skip to main content
Article Podcast Report Summary Quick Look Quick Look Video Newsfeed triangle plus sign dropdown arrow Case Study All Search Facebook LinkedIn YouTube Bluesky Threads Instagram Right Arrow Press Release External Report Open Quote Storymap

Search Results

Your search for International Security found 310 results.

ai and autonomy in russia: Special Issue, September 8, 2022
/our-media/newsletters/ai-and-autonomy-in-russia/special-issue
September 8, 2022 issue features translations of several Russian military journal articles that reflect on the use of AI and autonomy. All have been written since the Russian invasion of Ukraine.
to military systems in both the United States and Russia. It then argues that developments of military AI are far outpacing domestic and international regulation. Finally, it offers recommendations ... , transformation, non-military measures, military activity, technologies, informational confrontation, sea-air-space, theater of operations, noncontact warfare, national security. The ongoing global ... and will require enormous efforts by the international community. Post-conflict settlement will become an important element of the diplomacy of the leading countries and international political associations
ai and autonomy in russia: Issue 42, July 18, 2022
/our-media/newsletters/ai-and-autonomy-in-russia/issue-42
to over 250,000 state and municipal services. MILITARY AND SECURITY RUSSIAN MILITARY TECHNOLOGY DEVELOPMENT IS DISCUSSED ON TELEGRAM Since February 2022, Russian-language Telegram channels have ... vehicles will take to the battlefield. In this scenario, remotely controlled robotic tanks can be the front offensive echelon to conduct reconnaissance, provide security, and perform other tasks ... .” He expects that there will be considerable demand in the Internet of Things (IoT) space, as well as robotics, unmanned vehicles, security systems, and other applications. According to Andrey
The Nuclear Programs of Russia China North Korea and Iran
/analyses/2024/01/the-nuclear-programs-of-russia-china-north-korea-and-iran
This report analyzes nuclear weapons programs in Russia, China, North Korea, and Iran, including nuclear command and control, R&D, funding, staffing, testing.
US-allied South Korea. In the post–Cold War time frame, North Korea’s interpretation of the international security environment contributed to the calculus that without nuclear weapons it would be vulnerable ... . Nuclear weapons as ultimate guarantor of sovereignty and security The Soviet Union officially acquired nuclear weapons in 1949 and gradually developed a triad of strategic nuclear forces consisting ... views nuclear weapons as the ultimate guarantor of its security and an insurance policy to protect against nuclear and large-scale conventional attacks. In Russia’s “strategic deterrence” framework
intersections: Issue 5, August 2023
/our-media/newsletters/intersections/issue-5
Intersections, Issue 5, CNA news digest of China’s efforts to acquire Western technology, U.S. and partner efforts to protect technology for national security.
on the green energy supply chain also links it to PRC-related security issues. According to the International Energy Agency , an intergovernmental organization specializing in the global energy sector ... Issue 5 Intersections, Issue 5, CNA news digest of China’s efforts to acquire Western technology, U.S. and partner efforts to protect technology for national security. /Newsletters/Intersections ... for allegedly providing "state secrets" to foreign clients. In May 2023, PRC authorities conducted a raid against international consulting firm Capvision, which specializes in connecting
ai and autonomy in russia: Issue 35, April 4, 2022
/our-media/newsletters/ai-and-autonomy-in-russia/issue-35
AND SECURITY POM-3 ANTIPERSONNEL MINE USE IN UKRAINE Adding to the growing list of semiautomated devices we are seeing in the Russia-Ukraine war, there is evidence of the Russian use of the POM-3 ... , “Almost a third of information security companies operating in Russia are going to leave the country in the near future and take their staff with them.” GOVERNMENT INITIATIVE TO FUND AI TRAINING ... are jointly developing a line of secure cryptoprocessors for the Internet of Things. These cryptoprocessors, or “computers within computers” help ensure the maximum level of security to protect IoT
pla update: Issue 16, December 1, 2023
/our-media/newsletters/pla-update/issue-16
PLA Update, Issue 16, is a CNA China Studies Program monthly newsletter, with summaries of Chinese media coverage of the Chinese People’s Liberation Army (PLA).
engagements with various countries and their militaries, including recent bilateral and multilateral exercises, exchanges with international cadets, and deliveries of relief supplies ... by Senior Colonel Xu Kui-a professor at the PLA National Defense University's (NDU) National Security College-that discussed differences between the concepts of war mobilization and national ... enforcement, and maritime security. Since the previous issue of PLA UPDATE , the PLA concluded several bilateral and multilateral exercises with countries around China's land and maritime periphery
intersections: Issue 4, June 2023
/our-media/newsletters/intersections/issue-4
Intersections, Issue 4, CNA news digest of China’s efforts to acquire Western technology, U.S. and partner efforts to protect technology for national security.
Issue 4 Intersections, Issue 4, CNA news digest of China’s efforts to acquire Western technology, U.S. and partner efforts to protect technology for national security. /Newsletters/Intersections/Issue%204/Intersections-Issue-4.png Issue 4, June 2023 Intersections,  a news digest published by CNA's China and Indo-Pacific Security Affairs Division, describes the interplay between the People's ... . The report  also states that the revised law categorizes cyberattacks as espionage and places all documents, data, material, and items relating to "national security and interests" under the same
Military Dimensions of US China Security Cooperation
/analyses/2010/military-dimensions-of-us-china-security-cooperation
This paper was first presented at the Fifth Annual Conference of the China Maritime Studies Institute at the U.S. Naval War College on 4 – 5 May 2010. It is offered as a CNA paper in advance of the publication of the conference proceedings with the permission of the conference sponsors.
with the permission of the conference sponsors. Introduction and Overview The United States and China have engaged in security cooperation on a variety of international issues since the normalization of relations in 1979. In fact, security cooperation began even before the formal establishment of state-to-state relations. We recall that during the height of the Cold War the two nations demonstrated ... Military Dimensions of US China Security Cooperation The Military Dimensions of U.S. – China Security Cooperation: Retrospective and Future Prospects This paper was first presented at the Fifth
intersections: Issue 13, March 2025
/our-media/newsletters/intersections/issue-13
Intersections is a CNA news digest of China’s efforts to acquire Western technology, and U.S. and partner efforts to protect that technology for national security.
Issue 13 Intersections is a CNA news digest of China’s efforts to acquire Western technology, and U.S. and partner efforts to protect that technology for national security. /Newsletters/Intersections/issue-13/intersections-issue-13-cover.webp Issue 13, March 2025 Written by CNA's China and Indo-Pacific Security Affairs Division, Intersections is a news digest describing the interplay between ... and challenges with military implications. This issue features the emergence of DeepSeek, a large language model (LLM) developed by a PRC start-up, and its security and military implications for US-China
ai and autonomy in russia: Issue 41, June 27, 2022
/our-media/newsletters/ai-and-autonomy-in-russia/issue-41-a
. Petersburg International Economic Forum (SPIEF), available online, and assured them that the 2020s will be a decade of prosperity and economic sovereignty. Achievement of economic sovereignty ... of two sections: ethical AI implementation and development, and personal and information security within AI technology and innovation.  In addition to the new Code of Ethics, there is a new ... of human will and ensur[ing] the lack of discrimination and compliance of the implemented decisions with the legislation.”  Military and Security Russia’s advanced deck-based drone to make maiden
‹ Prev 1 ... 4 5 6 7 8 ... 31 Next ›