Science & Technology

303 Items

Image of Vladimir Putin standing in front of a podium

AP Photo

President Joe Biden delivers remarks about government regulations on artificial intelligence systems during an event in the East Room of the White House, Monday, Oct. 30, 2023, in Washington.

(AP Photo/Evan Vucci)

Policy Brief

Action on AI: Unpacking the Executive Order’s Security Implications and the Road Ahead

| Nov. 08, 2023

On October 30, 2023, President Biden issued the Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence, aimed at realizing the benefits of AI, while mitigating critical risks. This article provides an overview of its key national security initiatives and explores issues relevant to implementation.

Intel semicondictor

The National Interest

Analysis & Opinions - The National Interest

Intel Is Reeling: Why Should the Government Save It?

| Apr. 06, 2023

Why should Washington save Intel? The answer most frequently provided by policymakers is that the U.S. produces no advanced chips, putting it at risk of losing a conflict with China if Taiwan is unable to ship chips across the Pacific. In reality, this is a canard. Peter Wennink, CEO of Dutch lithography giant ASML, dispelled this myth in December, saying that “it is common knowledge that chip technology for purely military applications is usually 10, 15 years old.” America’s warfighting capability is not meaningfully undermined by its lack of production of advanced chips as even platforms like the F-35 fighter jet use only legacy chips.

Sri Lankan port workers hold a Chinese national flag to welcome Chinese research ship

AP/Eranga Jayawardena, File

Analysis & Opinions - Project Syndicate

Peak China?

| Jan. 03, 2023

Joseph Nye writes: From an American perspective, it is just as dangerous to underestimate Chinese power as it is to overestimate it. While hysteria creates fear, discounting China's recent progress and future ambitions could lead the United States to squander its own long-term advantages.

A security guard stands near a sculpture of the Chinese Communist Party flag at the Museum of the Communist Party of China on May 26, 2022, in Beijing.

AP Photo/Ng Han Guan

Journal Article - Quarterly Journal: International Security

Strategic Substitution: China’s Search for Coercive Leverage in the Information Age

    Author:
  • Fiona Cunningham
| Summer 2022

After the mistaken U.S. bombing of the Chinese Embassy in Belgrade in 1999, China turned to information-age weapons to create a risk of escalation to nuclear war with the United States. This shift helps compensate for its conventional military inferiority.

teaser image

Analysis & Opinions

Will Dreams for Equality Be Deferred by Gaps in Technology?

    Author:
  • Francella Ochillo
| Feb. 28, 2022

High broadband access and adoption rates can significantly improve earnings and net worth. Yet, year after year, Black and Brown Americans are among the most disparately impacted by digital inequities, which only contribute to the structural economic disparities that have tormented them for centuries. This tribute to Black History Month explains why historic investments in digital infrastructure are insufficient without transformational broadband policies that support economic resilience in every household.

A boy plays with his toy soldiers inside a school that is being used as a shelter for people who fled the war, in Dnipro city, Ukraine, on Tuesday, April 12, 2022.

AP Photo/Petros Giannakouris

Analysis & Opinions - Offensive Cyber Working Group

Subversion over Offense: Why the Practice of Cyber Conflict Looks Nothing Like Its Theory and What This Means for Strategy and Scholarship

    Author:
  • Lennart Maschmeyer
| Jan. 19, 2022

Cyber attacks are both exciting and terrifying, but the ongoing obsession with ‘cyber warfare’ clouds analysis and hampers strategy development. Much commentary and analysis of cyber conflict continues to use the language of war, where actors use ‘offensive cyber operations’ to meet adversaries in ‘engagements’ striving for victory on the ‘battlefield’ in the ‘cyber domain’. This discourse persists despite a growing consensus that cyber operations are primarily relevant in conflict short of war.

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.