Search Results
Your search for Security Cooperation found 192 results.
- NSS and Forward Presence
- /reports/1994/nss-and-forward-presence
- This paper looks at the political and strategic case for presence and discusses some ofits costs and risks. It draws conclusions about (1) what presence means in our use of the forces we have now and (2) what forces to buy for the future. It also suggests ways to make presence operations more efficient and issues deserving study in that regard.
- NSS and Forward Presence National Security Strategy and Forward Presence: Implications for Acquisition and Use of Forces This paper looks at the political and strategic case for presence ... operations more efficient and issues deserving study in that regard. The post-Cold War national security strategy engages U.S. power in all its forms to shape a more secure world. Overseas ... in an increasingly democratic world. Today's security problems like nuclear proliferation and "regional bad actors" are serious, and the resulting instability that threatens U.S. interests and friends and allies
- Working with the Adversary
- /quick-looks/2023/great-power-competition-and-nuclear-risk-management
- Great power nuclear cooperation is more likely when relative gains are not seen as relevant, policymaker time horizons are long, and cheating is hard to hide.
- benefits from cooperation. Non-proliferation and nuclear safety and security agreements are good historical examples. Decline short-term advantages during the pursuit of long-term agreements ... Great Power Competition and Nuclear Risk Management Great power nuclear cooperation is more likely when relative gains are not seen as relevant, policymaker time horizons are long, and cheating ... 1955 Open Skies proposal The 1958–61 nuclear test moratorium 1964–66 US-Soviet agreement on NATO nuclear sharing Key Findings Risk-reducing great power nuclear cooperation is more likely
- Quantity Has a Quality All of Its Own
- /analyses/2025/05/quantity-has-a-quality-all-of-its-own
- Since the full-scale invasion of Ukraine, Russian intelligence operations have shifted toward a mass-scale approach, focusing on sabotage, intelligence collection, and influence efforts.
- , and global security. The shift from quality to quantity Historically, Soviet intelligence operations during the era of the KGB (the Russian Committee for State Security) were marked ... and global security The shift toward quantity-driven intelligence tactics poses significant challenges for global law enforcement and counterintelligence efforts. Although mass-scale, less specialized operations reduce precision and increase the risk of failure, they can cause widespread damage, casualties, and fear. From a broader security perspective, the shift from quality to quantity
- ai and autonomy in russia: Special Issue, September 8, 2022
- /our-media/newsletters/ai-and-autonomy-in-russia/special-issue
- September 8, 2022 issue features translations of several Russian military journal articles that reflect on the use of AI and autonomy. All have been written since the Russian invasion of Ukraine.
- , transformation, non-military measures, military activity, technologies, informational confrontation, sea-air-space, theater of operations, noncontact warfare, national security. The ongoing global ... . The importance of operations to ensure the security of the territory and the population from various destructive impacts on critical infrastructure facilities will increase. It is expected ... is the weapon of tomorrow. It is for this purpose that the super-giant center belonging to the National Security Agency exists in Utah, put into operation in terms of its information capacity
- china ai and autonomy report: Issue 6, January 13, 2022
- /our-media/newsletters/china-ai-and-autonomy-report/issue-6
- The China AI and Autonomy Report, issue 6, is a biweekly newsletter published by CNA, on artificial intelligence and autonomy in China.
- AND NATIONAL SECURITY The Washington Post carried an extensive article on US government concerns over the possibility that foreign investors are inadvertently helping the People’s Liberation Army ... and AI giant Baidu has signed a cooperation agreement to become a “lunar exploration and aerospace engineering artificial intelligence global strategic partner" with the China National Space ... Control, stated that the five permanent members of the United Nations Security Council (P5) should talk “more directly” about global security (see article here ). According to Fu, “strategic
- pla update: Issue 4, May 2, 2022
- /our-media/newsletters/pla-update/issue-4
- PLA Update, Issue 4, is a CNA China Studies Program monthly newsletter, with summaries of Chinese media coverage of the Chinese People’s Liberation Army (PLA).
