Search

You searched for: Publishing Institution Center for a New American Security Remove constraint Publishing Institution: Center for a New American Security Political Geography Global Focus Remove constraint Political Geography: Global Focus Publication Year within 25 Years Remove constraint Publication Year: within 25 Years Topic International Security Remove constraint Topic: International Security
Number of results to display per page

Search Results

  • Author: Julia M. Santucci
  • Publication Date: 09-2017
  • Content Type: Special Report
  • Institution: Center for a New American Security
  • Abstract: The Obama administration made efforts to advance gender equality around the world one of its core national security and foreign policy priorities, based on the premise that countries are more stable, secure, and prosperous when women enjoy the same rights as men, participate fully in their countries’ political systems and economies, and live free from violence. A growing body of research makes a compelling case about these links. Former Ambassador-at-Large for Global Women’s Issues Cathy Russell and former National Security Advisor Tom Donilon sum up much of the evidence in this Medium piece, noting that advancing gender equality around the world helps grow global gross domestic product, decreases hunger, strengthens the prospects for peace agreements to succeed, and counters violent extremism.1
  • Topic: International Relations, Gender Issues, International Security
  • Political Geography: Global Focus
  • Author: Adam Klein, Madeline Christian, Matt Olsen, Tristan Campos
  • Publication Date: 08-2017
  • Content Type: Special Report
  • Institution: Center for a New American Security
  • Abstract: Section 702 of the Foreign Intelligence Surveillance Act is an important intelligence tool that will expire on December 31, 2017, unless Congress re-authorizes it. Here’s what it is, and how it works. First, a bit of background: The Foreign Intelligence Surveillance Act of 1978 requires the government to get a court order to intercept the electronic messages of a suspected spy or terrorist on U.S. soil. By contrast, overseas spying took place with no court oversight. That made sense for 20th century technology, because international communications rarely transited the United States. The internet made things far more complicated: now, foreigners’ communications often travel through the United States, or are stored on servers here. That produced an anomaly: FISA was forcing the government to apply Fourth Amendment safeguards when a foreign terrorist or spy’s internet messages passed through the U.S.—even though non-Americans overseas do not have Fourth Amendment rights. This overtaxed the Justice Department and made counterterrorism more difficult. To remedy this, Congress passed the FISA Amendments Act of 2008, which included Section 702. Section 702 creates a middle ground between U.S.-based surveillance under FISA and overseas surveillance by the NSA.
  • Topic: International Relations, International Security
  • Political Geography: Global Focus
  • Author: Edward Fishman, Peter Harrell, Elizabeth Rosenberg
  • Publication Date: 07-2017
  • Content Type: Special Report
  • Institution: Center for a New American Security
  • Abstract: North Korea has emerged as one of the most significant national security threats facing the United States and its allies today. Since leader Kim Jong Un came to power in 2011, North Korea has accelerated the pace of its nuclear tests, and appears to have made substantial progress in developing operational medium-, long-range, and intercontinental ballistic missiles. Many experts assess that if left unchecked, Pyongyang could develop the capability to strike the contiguous United States with a nuclear warhead within 5–10 years. Because of that, in June 2017 U.S. Defense Secretary James Mattis characterized North Korea as “the most urgent and dangerous threat” to U.S. peace and security.
  • Topic: International Relations, International Security, International Affairs
  • Political Geography: North Korea, Global Focus
  • Author: Gregory Allen, Taniel Chan
  • Publication Date: 07-2017
  • Content Type: Special Report
  • Institution: Center for a New American Security
  • Abstract: Partially autonomous and intelligent systems have been used in military technology since at least the Second World War, but advances in machine learning and Artificial Intelligence (AI) represent a turning point in the use of automation in warfare. Though the United States military and intelligence communities are planning for expanded use of AI across their portfolios, many of the most transformative applications of AI have not yet been addressed. In this piece, we propose three goals for developing future policy on AI and national security: preserving U.S. technological leadership, supporting peaceful and commercial use, and mitigating catastrophic risk. By looking at four prior cases of transformative military technology—nuclear, aerospace, cyber, and biotech—we develop lessons learned and recommendations for national security policy toward AI.
