skip to main content
Article Podcast Report Summary Quick Look Quick Look Video Newsfeed triangle plus sign dropdown arrow Case Study All Search Facebook LinkedIn YouTube Bluesky Threads Instagram Right Arrow Press Release External Report

Search Results

Your search for International Security found 305 results.

Role of Russian Military in Information Confrontation
/reports/2021/06/role-of-russian-military-in-information-confrontation
Joe Cheravitch traces the evolution of Russian military thought on “information confrontation,” e.g., cyberattacks and computer espionage.
confrontation,” e.g., cyberattacks and computer espionage. Between the collapse of the Soviet Union in 1991 and Russia’s annexation of Crimea over two decades later, international attention toward Russia’s ... , when Russia’s  military and security services began to use a wide array of computer network operations, electronic warfare, and digital influence platforms to help facilitate kinetic  activities in Crimea and eastern Ukraine while disrupting Ukraine’s new government and its international partners. Since then, a litany of cyberattacks—many of  which have been attributed to Russian military
State Policy of Russia toward Nuclear Deterrence
/reports/2020/06/state-policy-of-russia-toward-nuclear-deterrence
In 2020, the Russian Federation released its “Foundations of State Policy” regarding nuclear deterrence. CNA has produced an informal English translation.
and norms of international law, international treaties of the Russian Federation in the field of defense and arms control, federal constitutional laws, federal laws, other regulatory legal acts and documents regulating defense issues and security. The provisions of these Foundations are binding on all federal government authorities, other government bodies and  organizations participating
Social Media Bots: Laws
/reports/2020/09/social-media-bots-laws
While social media bots have the ability to greatly affect US national security and public discourse, the current landscape of US federal and state laws regulating such bots is limited. This study explores the challenges inherent to passing social media bot-related legislation and details current efforts to do so, including at the federal and state levels. It briefly explores the context in the European Union as well. This paper then discusses the dilemmas social media companies face as they think about effective bot policies and identifies the four main categories of policies through which the social media platforms regulate the use of bots on their sites. As they face evolving threats from bots, the social media companies will continue to adapt their policies accordingly, though it remains an open question whether and to what extent these companies should regulate themselves in the face of additional pressure from Congress and the public.
Social Media Bots: Laws Social Media Bots: Laws, Regulations, and Platform Policies While social media bots have the ability to greatly affect US national security and public discourse, the current ... pressure from Congress and the public. Social media bots—simply, automated programs on social media platforms—affect US national security, public discourse, and democracy. As the country continues ... catalogued. This CNA primer helps to fill this gap by helping policy-makers and national security practitioners understand the laws and social media platform policies as they currently exist. We also
AI Safety Navy Action Plan
/reports/2019/10/ai-safety-navy-action-plan
In light of the Navy’s stated commitment to using AI, and given the strategic importance of AI safety, we provide the Navy with a first step towards a comprehensive approach to safety. We use a risk management approach to frame our treatment of AI safety risks: identifying risks, analyzing them, and suggesting concrete actions for the Navy to begin addressing them. The first type of safety risk, being technical in nature, will require a collaborative effort with industry and academia to address. The second type of risk, associated with specific military missions, can be addressed in a combination of military experimentation, research, and concept development to find ways to promote effectiveness along with safety. For each types of risk, we use examples to show concrete ways of managing and reducing the risk of AI applications. We then discuss institutional changes that would help promote safety in the Navy’s AI efforts.
. In light of this, more and more countries are placing AI as key to their national security strategies. As the US pursues AI, its plans and efforts to leverage the technology for military applications ... requirements, performing test and evaluation processes, and conducting legal reviews to ensure that weapons comply with international law. Consistent with this stance, safety holds a primary place ... , and accidental escalation leading to international instability and conflict—are also highly relevant when considering concerns over military use of AI. An ethics focus will not necessarily address
Gender Research and Analysis
/expertise/force-readiness/gender
This page aims to highlight CNA’s body of research that examines the security implications of gender for the United States, our allies, and competitors.
the national and international security implications of gender for the United States military, our allies and partners, and competitors. Our studies focus on recruiting, representation, performance ... Gender This page aims to highlight CNA’s body of research that examines the security implications of gender for the United States, our allies, and competitors. Gender Research and Analysis https ... , and cross-regional challenges and opportunities presented by the Women, Peace and Security agenda. white default Women Peace and Security Cross-regional challenges and opportunities Slideshow
Xi Jinping’s Vision of a Resilient China
/our-media/indepth/2023/01/xi-jinpings-vision-of-a-resilient-china
Elizabeth Wishnick examines President Xi Jinping’s rhetoric regarding China’s national challenges including COVID-19, and Russia’s war in Ukraine.
