Publications

  • September 18, 2014
  • Richard Fontaine
  • Policy Briefs

Bringing Liberty Online: Reenergizing the Internet Freedom Agenda in a Post-Snowden Era

CNAS President Richard Fontaine argues that, despite the many complications arising from the Snowden disclosures, America still needs a comprehensive Internet freedom strategy.

Read More
  • September 18, 2014
  • Dafna Rand
  • Congressional Testimony

Dr. Dafna Rand before House Select Intelligence Committee on ISIS

Leon E. Panetta Fellow Dafna Rand testified before the House Select Intelligence Committee on the ISIS terrorist threat to the U.S. and other countries, and the stability of the Middle East.

Read More
  • September 12, 2014
  • Toshi Yoshihara
  • Reports

Going Anti-Access at Sea: How Japan Can Turn the Tables on China

Professor Toshi Yoshihara of the U.S. Naval War College examines how Tokyo can, in the context of a consistently defensive approach to security and a strong U.S.-Japan alliance, adopt asymmetric strategies to counter negative trends in relative maritime power between Japan and China.

Read More
  • September 4, 2014
  • Patrick M. Cronin
  • Reports

The Challenge of Responding to Maritime Coercion

Dr. Patrick Cronin provides a framework for further thinking about both the need to impose costs on bad behavior and gray zone assertiveness in maritime Asia, and the set of strategies best able to accomplish behavioral change while preserving the overall peaceful character of the region.

Read More
  • September 2, 2014
  • Jacob Stokes, Julianne Smith, Nora Bensahel, David W. Barno, USA (Ret.)
  • Policy Briefs

Charting the Course: Directions for the New NATO Secretary General

A new policy brief by CNAS' Strategy and Statecraft Program timed in conjunction with the NATO Summit September 4-5, makes recommendations on key issues like NATO’s response to Russia and Ukraine, military capabilities, crisis management in the Middle East, and Arctic security.

Read More
  • August 29, 2014
  • Paul Scharre
  • Other Resources

Report Preview - Robotics on the Battlefield Part II: The Coming Swarm

In this preview of the forthcoming report, Robotics on the Battlefield Part II: The Coming Swarm, Fellow and 20YY Warfare Initiative Director Paul Scharre explores how rising platform costs are leading to shrinking quantities, and the potential for low-cost unmanned systems to bring mass back to the battlefield.

Read More
  • August 27, 2014
  • Alexander Sullivan
  • Reports

Autonomous Power? Securing Singapore’s Interests in the 21st Century

Research Associate Alexander Sullivan examines Singapore's how Singapore’s national security strategy translates into defense policy decisions, and discusses the potential of unmanned systems to amplify Singapore’s capabilities and support its security objectives.

Read More
  • August 25, 2014
  • Anthony Vassalo, Dafna Rand
  • Policy Briefs

Bringing the Fight Back Home: Western Foreign Fighters in Iraq and Syria

“Bringing the Fight Back Home” argues that the changing dynamics on the ground in Iraq are accelerating the urgency of the threat from the approximately 3,000 foreign fighters with Western passports, including the over 100 Americans.

Read More
  • August 7, 2014
  • Linda A. Sturgis
  • Reports

Port Recovery in the Aftermath of Hurricane Sandy: Improving Port Resiliency in the Era of Climate Change

U.S. Coast Guard Fellow Commander Linda Sturgis, along with Dr. Tiffany Smythe and Captain Andrew Tucci (USCG) examine how an effective private and public sector collaboration enabled a successful and timely port recovery.

Read More
  • July 21, 2014
  • Richard Danzig
  • Reports

Surviving on a Diet of Poisoned Fruit: Reducing the National Security Risks of America’s Cyber Dependencies

"Surviving on a Diet of Poisoned Fruit: Reducing the National Security Risks of America’s Cyber Dependencies" by the Honorable Richard Danzig offers key insights about how to improve U.S. national security policymaking to address cyber insecurity. In the report, the author examines existing information technology security weaknesses and provides nine specific recommendations for the U.S. government and others to cope with these insecurities.

Read More

Pages