skip to main content
Article Podcast Report Summary Quick Look Video Newsfeed triangle plus sign dropdown arrow Case Study All Search Facebook LinkedIn YouTube

Search Results

Your search for Zack Gold found 22 results.

Inclusive NatSec May 2022
/reports/2022/06/inclusive-natsec-may-2022
CNA's fourth Inclusive National Security event of the year, “Inclusivity in Wargaming and Impacts for Defense Planning,” reflected on opportunities for women in game development and play.
opportunities to build game design experience, and find established game designers to be your champions among their more skeptical peers. Rapporteur: Zack Gold /reports/2022/06
DOD Continuums of Harm
/reports/2021/11/dod-continuums-of-harm
Throughout its history of confronting sexual assault and racial extremism, the Department of Defense has described the perpetrators as “a few bad apples.”
on the individuals engaged in the activities. Zack Gold Megan K. McBride /reports/2021/11/DOD-Continuums-of-Harm.pdf /reports/2021/11/DOD-Continuums-of-Harm.PNG /images/GenericReportImage.jpg Countering Threats
Racial Extremism in the Military
/reports/2021/11/racial-extremism-in-the-military
Before and after January 6, 2021, a series of reports called attention to the potential threat posed by extremists in the military.
that are relevant to the problem of racial extremism and could provide a foundation on which to identify both helpful and unhelpful ways of approaching this issue. Megan K. McBride Zack Gold /reports/2021/11
Countering Domestic Violent Extremism
/reports/2021/03/countering-domestic-violent-extremism
Domestic violent extremism (DVE) is a pressing concern for defense and national security policy-makers. In order to define the issue, place DVE in historical context, and suggest steps to address the problem, CNA’s National Security Seminar convened three of its experts for a discussion titled “Countering DVE: Drivers, Challenges, and What Comes Next.”
 be subdued, not eliminated, and will reemerge periodically Rapporteur: Zack Gold /reports/2021/03/CCP-2021-U-029338-Final.pdf /reports/2021/03/CCP-2021-U-029338-Final.png /images/GenericReportImage.jpg
Implication of Social Media Bots
/reports/2020/09/implication-of-social-media-bots
CNA initiated this study of social media bots—automated programs on social media platforms—to explore their implications for US special operations forces (SOF) and the broader national security community. This report explains social media bots and botnets, explores the threat of automation and the role of social media bots as a tool of disinformation, and introduces a taxonomy of six activities that social media bots and botnets can engage in: distributing, amplifying, distorting, hijacking, flooding, and fracturing. It then identifies likely evolutions in the nearto mid-term futures and explores the implications of those futures for SOF. The report examines opportunities and risks for SOF and concludes with examples of potential SOF use in each of the six identified social media bot and botnet activities.
by humans but could have been conducted by social media bots or botnets. Megan K. McBride Zack Gold /reports/2020/09/DRM-2020-U-028199-Final.pdf /reports/2020/09/DRM-2020-U-028199-Final.png
Working Toward Cooperative Disaster Response
/reports/2019/05/working-toward-cooperative-disaster-response
The Emergency Response Information Exchange (ERIE) discussion was a Combined Joint Task Force-Horn of Africa (CJTF-HOA) sponsored event at Camp Lemonnier, Djibouti, on February 12–14, 2019. It showed numerous ways in which forces of foreign militaries stationed in Djibouti can contribute to the government of Djibouti’s disaster response operations and improve coordination with one another. ERIE explored coordination among the international military forces in Djibouti and the government of Djibouti to support disaster relief operations led by the government of Djibouti. The scenario examined humanitarian assistance and disaster relief (HA/DR) operations in the immediate aftermath of a large-magnitude earthquake that caused extensive damage in Djibouti City. Based on the discussion during ERIE, this research memorandum presents a series of insights and recommendations on the requirements and expectations for coordination and communication among members of the international community assisting in an HA/DR operation in Djibouti.
for public release: distribution unlimited. 5/31/2019 48 DRM-2019-U-019925-Final Zack Gold Jeffrey Becker
