skip to main content
ArticlePodcastReportQuick LookVideotriangleplus sign dropdown arrow Case Study All Newsfeed

Search Results

Your search for Maritime Security found 100 results.

Mark Rosen
/about-us/leadership/office-of-the-president/mark-rosen
Mark Rosen is Senior VP and General Counsel for CNA. He was worked in legal roles for the Dept. of Homeland Security and the U.S. Navy, retiring as a captain.
Mark Rosen Mark Rosen is Senior VP and General Counsel for CNA. He was worked in legal roles for the Dept. of Homeland Security and the U.S. Navy, retiring as a captain. Mark E. Rosen Senior Vice President, General Counsel, and Board Secretary /images/About-Us/Leadership/rosen.png Mark E. Rosen, an international and national security lawyer, is senior vice president, general counsel, and board ... international and operational law studies in such areas as maritime disputes, law of the sea, law of armed conflict, international agreements, and arms control. Rosen holds an adjunct faculty appointment
Eric Thompson
/about-us/leadership/center-for-naval-analyses/eric-thompson
, and the Levant, working closely with U.S. and regional military and civilian leadership. His most recent work has addressed counterterrorism operations, security cooperation activities, military-to-military relations with Egypt, interoperability with Turkish and Algerian maritime forces, and coalition building for military operations in the CENTCOM region. Dr. Thompson's research and analysis extends ... , the use of distance learning technology in preparing for coalition operations, the effectiveness of Partnership for Peace programs, and future security cooperation priorities for the U.S. military
ai and autonomy in russia: Issue 43, August 8, 2022
/our-media/newsletters/ai-and-autonomy-in-russia/issue-43
the efficiency of public administration through implementation of a unified policy around digital technologies and government support. MILITARY AND SECURITY RUSSIAN MILITARY CONTINUES USING UAVS ... Poseidon nuclear-powered underwater drones. Belgorod, the world’s largest submarine at 184 meters long, is designed for undersea research and maritime search and rescue operations, and can carry on board ... entities on robotics, information security, biotechnical systems, and AI. We wrote in Newsletter 37 about ERA’s emerging role as a key AI research and development hub. In April 2022, then-Deputy Prime
ai and autonomy in russia: Issue 36, April 18, 2022
/our-media/newsletters/ai-and-autonomy-in-russia/issue-36
of the efforts is challenged by the absence of adequately qualified personnel. MILITARY AND SECURITY‌ RUSSIAN MILITARY CONTINUES DRILLS IN RECONNAISSANCE FIRE/STRIKE COMPLEXES The Russian military ... developments. CNA’s May 2021 report AI and Autonomy in Russia discussed the development of different unmanned, autonomous, and robotic aerial, ground, and maritime systems, along with military AI systems ... , if a specialist wants to leave Russia for employment in a foreign company, he or she must obtain permission from the Federal Security Service (FSB). Alternatively, if they just want to leave the country in general
ai and autonomy in russia: Issue 32, February 21, 2022
/our-media/newsletters/ai-and-autonomy-in-russia/issue-32
for the Safe City program proposed by the Ministry of Emergency Situations. This platform would “unite all urban and commercial security systems of the country ["facial recognition, traffic analysis cameras ... to plug it into a unified system. The opposition is built on concerns about costs for program implementation in the regions as well as the challenges of plugging commercial (or private) security systems into a unified government system. MILITARY AND SECURITY‌ RUSSIAN DEFENSE MANUFACTURER IS BULLISH ON LONG-RANGE COMBAT DRONES Russia’s largest drone-manufacturing company sees UAV production
pla update: Issue 6, September 30, 2022
/our-media/newsletters/pla-update/issue-6
A monthly newsletter focused on the internal and external affairs of the PLA
). Each edition of this newsletter draws on the expertise of CNA’s China and Indo-Pacific Security Affairs Division to gather information and provide an update on important developments in the PLA ... ), maritime rights protection, and the suppression of domestic unrest. The new NWMA guidelines, which have not been made public, reportedly feature sections on organization and command, types ... with emergencies, protect people’s life and property, safeguard national sovereignty, security, and development interests, maintain regional and world peace and stability, innovate the way the armed forces
Economic Statecraft China
/reports/2020/08/economic-statecraft-china
