skip to main content
Article Podcast Report Summary Quick Look Quick Look Video Newsfeed triangle plus sign dropdown arrow Case Study All Search Facebook LinkedIn YouTube Bluesky Threads Instagram Right Arrow Press Release External Report Open Quote Storymap Newsletter

Search Results

Your search for Assessment found 236 results.

Proxy Warfare
/analyses/2019/07/proxy-warfare
Proxy warfare—that is, conflict in which a “major power instigates or plays a major role in supporting and directing to a conflict but does only a small portion of the actual fighting itself”—is receiving new attention from policymakers, analysts, and practitioners. This study uses a series of four case studies on US involvement in proxy war (the “Secret War” in Laos, the Contras in Central America, the African Union Mission in Somalia, and the Syrian Defense Forces) to develop a set of key themes. These themes, in turn, form the basis of a set of rules of thumb to guide senior decisionmakers as they contemplate the future use of proxy forces. Finally, this report discusses implications for U.S. Special Operations Forces, which are likely to play an increasingly important role in supporting U.S. proxies.
, and for developing policies and programs that will promote US national interests abroad. This report contributes to such an assessment. First, we present a series of four case studies: two on current proxy
Opioid Data Initiative
/analyses/2018/12/opioid-data-initiative
Opioid use disorder is a major public health and public safety crisis in communities across the U.S. Many local jurisdictions have begun using data to more effectively and efficiently target resources and expertise, while also forming multidisciplinary partnerships to improve coordination of response efforts. This study examined how local jurisdictions use data at the policy, operational, and program assessment levels, and explored potential barriers and promising practices to facilitate data sharing among stakeholders. The study team developed and administered an online survey and conducted semi-structured interviews with stakeholders from 11 jurisdictions. Our findings indicate that data-driven approaches to fighting the opioid epidemic are common and used primarily to improve situational awareness and understanding of the epidemic, target resources effectively, and destigmatize opioid use disorder. Key barriers to sharing data among stakeholders include concerns about the timeliness and accuracy of data, resource constraints, and legal protections on sharing health related information.
Opioid Data Initiative Opioid Data Initiative Opioid use disorder is a major public health and public safety crisis in communities across the U.S. Many local jurisdictions have begun using data to more effectively and efficiently target resources and expertise, while also forming multidisciplinary partnerships to improve coordination of response efforts. This study examined how local jurisdictions use data at the policy, operational, and program assessment levels, and explored potential barriers and promising practices to facilitate data sharing among stakeholders. The study team developed
Affiliation Instead of Loneness: Rethinking the “Lone Wolf” Typology
/quick-looks/2025/12/affiliation-instead-of-loneness
Domestic Terrorism Offender-Level Database (DTOLD) analysis validates categorizing terrorists on a spectrum from lone actors to members of terrorist organizations.
to radicalize independently and attain weapons easily. Research supports the intelligence community’s assessment that lone actors are the deadliest terrorist threat in the United States
World Cup Support
/quick-looks/2025/12/world-cup-support
In preparation for the World Cup, DHS and FEMA have released grant funding to ensure it is also the safest event possible.
years of experience in planning for and supporting NSSEs and Special Event Assessment Rating (SEAR) events, including Presidential inau­gurations, national conventions, state funerals, and gatherings
The CNA Supply Chain Operational Engagement (CNA SCOPE™) Method
/quick-looks/2025/08/the-cna-supply-chain-operational-engagement-method
CNA has developed a methodology to characterize lifeline commodity networks to inform both public and private sector decision-makers.
” of nodes, links, players, and interdependencies involved in that flow, and targeted assessment to meet the lifeline commodity needs of a dense, urban population. /quick-looks/2025/08
BTAM: Barriers to Continuity of Care
/quick-looks/2025/04/btam-barriers-to-continuity-of-care
BTAM is a community-based process that requires partners to work together to identify, assess, and manage threats
BTAM: Barriers to Continuity of Care BTAM is a community-based process that requires partners to work together to identify, assess, and manage threats Behavioral threat assessment and management (BTAM) is a community-based process that requires partners to work together to identify, assess, and manage threats. In a 2015 report, the FBI identified 11 key contributors to the BTAM process: law enforcement, prosecutors, schools, social services, health care systems and providers, lawmakers, courts, probation and parole officers, employers, parents and immediate family, and bystanders
