Articles & Multimedia
Showing 1-20 of 3124 Publications
-
Technology & National Security
CNAS Insights | The Export Control Loophole Fueling China's Chip ProductionThis week, Reuters reported that China has apparently built a prototype of an extreme ultraviolet lithography (EUV) system, a highly intricate machine used to produce cutting-...
By Michelle Nie, Autumn Dorsey & Janet Egan
-
No Grid, No Glory: What History Teaches Us About the Next Major War
This article was originally published on The National Interest.The Trump Administration’s new National Security Strategy goes to great lengths to do what every good strategist...
By Will Rogers
-
Energy, Economics & Security / Technology & National Security
Recommendations for Promoting American AI AbroadStrategic Context and Program Objectives The American AI Exports Program is an ambitious and essential proposal to expand the reach of American AI technologies in foreign mar...
By Janet Egan, Geoffrey Gertz, Daniel Remler & Ruby Scanlon
-
Can the Global Order Be Saved? Not Without Punishing Russia
The only way to succeed in the urgent task of achieving a just peace settlement, therefore, is radically reshaping Russia’s calculus....
By Nicholas Lokker
-
CNAS Insights | Russia Is Winning the Battle for Influence in Nigeria
Across Africa, Russia and its proxies are well known for providing security and extracting wealth. In the Sahel the Wagner Group, and subsequently the Russian Defense Ministry...
By Kate Johnston
-
CNAS Insights | The 2025 National Security Strategy
By Richard Fontaine, Paul Scharre, Katherine L. Kuzminski, Emily Kilcrease, Lisa Curtis, Carrie Cordero, Vivek Chilukuri, Andrea Kendall-Taylor & Jim Townsend
-
Around the Table with Sahil Jain
Around the Table is a three-question interview series from the Make Room email newsletter as a part of the CNAS Make Room initiative. Each edition features a conversation with...
By Sahil Jain
-
Transatlantic Security / Technology & National Security
Look Before We Leap on Artificial IntelligenceThis article was originally published on The Dispatch. A debate about the role that artificial intelligence should and will play in society, and how it will affect humanity fo...
By Jon B. Wolfsthal
-
An Overlooked National Security Challenge: Maritime Supply Chain Security
In recent years, U.S. policymakers have paid increasing attention to the vulnerabilities of supply chains, especially in terms of securing access to critical minerals. Yet the...
By Elisabeth Tamte
-
CNAS Insights | Ten Days That Shook the War
A bad peace is worse than no peace. ...
By Richard Fontaine
-
Defense / Transatlantic Security
When Defense Becomes Destruction: Austria-Hungary’s Mistake and Ukraine’s RiskThis article was originally posted on War on the Rocks. The southeastern Polish city of Przemyśl, with its elegant 19th century Habsburg-era train station, remains one of the ...
By Franz-Stefan Gady
-
Defense / Transatlantic Security
Ukraine’s Catch-22 MomentThis article was originally published in the Financial Times. In Joseph Heller’s wartime classic, Catch-22, the protagonist Yossarian seeks out the US army surgeon Doc Daneeka...
By Franz-Stefan Gady
-
Securing America’s Grid Through Transformers and Workforce Resilience
Cyber threats to America’s electricity grid are real and intensifying, and policymakers discussing grid security often focus solely on them. However, the US electric grid has ...
By Juliana Fleming
-
CNAS Insights | Budgetary Own Goals Undermine “Speed and Volume”
On November 7, Secretary of Defense Pete Hegseth laid out a plan to overhaul the Department of Defense’s (DOD’s) acquisition system. Placing an emphasis on delivering new capa...
By Philip Sheers, Carlton Haelig & Stacie Pettyjohn
-
Transatlantic Security / Middle East Security / Energy, Economics & Security
Sanctions Aren’t Enough to Shut Down the Moscow-Tehran Black Market for WarThe geographic scope and extent of Iranian-Russian cooperation highlights the failure of traditional sanctions to prevent Moscow and Tehran from seeking key components like ch...
By Delaney Soliday
-
How the U.S. and South Africa Could Use the G20 to Plot a Path Forward
In the contest for the future of global order, South Africa’s choices will have a disproportionate impact on the outcome....
By Richard Fontaine & Gibbs McKinley
-
Indo-Pacific Security / Energy, Economics & Security
How to Win the Economic War with ChinaTrump's approach to China has run aground, giving Beijing unprecedented advantage in the economic conflict....
By Edward Fishman & Julian Gewirtz
-
Indo-Pacific Security / Technology & National Security
Sharper: Tech + ChinaRecent talks between President Donald Trump and Chinese Communist Party General Secretary Xi Jinping placed a spotlight on emerging technologies, from high-end chips to minera...
By Charles Horn & Sevi Silvia
-
Vertical Integration of Rare Earth Elements for U.S. Autonomous Dominion
America’s national security is imperiled by its dependence on China for the rare earth elements (REEs) essential to artificial intelligence (AI), autonomous systems, and preci...
By Kevin Chen
-
Thailand–Cambodia Border Agreement on Shaky Ground
Trump’s initial intervention was instrumental. Yet to secure both countries’ adherence to the accord, Washington must pair continued diplomatic pressure with tangible humanita...
By Ryan Claffey