Search Results
Your search for International Security found 308 results.
- The Nuclear Programs of Russia China North Korea and Iran
- /analyses/2024/01/the-nuclear-programs-of-russia-china-north-korea-and-iran
- This report analyzes nuclear weapons programs in Russia, China, North Korea, and Iran, including nuclear command and control, R&D, funding, staffing, testing.
- US-allied South Korea. In the post–Cold War time frame, North Korea’s interpretation of the international security environment contributed to the calculus that without nuclear weapons it would be vulnerable ... . Nuclear weapons as ultimate guarantor of sovereignty and security The Soviet Union officially acquired nuclear weapons in 1949 and gradually developed a triad of strategic nuclear forces consisting ... views nuclear weapons as the ultimate guarantor of its security and an insurance policy to protect against nuclear and large-scale conventional attacks. In Russia’s “strategic deterrence” framework
- intersections: Issue 5, August 2023
- /our-media/newsletters/intersections/issue-5
- Intersections, Issue 5, CNA news digest of China’s efforts to acquire Western technology, U.S. and partner efforts to protect technology for national security.
- on the green energy supply chain also links it to PRC-related security issues. According to the International Energy Agency , an intergovernmental organization specializing in the global energy sector ... Issue 5 Intersections, Issue 5, CNA news digest of China’s efforts to acquire Western technology, U.S. and partner efforts to protect technology for national security. /Newsletters/Intersections ... for allegedly providing "state secrets" to foreign clients. In May 2023, PRC authorities conducted a raid against international consulting firm Capvision, which specializes in connecting
- ai and autonomy in russia: Issue 35, April 4, 2022
- /our-media/newsletters/ai-and-autonomy-in-russia/issue-35
- AND SECURITY POM-3 ANTIPERSONNEL MINE USE IN UKRAINE Adding to the growing list of semiautomated devices we are seeing in the Russia-Ukraine war, there is evidence of the Russian use of the POM-3 ... , “Almost a third of information security companies operating in Russia are going to leave the country in the near future and take their staff with them.” GOVERNMENT INITIATIVE TO FUND AI TRAINING ... are jointly developing a line of secure cryptoprocessors for the Internet of Things. These cryptoprocessors, or “computers within computers” help ensure the maximum level of security to protect IoT
- pla update: Issue 16, December 1, 2023
- /our-media/newsletters/pla-update/issue-16
- PLA Update, Issue 16, is a CNA China Studies Program monthly newsletter, with summaries of Chinese media coverage of the Chinese People’s Liberation Army (PLA).
- engagements with various countries and their militaries, including recent bilateral and multilateral exercises, exchanges with international cadets, and deliveries of relief supplies ... by Senior Colonel Xu Kui-a professor at the PLA National Defense University's (NDU) National Security College-that discussed differences between the concepts of war mobilization and national ... enforcement, and maritime security. Since the previous issue of PLA UPDATE , the PLA concluded several bilateral and multilateral exercises with countries around China's land and maritime periphery
- intersections: Issue 4, June 2023
- /our-media/newsletters/intersections/issue-4
- Intersections, Issue 4, CNA news digest of China’s efforts to acquire Western technology, U.S. and partner efforts to protect technology for national security.
- Issue 4 Intersections, Issue 4, CNA news digest of China’s efforts to acquire Western technology, U.S. and partner efforts to protect technology for national security. /Newsletters/Intersections/Issue%204/Intersections-Issue-4.png Issue 4, June 2023 Intersections, a news digest published by CNA's China and Indo-Pacific Security Affairs Division, describes the interplay between the People's ... . The report also states that the revised law categorizes cyberattacks as espionage and places all documents, data, material, and items relating to "national security and interests" under the same
- Military Dimensions of US China Security Cooperation
- /analyses/2010/military-dimensions-of-us-china-security-cooperation
- This paper was first presented at the Fifth Annual Conference of the China Maritime Studies Institute at the U.S. Naval War College on 4 – 5 May 2010. It is offered as a CNA paper in advance of the publication of the conference proceedings with the permission of the conference sponsors.