  • Topic: Science and Technology, International Security, Military Strategy, Cybersecurity
  • Political Geography: Global Focus
  • Author: Jerry Hendrix, Lt Col James Price
  • Publication Date: 06-2017
  • Content Type: Special Report
  • Institution: Center for a New American Security
  • Abstract: On Christmas Day in 1914, three former cross-channel packet ships, the Engadine, Empress, and Riviera, stood off the island of Heligoland in the North Sea. Under the watchful eye of the Royal Navy cruisers Arethusa and Undaunted, the three ships pulled back the tarps erected on their sterns and forecastles to reveal nine seaplanes. The aircraft – three Short Folders (Short was the company name; Folder was the model and denoted the aircraft’s ability to fold its wings for storage), four Short 74s, and two Short 135s – were assembled and carefully lowered into the water. The Folders had a 67-foot wingspan, were powered by a 160-horsepower engine, and weighed 3,040 pounds fully loaded. The other two models were derivatives of the original Folder and had similar, if not exact, characteristics. Seven of the nine aircraft were able to get airborne (the other two were unable to break the dynamic tension of the water) and headed eastward carrying three 20-pound Hale bombs apiece, each of which contained 4.5 pounds of explosives within 13 pounds of steel guided by aluminum tail fins. Combined, the 21 bombs had less destructive power than one 13-inch shell fired from a British battleship, but these weapons could be taken directly to their targets and dropped precisely on top of them.
  • Topic: International Security, Military Affairs
  • Political Geography: Global Focus
  • Author: Nicholas C. Prime
  • Publication Date: 06-2017
  • Content Type: Special Report
  • Institution: Center for a New American Security
  • Abstract: The U.S. Navy’s updated Cooperative Strategy for 21st Century Seapower outlines several key themes and areas of development for the sea services as they continue the transition from the focus on the land wars in Afghanistan and Iraq.1 Some are new, a few are traditional, and several provide an interesting perspective on previously gestating concepts. One item of particular interest, and the focus herein, is the call to “expand the practice of employing adaptive force packages, which tailor naval capabilities to specific regional environments.”2 This seems like something that should be fairly intuitive, something that should evolve naturally as the sea services adapt to new and challenging circumstances. However, the argument here is meant to suggest something broader, a more conceptual rethink of how the maritime services, collectively, develop and deploy force structure packages. In short, all three maritime services should work toward the creation of an integrated, open framework for force development and deployment. A framework which replaces the practice of haphazard or incoherent deployment of assets, deployments with little or no connection between platforms deployed and overarching strategic aims. Abandoning a practice that indelicately pushes standardized—one size fits most—force packages into meeting unique operational requirements, and instead develop a system that identifies operational requirements and allows the relevant services (even when acting in concert with partner nations) to more precisely match particular capabilities to unique operational requirements.
  • Topic: Defense Policy, International Security
  • Political Geography: Global Focus
  • Author: Ellie Maruyama, Kelsey Hallahan
  • Publication Date: 06-2017
  • Content Type: Special Report
  • Institution: Center for a New American Security
  • Abstract: Terrorist financing entails the raising and moving of funds intended for terrorist causes.1 The number and type of terrorist groups and the threats associated with them have changed over time, but the fundamental need for terrorists to raise, move, and use funds has remained constant.2 Terrorists have displayed adaptability and opportunism in meeting their financing needs, which vary but can be substantial.3 For example, al Qaeda relied on many sources of funding and its pre-9/11 annual budget was an estimated $30 million.4 The Islamic State of Iraq and Syria (ISIS), one of the best-funded terrorist organizations in modern history, approved a $2 billion budget for 2015
  • Topic: Terrorism, International Security
  • Political Geography: Global Focus