst for a broker-dealer, I realized I might have stumbled onto something profound. I had just completed an internship at a D.C. think tank researching and writing on topics in national security and was eager to gain some additional experience before going back to…

    Read More Introducing The Cross Border Report: A New Voice on Finance & Geopolitical RiskContinue

The Cross Border Report © 2025

The Cross Border Report
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
  • Sample Page