Articles & Multimedia
Showing 401-420 of 3041 Publications
-
What a Debt Default Would Mean for National Security
Military strength and geopolitical influence rise and fall with a country’s economic power, and a debt default would strike a major blow against them all....
By Richard Fontaine
-
Technology & National Security
Chinese Data Restrictions Undermine US-China StabilityBy refusing dialogue, China increases the risk of miscalculation, crises, and even conflict....
By Paul Scharre
-
Technology & National Security
Controlling Access to Advanced Compute via the Cloud: Options for U.S. Policymakers, Part IWe do not recommend controlling access to cloud computing services for entities in China, because, based on our analysis, it does not appear feasible and may have adverse cons...
By Hanna Dohmen, Jacob Feldgoise, Emily Weinstein & Tim Fist
-
Volkswagen, then Stellantis: Billions for battery plants, but little on mines for raw material
Canada’s critical minerals strategy has large aspirations, but these plans will go unrealized without a higher degree of focus and funding....
By Rachel Ziemba, Giancarlo Da-Re & Matthew Funk
-
Technology & National Security
From the USA, a Warning for DemocraciesWith new threats posed by commercial spyware uncovered by the day, democracies cannot wait to respond. Now is the time to work together and limit authoritarian use of spyware ...
By Alexandra Seymour
-
NATO must codify these lessons from Ukraine while motivation is there
Measured by the yardstick of history, NATO is an unprecedented success. The West needs it to stay that way....
By Ira Straus & Jim Townsend
-
National Security Human Capital Program
Sharper: Military RecruitmentWith the 50th anniversary of the United States’ All-Volunteer Force this summer, and the current recruiting crisis potentially impacting force readiness, military personnel po...
By Anna Pederson, Ayla McBreen & Charles Horn
-
Beyond Ukraine’s Offensive
The offensive has consumed planning, but a sober-minded approach would recognize that supporting Ukraine will be a long-term effort....
By Michael Kofman & Rob Lee
-
Marine Force Design: Changes Overdue Despite Critics’ Claims
Imagine a Corps that can emulate what the Ukrainian army did to the Russian army during the first phase of Russian President Vladimir Putin’s “special military operation,” but...
By Robert O. Work
-
Technology & National Security
Latin and South America Are a Key to the United States’ Critical Minerals PuzzleEurope’s reliance on Russian oil and gas pales in comparison to the United States’ dependence on China for critical minerals. Amid heightened technology competition and a glob...
By Sam Howell
-
Technology & National Security
Russian Military Debates AI Development and UseUltimately, Russia’s military performance in Ukraine and the Ukrainian military’s adoption of new and emerging technologies may likewise inform the domestic debate on the use ...
By Samuel Bendett
-
Around the Table with Sarath Ganji
Around the Table is a three-question interview series from the Make Room email newsletter. Each edition features a conversation with a peer in the national security community ...
By Sarath Ganji
-
Technology & National Security
To Restrict, or Not to Restrict, That Is the Quantum QuestionPremature export controls could impede innovation and handicap U.S. companies....
By Sam Howell
-
Technology & National Security
Arms Control for Artificial IntelligenceThe best illustration of the dynamics of the desirability of arms control is the international community’s response to nuclear weapons versus chemical weapons....
By Paul Scharre & Megan Lamberth
-
Incentivizing Whistleblowers to Combat Sanctions Evasion
Although misguided patriotism drives many Russian intelligence officers to support President Vladimir Putin’s war machine, money can persuade sanctions-evasion enablers — espe...
By Alex Zerden & Arshan Barzani
-
Yoon’s State Visit Shows an Alliance on the Move
Now is the time for South Korea and the United States to work together in pursuit of order, security, freedom, and prosperity....
By Richard Fontaine
-
Why Security Assistance Often Fails
The 20th anniversary of the U.S. invasion of Iraq has launched a set of reflections and recriminations over the decision to invade and subsequent bungling of the occupation. B...
By Rachel Tecott Metz
-
Technology & National Security
Hijacked AI Assistants Can Now Hack Your DataEarly adopters of powerful new AI tools should recognize that they are subjects of a large-scale experiment with a new kind of cyberattack....
By Bill Drexel & Caleb Withers
-
The Rise of Sportswashing
Autocratic regimes can, with relative ease, leverage football to gain access to an array of platforms ranging from iconic athletes and historic clubs to established federation...
By Sarath Ganji
-
Technology & National Security
To Stay Ahead of China in AI, the U.S. Needs to Work with ChinaAn AI gold rush is underway in the private sector in the wake of ChatGPT, but the geopolitical stakes are even greater. The United States and China are vying for global leader...
By Paul Scharre