- with the permission of the conference sponsors. Introduction and Overview The United States and China have engaged in security cooperation on a variety of international issues since the normalization of relations in 1979. In fact, security cooperation began even before the formal establishment of state-to-state relations. We recall that during the height of the Cold War the two nations demonstrated ... Military Dimensions of US China Security Cooperation The Military Dimensions of U.S. – China Security Cooperation: Retrospective and Future Prospects This paper was first presented at the Fifth
- ai with ai: Finding Lenia
- /our-media/podcasts/ai-with-ai/season-3/3-28
- Andy and Dave discuss a white paper from the National Security Commission on AI, on Privacy and Ethics Recommendations for Computing Applications Developed to Mitigate COVID-19. The Office of the Undersecretary of State for Arms Control and International Security issues a second point paper on lethal autonomous weapons systems, with AI, Human-Machine Interaction, and Autonomous Weapons. DARPA announces its Air Space Total Awareness for Rapid Tactical Execution (ASTARTE) program, which aims to use low-cost sensors to create a better common operating picture. The Joint AI Center establishes a Data Governance Council to establish an enterprise-wide data governance framework. The JAIC also releases an AI Primer for DoD officials. The U.S. Patent and Trademark office denies patents on the behalf of AI systems. And Google Health describes the challenges in transitioning to clinical environments a system designed to detect diabetic eye disease. In research from the University of Bordeaux, researchers demonstrate the ability to give algorithms intrinsically-motivated goal exploration to enable them to search out interesting patterns in Lenia, an analog version of Conway's Game of Life. A review paper provides an overview of how neural networks sometimes attempt to "short circuit" learning. Peters, Janzing, and Schölkopf and MIT Press make Elements of Causal Inference available. The International Conference on Learning Representation makes its 2020 session available through a slick interface, covering the nearly 700 papers. And OpenAI releases Jukebox, an attempt to create music of a specified style, when given lyrics.
- Andy and Dave discuss a white paper from the National Security Commission on AI, on Privacy and Ethics Recommendations for Computing Applications Developed to Mitigate COVID-19. The Office of the Undersecretary of State for Arms Control and International Security issues a second point paper on lethal autonomous weapons systems, with AI, Human-Machine Interaction, and Autonomous Weapons. DARPA ... for Computing Applications Developed to Mitigate COVID-19 18 page White paper Announcements / News - "Just" AI Arms Control and International Security Papers Issues Point Paper on AI
- intersections: Issue 13, March 2025
- /our-media/newsletters/intersections/issue-13
- Intersections is a CNA news digest of China’s efforts to acquire Western technology, and U.S. and partner efforts to protect that technology for national security.
- Issue 13 Intersections is a CNA news digest of China’s efforts to acquire Western technology, and U.S. and partner efforts to protect that technology for national security. /Newsletters/Intersections/issue-13/intersections-issue-13-cover.webp Issue 13, March 2025 Written by CNA's China and Indo-Pacific Security Affairs Division, Intersections is a news digest describing the interplay between ... and challenges with military implications. This issue features the emergence of DeepSeek, a large language model (LLM) developed by a PRC start-up, and its security and military implications for US-China
- ai and autonomy in russia: Issue 41, June 27, 2022
- /our-media/newsletters/ai-and-autonomy-in-russia/issue-41-a
- . Petersburg International Economic Forum (SPIEF), available online, and assured them that the 2020s will be a decade of prosperity and economic sovereignty. Achievement of economic sovereignty ... of two sections: ethical AI implementation and development, and personal and information security within AI technology and innovation. In addition to the new Code of Ethics, there is a new ... of human will and ensur[ing] the lack of discrimination and compliance of the implemented decisions with the legislation.” Military and Security Russia’s advanced deck-based drone to make maiden
- china ai and autonomy report: Issue 3, November 18, 2021
- /our-media/newsletters/china-ai-and-autonomy-report/issue-3
- The China AI and Autonomy Report, issue 3, is a biweekly newsletter published by CNA, on artificial intelligence and autonomy in China.
- of the metaverse. The China Institutes of Contemporary International Relations warned that the metaverse could introduce “subtle influence” on a country’s political and cultural security and invite new ... for the metaverse. MILITARY AND NATIONAL SECURITY The media report that a new two-seat J-20 could be used to develop the “loyal wingman” concept for the PLAAF. Janes, a global open-source ... Times , the Personal Information Protection Law, the Cyber Security Law (effective on June 1, 2017), and the Data Security Law (effective on September 1, 2021) together “create a comprehensive