BTAM: A Deep Bench of Resources
/quick-looks/2025/03/btam-a-deep-bench-of-resources
In June 2019, the Colorado Department of Public Safety hosted the Colorado Preventing Targeted Violence Summit.
suggests that successful intervention—that is, successful behavioral threat assessment and management (BTAM)—requires a team with a deep bench. Core players will be involved in most cases
cna talks: U.S. Strategy on Al-Qaeda
/our-media/podcasts/cna-talks/2017/u.s.-strategy-on-al-qaeda
Despite experiencing setbacks over the last 16 years, Al Qaeda has proven to be a learning organization that has evolved and expanded. On this episode of CNA Talks, experts Jonathan Schroden, Julia McQuaid, Pamela Faber and Zack Gold discuss the findings released in CNA's independent assessment of U.S. government efforts against Al Qaeda.
U.S. Strategy on Al-Qaeda Despite experiencing setbacks over the last 16 years, Al Qaeda has proven to be a learning organization that has evolved and expanded. On this episode of CNA Talks, experts Jonathan Schroden, Julia McQuaid, Pamela Faber and Zack Gold discuss the findings released in CNA's independent assessment of U.S. government efforts against Al Qaeda. U.S. Strategy on Al-Qaeda Dr ... , operations assessment, Afghanistan, Pakistan and the Middle East. Julia McQuaid   is director of CNA’s Program on Transnational Challenges. She is an expert on international security issues
ai with ai: Remember, Remember, the Fakes of November
/our-media/podcasts/ai-with-ai/season-3/3-41
In COVID-related AI news, Andy and Dave discuss an article from Wired that describes how COVID confounded most predictive models (such as finance). And NIST investigates the effect of face masks on facial recognition software. In regular-AI news, CSET and the Bipartisan Policy Center released a report on “AI and National Security,” the first of four “meant to be a roadmap for Washington’s future efforts on AI.” The Intelligence Community releases its AI Ethics Principles and AI Ethics Framework. Researchers from the University of Chicago announce “Fawkes,” a way to “cloak” images and befuddle facial recognition software. In research, OpenAI demonstrates that GPT-2, a generator designed for text, can also generate pixels (instead of words) to fill out 2D pictures. Researchers at Texas A&M, University of S&T of China, and MIT-IBM Watson AI Lab create a 3D adversarial logo to cloak people from facial recognition. And other research explores how the brain rewires when given an additional thumb. CSET publishes a Deepfakes: a Grounded Threat Assessment. And MyHeritage provides a "photo enhancer" that uses machine learning to restore old photos.
an additional thumb. CSET publishes a Deepfakes: a Grounded Threat Assessment. And MyHeritage provides a "photo enhancer" that uses machine learning to restore old photos. /images/AI-Posters/AI_3_41.jpg ... paper Report of the Week Deepfakes: A Grounded Threat Assessment (50 page) Report Book of the Week All of Statistics: A Concise Course in Statistical Inference (446 page) Book
ai with ai: Xenophobe
/our-media/podcasts/ai-with-ai/season-3/3-12
The U.S. Government announces the restriction of the sale outside of the U.S. of AI for satellite image analysis. Baidu beats out Google and Microsoft for language “understanding” with its model ERNIE, which uses a technique that it developed specifically for the Chinese language. Samsung unveils NEON, its humanoid AI avatars. The U.S. Department of Defense stands up a counter-unmanned aerial system office. And GoogleAI publishes an AI system for breast cancer screening, but meets with some Twitter (and Wired) backlash on solving the “wrong problem.” Researchers at University of Vermont, the Allen Discovery Center/Tufts, and Wyss Institute/Harvard introduce the world’s “first living robots,” xenobots, constructed from skin and muscle cells of frogs (from designs made with evolutionary algorithms). RAND releases a report on an assessment and recommendations of the DOD’s posture for AI. AI for social good (AI4SG) releases its survey of research and publications on beneficial applications of AI. Daniel Dennett explores the question of whether HAL committed murder, in a classic 1996 essay. From the Bengio and Marcus debate, both references Daniel Kahneman’s “Thinking, Fast and Slow.” And Robert Downey Jr. hosts a YouTube series on The Age of AI.
algorithms). RAND releases a report on an assessment and recommendations of the DOD’s posture for AI. AI for social good (AI4SG) releases its survey of research and publications on beneficial ... : Assessment and Recommendations Summary (186 page) Report Review Paper of the Week Artificial Intelligence for Social Good: A Survey (78 page) paper Classic Essay