- of the Chinese People’s Liberation Army (PLA). Each edition of this newsletter draws on the expertise of CNA’s China and Indo-Pacific Security Affairs Division to gather information and provide an update ... Minghai, a professor at the PLA NDU National Security College War and Crisis Response Training Center, claiming that cognitive warfare is the "essence" of the confrontation between Russia and Ukraine ... nomination guidelines for the medal, urging units to select model figures who have made outstanding contributions to safeguarding national sovereignty, security, and development interests, while advancing
- The Trans Sahara Counter Terrorism Partnership
- /reports/2014/the-trans-sahara-counter-terrorism-partnership
- The Trans Sahara Counter Terrorism Partnership (TSCTP) is a multiyear, interagency program aimed at countering terrorism (CT) and countering violent extremism (CVE) in the Sahel and Maghreb. By U.S. government standards, TSCTP is an exceptional program for its ability to marshal interagency resources in support of a multifaceted approach to regional security that spans the “3Ds” – Diplomacy, Defense, and Development. However, like many other foreign assistance programs, TSCTP is not without planning and implementation challenges, which will be detailed in this study.
- , and to counter terrorism (CT) by building long-term security force counterterrorism capacity and regional security cooperation. By U.S. government standards, TSCTP is an exceptional program for its ability to marshal interagency resources in support of a regional security approach that spans the “3Ds” – Diplomacy, Defense, and Development. The program covers ten countries in the Sahel and Maghreb: Algeria ... is an exceptional program for its ability to marshal interagency resources in support of a multifaceted approach to regional security that spans the “3Ds” – Diplomacy, Defense, and Development. However, like
- Chinese Information Shaping in Vietnam
- /reports/2020/09/chinese-information-shaping-in-vietnam
- The Chinese Communist Party (CCP) has embarked on a campaign to shape what audiences around the world read, hear, and watch about China. This focuses on China’s efforts to shape information in its neighbor, Vietnam.
- for distribution of PRC media content: Despite their efforts to achieve greater cooperation with Vietnamese counterparts, PRC media outlets have had very limited success to date—securing only one content-sharing agreement that is limited to Englishlanguage news content. Hosting training and cooperation forums in an effort to influence how the Vietnamese media reports on China: Vietnamese central-level media officials have participated in Chinaled international media forums and training programs such as the Lancang-Mekong Media Cooperation Summit. However, their level of participation appears
- china ai and autonomy report: Issue 16, June 2, 2022
- /our-media/newsletters/china-ai-and-autonomy-report/issue-16
- The China AI and Autonomy Report, issue 16, is a biweekly newsletter published by CNA, on artificial intelligence and autonomy in China.
- victory. These include the peacetime prepositioning of naval forces, the use of naval deterrence, controlling sea lines of communications, and maritime security governance. Research and Development ... Automated Driving Demonstration Area, a 60-square kilometer area of the city. International Cooperation Alibaba Cloud opens a data center for AI and machine learning in Frankfurt, Germany. [19 ... with German rules for cloud-based data security known as C5, which stands for Cloud Computing Compliance Controls Catalog . [21] Notes [1] Liang Xiaobo, "Cognitive Domain Operations
- Maintaining the Technology Edge: Strengthening US and Indo-Pacific Alliances to Counter Chinese Technology Acquisition
- /quick-looks/2021/countering-china-technology-acquisitions
- Article outlining ways the US can address the issue of countering Chinese advanced technology acquisition with the assistance of and close policy coordination with Australia, Japan and South Korea.
- acquisition strategy. As US treaty allies, cooperation among these three countries entails the sharing of data and very sensitive advanced technologies with national security and military applications ... and advanced technology within their own countries. Similar to the US, these allies are taking measures to balance the benefits of economic cooperation with China while seeking to protect national security industries and interests. Finding the right balance is crucial to maintaining a robust alliance with Washington. The US cannot continue to address the issue of countering Chinese advanced