” by increasing domestic exploration and creating strategic mineral reserves. What are the international implications of Xi’s emphasis on resilience and national security? Since the 20th CCP Congress, Xi ... in the face of domestic challenges and key security risks and was asserting that miracles would be needed (though hard work still could bring them to fruition). To be sure, he expressed confidence ... , Xi spoke of the resilience of the Sino-Russian partnership and emphasized its enduring value in an international environment he characterized as “changing and turbulent.” Despite the challenging
American Naval Policy in the Second Decade
/reports/2017/american-naval-policy-in-the-second-decade
This paper provides a brief overview of U.S. Navy policy, strategy, plans and operations. It discusses some basic fundamentals and the Navy’s three major operational activities: peacetime engagement, crisis response, and wartime combat. It concludes with a general discussion of U.S. naval forces. It was originally written as a contribution to an international conference on maritime strategy and security, and originally published as a chapter in a Routledge handbook in 2015. The author is a longtime contributor to, advisor on, and observer of US Navy strategy and policy, and the paper represents his personal but well-informed views. The paper was written while the Navy (and Marine Corps and Coast Guard) were revising their tri- service strategy document A Cooperative Strategy for 21st Century Seapower, finally signed and published in March 2015, and includes suggestions made by the author to the drafters during that time.
with a general discussion of U.S. naval forces. It was originally written as a contribution to an international conference on maritime strategy and security, and originally published as a chapter ... Handbook of Naval Strategy and Security, edited by Joachim Krause and Sebastian Bruns, and published by Routledge (Taylor and Francis Group, London and New York). It is reproduced here by the kind permission
Origins and Development of Cooperative Strategy
/reports/2017/origins-and-development-of-cooperative-strategy
On August 2, 2011, Admiral (ADM) Jonathan Greenert was confirmed to succeed ADM Gary Roughead as the U.S. Navy’s 30th Chief of Naval Operations (CNO), to take office the following month. Like his 29 predecessors, ADM Greenert faced issues of Navy readiness, personnel, acquisition, and resources. He was also troubled by the content and effect of the Navy’s existing strategy document, A Cooperative Strategy for 21st Century Seapower (CS21), published by all three U.S. sea services back in October 2007.
in the international security environment and the post–Iraq War climate of fiscal restraint. It goes on to discuss the terms of reference (TOR) for the revision effort; the roles of the Chief of Naval Operations
Insights for the Third Offset
/reports/2017/insights-for-the-third-offset
CNA conducts analysis for the U.S. Navy, the Department of Defense (DOD), and other sponsors, ranging across policy, strategy, organizational processes, technical performance of military systems, and current operations. Because of the expected impact of autonomy and artificial intelligence (AI) to the character of warfare, CNA has created a Center for Autonomy and Artificial Intelligence to focus on these emerging technologies and their significant role in U.S. defense policy and all the military services. The Center combines CNA’s strengths and experience in conducting objective analysis of U.S. military operations with focused expertise in autonomy and other aspects of AI. This report, the first created by the new Center, takes lessons and insights from CNA’s body of work for the Navy and the joint force, including CNA’s field program of embedded analysts in military commands around the world. Though much of the emerging technology examined in this report is new, the approach of applying lessons from U.S. operations and institutional processes to key challenges in leveraging autonomy and AI continues CNA’S applied research paradigm of exploring many opportunities to resolve or work around challenges that have been seen before. The aim of this report is to anticipate challenges of “Third Offset” implementation based on past lessons, and then provide concrete recommendations for promoting the effective incorporation of autonomy, AI, and related technologies in U.S. military operations. This report discusses making autonomy and AI militarily effective from an acquisition and technology perspective, and how to pursue these capabilities in ways that are consistent with long-standing U.S. values and that promote broader U.S. national interests.
military strengths. The U.S. response to this new security environment is the “Third Offset” strategy, an asymmetric approach that aims to “exploit all the advances in artificial intelligence and autonomy ... on such weapons, citing concerns about civilian casualties, the difficulties of machines complying with international humanitarian law (IHL), and other ethical considerations. Likewise, U.S. operators
Drone Strikes in Pakistan Reasons to Assess Civilian Casualties
/reports/2014/drone-strikes-in-pakistan-reasons-to-assess-civilian-casualties
CNA analyzed publically available data to determine the likelihood of civilian harm per strike in the drone campaign in Pakistan. From this data, we see that the U.S. has improved its ability to reduce civilian casualties during drone strikes in Pakistan over the past several years, as measured in the percentage of strikes causing civilian casualties and the number of civilian casualties occurring per incident.
operations also affect national security, fueling threats to the U.S. while simultaneously lim­iting freedom of action and complicating relations with other nations. One possible reason ... international law. Official statements also feature a common description of the drone platform as surgical with respect to civilian casualties. This suggests a misunderstanding of how civilian casualties