Articles & Multimedia
Showing 1-20 of 115 Publications
-
CommentaryChina’s Quantum Future
China should be a “global leader in innovation” by 2035, President Xi Jinping declared during the Chinese Communist Party’s 19th National Congress last October. His remarks re...
By Elsa B. Kania
-
PodcastTechnology and Innovation in an Era of U.S.-China Strategic Competition
China has taken significant steps to implement national strategies and encourage investment aimed at surpassing the U.S. in high-tech fields like artificial intelligence. In t...
By Elsa B. Kania
-
CommentaryDefence innovation is critical for the future of the Australia–US alliance
The outcome of the recent AUSMIN meeting—the annual gathering of the secretaries of state and defence from the United States and the foreign and defence ministers from Austral...
By Daniel Kliman & Brendan Thomas-Noone
-
CommentaryHow the Five Eyes Can Harness Commercial Innovation
Earlier this year, the United Kingdom, Australia, Canada and New Zealand – which along with the United States are members of the “Five Eyes” alliance – came together to collec...
By Daniel Kliman & Brendan Thomas-Noone
-
CommentaryCyber and Space Weapons Are Making Nuclear Deterrence Trickier
Stability was an overriding concern at last week’s Senate Foreign Relations Committee hearing on nuclear command authority, the first in four decades. Senators wondered aloud ...
By Richard Fontaine & James N. Miller, Jr.
-
CommentaryMore Training Won’t Reduce Your Cyber Risk
How many times have you had to watch your company’s latest cybersecurity training video? An entire industry now exists to train us humans to be smarter in how we operate compu...
By Michael Sulmeyer & Mari Dugas
-
CommentaryThe Leap Into Quantum Technology: A Primer for National Security Professionals
China recently announced the launch of its Jinan Project, a quantum information effort billed as “the world’s first unhackable computer network.” Building on its launch last y...
By Richard Fontaine & Michael J. Biercuk
-
PodcastA Conversation with the 2017 NCCDC Champions
Christian Beam and Justin Wright are two members of Cyber Dawgs, the champions from this year's National Collegiate Cyber Defense Competition. Beam and Wright stopped by to di...
By Amy Schafer
-
CommentaryBuilding a cyber ROTC
In the past week, crippling cyberattacks have been directed at Ukraine — targeting banks, the postal service, the airport in Kiev, and other major industries, disrupting the d...
By Michèle Flournoy & Amy Schafer
-
VideoCNAS 2017: Surveillance and Privacy: Can They Coexist?
Electronic surveillance is vital for counter-terrorism and other intelligence missions. Some argue, however, that a growing “surveillance state” threatens Americans’ privacy a...
By Adam Klein
-
Adam Klein before the Senate Committee on the Judiciary
Principal Findings Section 702 is a valuable intelligence tool that is legitimate in its basic contours and subject to adequate oversight and transparency in most respects. It...
By Adam Klein
-
PodcastDrones Podcast Series: Patterns of Proliferation
Dan Gettinger of the Center for the Study of the Drone, UPenn Professor Mike Horowitz, and CNAS Research Associate Alexandra Sander join Paul Scharre to discuss patterns of dr...
-
Countering disinformation online will require long-term engagement from the feds
Technology companies and DC policymakers are lost in the fog of disinformation. Bombarded with too much information from too many refutable sources, they have responded in a p...
By Madeline Christian
-
Russia is still waging cyberwar against Western democracy. It’s time to push back.
The West can breathe a sigh of relief. Emmanuel Macron has won the French presidential election, despite yet another Russian intervention in support of a candidate (Marine Le ...
By Matt Olsen & Edward Fishman
-
The Smart Move for the DOD on Smartphoness
President Trump’s reluctance to give up his personal smartphone following his inauguration is well documented. It’s also understandable. The highly modified, top secret, certi...
By Alexandra Sander
-
Today’s Big News About “Backdoor Searches”
One of the most hotly debated aspects of Section 702 is the practice of querying 702-acquired data using U.S.-person identifiers—in particular, queries conducted by the FBI in...
By Adam Klein
-
The End of “About” Collection under Section 702
As Bobby and others have already noted, the NSA announced Friday that it is ending “about” collection under Section 702’s upstream component. I won’t rehash the basics here; r...
By Adam Klein
-
Don’t Dismiss Concerns about Transition-Period Unmasking (At Least Not Yet)
The aftermath of the 2016 election has spun off yet another divisive issue: Whether White House officials inappropriately requested the identities of Trump transition aides wh...
By Adam Klein
-
CommentaryBipartisan Investigations: How the 9/11 Commission Did It
Whatever your political outlook, the ferment surrounding last year’s presidential election raises important, unanswered questions: What, precisely, did the Russians do, and we...
By Adam Klein & Chris Kojm
-
Takeaways from House Intel Hearing on Russian “Active Measures”
Today’s just-concluded HPSCI hearing provided an informative, remarkably varied tour d’horizon of issues related to Russian interference in the 2016 election. The biggest head...
By Adam Klein