Articles & Multimedia
Showing 1-20 of 125 Publications
-
Can China’s Military Win the Tech War?
The United States and its allies should take seriously Beijing’s efforts to militarize China’s technological base....
By Anja Manuel & Kathleen Hicks
-
Transcript from Emerging Concepts in Joint Command and Control
On Wednesday, May 20, 2020, the CNAS Technology and National Security Program hosted a virtual panel discussion on emerging concepts in joint command and control featuring Hon...
By Robert O. Work, Chris Dougherty & Paul Scharre
-
What the government should or should not do to help space industry
The COVID-19 economic slowdown will have lasting implications on the new space sector. Yet the United States cannot afford another lost decade of commercial space innovation. ...
By Mikhail Grinberg
-
Time for the US to declare independence from China
Americans now know they can’t rely on China or even our allies to produce the goods we need during a pandemic. That’s why it’s time for the United States government to do what...
By Anthony Vinci & Dr. Nadia Schadlow
-
Transcript from Engagement and Competition: China, Technology, and Global Supply Chains with the Cyberspace Solarium Commission
On March 26, 2020, the CNAS Technology and National Security Program and the Cyberspace Solarium Commission hosted a virtual panel discussion on "Engagement and Competition: C...
By Rep. Mike Gallagher, Samantha Ravich, John C. Inglis, Carrie Cordero & Martijn Rasser
-
The Cyberspace Solarium Commission’s Mandate to Fix Congressional Oversight
The report of the Cyberspace Solarium Commission is finally out—and it provides a fresh look at congressional oversight on cybersecurity. Congress established the commission a...
By Carrie Cordero & David Thaw
-
Take Greenland Seriously and Literally as a Vital National Security Issue
It is tempting to dismiss talk of Greenland’s significance for defense and foreign policy simply because President Trump infamously made it a punch line last year. The world’...
By David Priess & Martijn Rasser
-
Stories from the Backchannel: Season Two Trailer
Now more than ever, Americans are interested in the people working behind the scenes on consequential national security decisions. In Season Two of Stories from the Backchanne...
By Ilan Goldenberg, Richard Fontaine, Susanna V. Blume, Kayla M. Williams, Price B. Floyd, Kurt Campbell & Kara Frederick
-
When your data is held hostage
Technology and security expert Kara Frederick explains how and why U.S. local governments and electoral rolls are vulnerable to ransomware and what can be done about it. List...
By Kara Frederick
-
Setting the Stage for U.S. Leadership in 6G
Every day there are more headlines about China’s rise in 5G, the next generation of wireless communications technologies, and the economic and national security risksto the Un...
By Martijn Rasser
-
China’s Quantum Future
China should be a “global leader in innovation” by 2035, President Xi Jinping declared during the Chinese Communist Party’s 19th National Congress last October. His remarks re...
By Elsa B. Kania
-
Technology and Innovation in an Era of U.S.-China Strategic Competition
China has taken significant steps to implement national strategies and encourage investment aimed at surpassing the U.S. in high-tech fields like artificial intelligence. In t...
By Elsa B. Kania
-
Defence innovation is critical for the future of the Australia–US alliance
The outcome of the recent AUSMIN meeting—the annual gathering of the secretaries of state and defence from the United States and the foreign and defence ministers from Austral...
By Daniel Kliman & Brendan Thomas-Noone
-
How the Five Eyes Can Harness Commercial Innovation
Earlier this year, the United Kingdom, Australia, Canada and New Zealand – which along with the United States are members of the “Five Eyes” alliance – came together to collec...
By Daniel Kliman & Brendan Thomas-Noone
-
Cyber and Space Weapons Are Making Nuclear Deterrence Trickier
Stability was an overriding concern at last week’s Senate Foreign Relations Committee hearing on nuclear command authority, the first in four decades. Senators wondered aloud ...
By Richard Fontaine & James N. Miller, Jr.
-
More Training Won’t Reduce Your Cyber Risk
How many times have you had to watch your company’s latest cybersecurity training video? An entire industry now exists to train us humans to be smarter in how we operate compu...
By Michael Sulmeyer & Mari Dugas
-
The Leap Into Quantum Technology: A Primer for National Security Professionals
China recently announced the launch of its Jinan Project, a quantum information effort billed as “the world’s first unhackable computer network.” Building on its launch last y...
By Richard Fontaine & Michael J. Biercuk
-
A Conversation with the 2017 NCCDC Champions
Christian Beam and Justin Wright are two members of Cyber Dawgs, the champions from this year's National Collegiate Cyber Defense Competition. Beam and Wright stopped by to di...
By Amy Schafer
-
Building a cyber ROTC
In the past week, crippling cyberattacks have been directed at Ukraine — targeting banks, the postal service, the airport in Kiev, and other major industries, disrupting the d...
By Michèle Flournoy & Amy Schafer
-
CNAS 2017: Surveillance and Privacy: Can They Coexist?
Electronic surveillance is vital for counter-terrorism and other intelligence missions. Some argue, however, that a growing “surveillance state” threatens Americans’ privacy a...
By Adam Klein