The People’s Republic of China (PRC) pursues its national security objectives through a wide variety of cross-domain activities. The PRC’s legal economic statecraft activities are connected directly to China’s growing military power. China’s legal means of obtaining technology damages the technological superiority of the United States and its partners and allies. This report illustrates the pathways by which China legally acquires foreign technology and builds capabilities to support its national security objectives. These pathways include: (1) trade, (2) market access requirements, (3) overseas investment, and (4) the transfer of human capital. This report also identifies key challenges for the United States in countering China’s efforts. First, the PRC is ambitious and adapts it economic techniques to deal with changing regulatory environments. Second, the United States has multiple “leakage points” that provide avenues for the PRC to access emerging technology. Third, China offers appealing incentives that put the US and other countries as risk of technology loss. Thus, a comprehensive strategy for technology protection is needed to address China’s foreign technology acquisition.
Economic Statecraft China Economic Statecraft: How China Legally Accesses Foreign Technologies to Build Military Capabilities The People’s Republic of China (PRC) pursues its national security ... capabilities to support its national security objectives. These pathways include: (1) trade, (2) market access requirements, (3) overseas investment, and (4) the transfer of human capital. This report also ... that the People’s Republic of China (PRC) uses to obtain foreign technology and build capabilities in support of China’s national security objectives. The report is intended to help readers recognize
China Military Support Facility in Djibouti
/reports/2017/china-military-support-facility-in-djibouti
In November 2015, China publicly acknowledged for the first time that it is building its first overseas military facility in Djibouti, which is also home to the largest U.S. military installation in Africa. How did China come to establish its first overseas military support facility in Djibouti? What do we know about this facility and how it might be used, and what insights can we glean from the process to better understand where China’s military might go next? This paper provides a preliminary look at the origins of China’s military support facility in Djibouti. It explores the evolution of the economic and security relations between the two countries that led to the establishment of the facility, how it may be used, and what it may tell us about future Chinese military facilities abroad. It also assesses the implications of the growing economic and military ties between the two countries for the United States and the U.S. Navy.
China Military Support Facility in Djibouti China’s Military Support Facility in Djibouti: The Economic and Security Dimensions of China’s First Overseas Base In November 2015, China publicly ... ’s military might go next? This paper provides a preliminary look at the origins of China’s military support facility in Djibouti. It explores the evolution of the economic and security relations ... a fundamental shift in China’s foreign and security policy. China’s leaders have long used its lack of overseas military facilities as a means to differentiate its economic expansion from that of Western
coming in from the cold: The Cold War at the Top of the World
/our-media/podcasts/coming-in-from-the-cold/14
On this episode of Coming in from the Cold, Bill and his guests put the cold in Cold War. Steve Wills returns along with Josh Tallis to discuss the history of the Cold War in the Arctic and its implications for modern Arctic security.
14 On this episode of Coming in from the Cold, Bill and his guests put the cold in Cold War. Steve Wills returns along with Josh Tallis to discuss the history of the Cold War in the Arctic and its implications for modern Arctic security. The Cold War at the Top of the World Biographies Joshua Tallis  is a Research Scientist specializing in maritime security, irregular threats, and issues of naval and national security strategy. Josh also served as the CNA field representative to Carrier Strike Group EIGHT during the Navy's first instantiation of Dynamic Force Employment in the High
AI and Autonomy in Russia Issue 27
/reports/2021/12/ai-and-autonomy-in-russia-issue-27
CNA provides information and analysis of the field of civilian and military AI in Russia and how Russia is applying AI to its military capabilities. Issue 27.
is pushing military AI and autonomy in the maritime domain. Russia advances in international supercomputer rankings because of new Yandex and Sber additions. Studies point to reasons for Russia's ... anonymized data bases" because "in current conditions any attempt to establish a monopoly on data limits free competition and economic development." Security of personal citizen information needs ... for Russia's Federal Security Service, highlighted the potential that AI in the hands of terrorists could pose a threat to society. He argued for international cooperation to develop rules to cope