Reports
Showing 161-180 of 686 Publications
-
Securing U.S. Democracy Initiative
The Department of Homeland Security: Priorities for ReformThere is an opportunity to reform the Department of Homeland Security in a way that best protects the country from homeland security threats, consistent with law, security and...
By Carrie Cordero & Katie Galgano
-
Sanctions by the Numbers: Spotlight on North Korea
The U.S. government has used a variety of coercive economic measures to combat the North Korean security threat....
By Jason Bartlett & Francis Shin
-
Technology & National Security
Myths and Realities of China’s Military-Civil Fusion StrategyIn U.S. policy debates on China, military-civil fusion (MCF) has emerged as a frequent subject of debate and concern....
By Elsa B. Kania & Lorand Laskai
-
China’s Digital Currency
China is pushing aggressively to be a global leader in financial technology....
By Yaya J. Fanusie & Emily Jin
-
Sanctions by the Numbers: Spotlight on Russia
Russia is the second-most sanctioned state by the United States in the past decade, with 742 designations....
By Francis Shin
-
Technology & National Security
Networked: Techno-Democratic Statecraft for Australia and the QuadAustralia is well positioned to lead the Quad to achieve important technology policy objectives....
By Martijn Rasser
-
Sanctions by the Numbers: 2020 Year in Review
Sanctions designations remained high in 2020, with 777 designations compared to 785 in 2019....
By Sam Dorshimer & Francis Shin
-
Indo-Pacific Security / Transatlantic Security
Navigating the Deepening Russia-China PartnershipIn virtually every dimension of their relationship, cooperation between Beijing and Moscow has increased....
By Andrea Kendall-Taylor & David Shullman
-
Technology & National Security
Taking the HelmThe United States needs a new approach to regain the initiative. The stakes are high and the window for action is closing....
By Martijn Rasser & Megan Lamberth
-
Technology & National Security
AI and International Stability: Risks and Confidence-Building MeasuresExploring the potential use of confidence-building measures built around the shared interests that all countries have in preventing inadvertent war....
By Michael Horowitz & Paul Scharre
-
America’s Use of Coercive Economic Statecraft
Policymakers will continue to intensively use a growing array of coercive economic tools, including tariffs, sanctions, trade controls, and investment restrictions....
By Elizabeth Rosenberg, Peter Harrell, Paula J. Dobriansky & Adam Szubin
-
A New U.S. Strategy for the Israeli-Palestinian Conflict
Executive Summary Key Proposition Today’s realities demand that the United States change its approach to the Israeli-Palestinian conflict. Its current focus is on high-profile...
By Ilan Goldenberg, Michael Koplow & Tamara Cofman Wittes
-
Technology & National Security
Democracy by DesignFor digital freedom to prevail over authoritarian uses of technology, democracies must offer something better....
By Kara Frederick
-
Securing U.S. Democracy Initiative
War Powers: What Are They Good For?Congressional aspirations to equal partnership in the conduct of American conflicts have long gone unsatisfied....
By Richard Fontaine, Loren DeJonge Schulman & Stephen Tankel
-
Energy, Economics & Security / Technology & National Security
Rethinking Export Controls: Unintended Consequences and the New Technological LandscapeThe U.S. approach to export controls requires change....
By Martijn Rasser
-
National Security Human Capital Program
Massachusetts Veteran Needs Assessment: During the Pandemic and BeyondCOVID-19 has impacted the veteran community in unprecedented ways, shining a spotlight on food insecurity, mental health, and childcare at a very challenging time....
By Nathalie Grogan, Elizabeth Howe, Danielle Lazarowitz, Emma Moore & Kayla M. Williams
-
Sanctions by the Numbers: Spotlight on China
The United States has significantly increased its sanctions designations on Chinese individuals, entities, and ships in 2020. While the United States has imposed sanctions on ...
By Francis Shin
-
Exposing the Financial Footprints of North Korea’s Hackers
How North Korea conducts intricate and sweeping cyberattacks against the United States and its allies to acquire funds to support its illicit nuclear proliferation efforts....
By Jason Bartlett
-
Technology & National Security
Defense Technology StrategyThe DoD needs a systematic approach—a technology strategy—for how to prioritize technology investments....
By Paul Scharre & Ainikki Riikonen
-
Renew, Elevate, Modernize: A Blueprint for a 21st-Century U.S.-ROK Alliance Strategy
The U.S.-South Korean alliance has the potential to play a central role in bolstering a rules-based order in the Indo-Pacific region and beyond....
By Kristine Lee, Joshua Fitt & Coby Goldberg