Proxy Warfare
/reports/2019/07/proxy-warfare
Proxy warfare—that is, conflict in which a “major power instigates or plays a major role in supporting and directing to a conflict but does only a small portion of the actual fighting itself”—is receiving new attention from policymakers, analysts, and practitioners. This study uses a series of four case studies on US involvement in proxy war (the “Secret War” in Laos, the Contras in Central America, the African Union Mission in Somalia, and the Syrian Defense Forces) to develop a set of key themes. These themes, in turn, form the basis of a set of rules of thumb to guide senior decisionmakers as they contemplate the future use of proxy forces. Finally, this report discusses implications for U.S. Special Operations Forces, which are likely to play an increasingly important role in supporting U.S. proxies.
and adversaries. Cast in that light, it is our hope that these rules of thumb will help the US to most effectively employ proxy forces in the future. William Rosenau Zack Gold /reports/2019/07
Cryptocurrency Implications
/reports/2019/08/cryptocurrency-implications
Cryptocurrencies are strictly digital currencies, are typically overseen by a decentralized peer-to-peer community, and are secured through cryptography. Cryptocurrencies have relative benefits for those who engage in illicit activity. This paper includes: (1) a detailed taxonomy and examples of nefarious activities involving cryptocurrencies, such as funding terrorist activity, money laundering, cybercrimes, and regulatory crimes; (2) a discussion of state-actor engagement in the cryptocurrency arena that explores Iranian, North Korean, Russian, and Venezuelan activity in skirting sanctions, mining cryptocurrencies, participating in exchange hacking and ransomware, and using cryptocurrencies to fund information operations; (3) analysis attempting to anticipate the mid-term future of the cryptocurrency ecosystem; and (4) the tactical and strategic challenges and opportunities of cryptocurrencies for US special operations forces.
challenges and opportunities do cryptocurrencies present to SOF given the current (and potential future) state of affairs? Megan McBride Zack Gold /reports/2019/08/CRM-2019-U-020186-Final.pdf /reports/2019/08
Cryptocurrency Primer for Policymakers
/reports/2019/08/cryptocurrency-primer-for-policymakers
This primer is an effort to address a gap in knowledge about cryptocurrencies and the cryptocurrency ecosystem among the policymaking community and advance the understanding of cryptocurrencies and consideration of their national security implications. Cryptocurrencies are strictly digital currencies, are typically overseen by a decentralized peer-to-peer community, and are secured through cryptography. We use clear, non-technical language to describe complex concepts and demystify overly technical terms in order to explain the technical and economic aspects of cryptocurrency, why they are used, and the benefits and drawbacks to cryptocurrencies compared to conventional currencies—like the US dollar. We conclude by considering some cryptocurrency-related issues of which greater exploration would benefit US national security.
be extremely volatile. Cryptocurrencies typically have longer transaction times. Cryptocurrency transactions are pseudonymous or anonymous. Zack Gold Megan McBride /reports/2019/08
cna talks: Proxy Warfare
/our-media/podcasts/cna-talks/2019/8/proxy-warfare
In this episode, Bill Rosenau and Zack Gold sit down with Kasey Stricklin to discuss their report on proxy warfare. They discuss what makes proxy warfare an attractive option for policymakers, and some of the potential pitfalls. Finally, Bill and Zack point out that in the era of great power competition, proxy warfare is likely to become more frequent.
Proxy Warfare In this episode, Bill Rosenau and Zack Gold sit down with Kasey Stricklin to discuss their report on proxy warfare. They discuss what makes proxy warfare an attractive option for policymakers, and some of the potential pitfalls. Finally, Bill and Zack point out that in the era of great power competition, proxy warfare is likely to become more frequent. Proxy Warfare Bill ... examined threats, governance and diplomacy in Mexico, Guatemala, Colombia, Pakistan, Afghanistan, the Balkans, East Africa and Cuba. Zack Gold  is an expert in U.S. Middle East policy, violent