-
Expanding Domestic Manufacturing of Secure, Custom Chips for Defense Needs
DARPA announced the Structured Array Hardware for Automatically Realized Applications (SAHARA) program, which aims to expand access to domestic manufacturing capabilities to tackle challenges hampering the secure development of custom chips for defense systems. DARPA selected Intel and university researchers to automate conversion of Structured ASICs with leading-edge, domestic foundry capabilities for defense electronic systems.
-
-
America's Place in Cyberspace: The Biden Administration’s Cyber Strategy Takes Shape
In cyber policy, the SolarWinds and Microsoft hacks have dominated the first weeks of President Joseph Biden’s administration. Even so, the administration has outlined its cyber strategy in speeches by President Biden and Secretary of State Antony Blinken and in the president’s Interim Strategic National Security Guidance [PDF]. The emerging strategy is anchored in, and is reflective of, the ideological, geopolitical, technological, and diplomatic pillars of Biden’s broader vision for U.S. foreign policy and national security.
-
-
Syria's Hospitals Face Systematic Attacks: Report
Over the past decade, hospitals across Syria have been attacked more than 400 times. The attacks formed part of a larger strategy by the Assad regime and Russia to cripple access to medical facilities in rebel-held areas.
-
-
China Speeding Up Plans to Overtake U.S. on World Stage, Says U.S. Commander
The inability of the United States to adequately push back against China’s growing military might is spurring Beijing to accelerate its plans to remake the current international order in its image, a top U.S. military commander told lawmakers Tuesday.
-
-
The “Red Line” That Wasn’t
Syrian President Bashar al-Assad’s use of chemical weapons (CW) against his own people is the greatest challenge the Chemical Weapons Convention has ever faced. This breach of the taboo against CW use sparked numerous national and international investigations to determine the details of exactly what happened and who had done it. Joby Warrick’s Red Line is a useful addition to this debate, but the definitive book on the use of chemical weapons in the Syrian civil war remains to be written.
-
-
China’s Military Tech Ambitions – What’s the U.S.- EU Gameplan?
A key test of the Biden era of transatlantic relations will be the issue of how the United States and the European Union respond to China’s aggressive efforts to seize market share and industrial knowledge in areas of technology that are critical to national security. Kathleen Doherty writes that the Europeans are divided and have been reluctant to rein in Chinese technological capabilities and ambitions. “The United States and the European Union (EU) have no time to waste in finding a common (or at least complementary) approach.”
-
-
Economics, National Security, and the Competition with China
The world has faced the financial crisis and the coronavirus epidemic, but now, George Magnus, writes, it has been presented with a third existential shock that is the defining drama of these early decades of the 21st century: a more truculent and assertive China. China, once viewed by liberal-leaning democracies simply as a formidable consumer and feisty competitor, has also grown and changed over the last decade to become an economic and national security adversary with which the United States has locked horns in ideological and strategic competition.
-
-
Biden Orders Review to Bolster Supply Chain Resiliency
President Joe Biden signed an executive order on Wednesday to formally order a 100-day government review of global supply chains and potential U.S. vulnerabilities in key industries including computer chips, electric vehicle batteries, pharmaceuticals and critical minerals used in electronics. On top of the 100-day review of these four key industries, Biden’s order also directs yearlong reviews for six sectors: defense, public health, information technology, transportation, energy and food production.
-
-
Security Threats which Bind Us
The Converging Risks Lab of the Council on Strategic Risks (CSR) released a report last week which identifies ecological disruption as a major and underappreciated security threat and calls on the United States to reboot its national security architecture and doctrine to better respond to this evolving threat landscape.
-
-
Swarming Drones Concept Flies Closer to Reality
A swarm of twenty drones has recently completed the largest collaborative, military-focused evaluation of swarming uncrewed aerial vehicles (UAVs) in the U.K. The exercise was the culmination of the Defense Science and Technology Laboratory’s (DSTL) “Many Drones Make Light Work” competition
-
-
Robot Seeks Out Chemical Agents
Scientists have successfully tested a fully autonomous robot that will help defense and security personnel dealing with hazardous scenes. The development of the robot means that humans and machines can now share the burden of detecting and report dangerous chemicals over large areas.
-
-
U.S. Grand Strategy of Restraint: Advocates Need to Provide More Details
As the Biden Administration takes over, some U.S. policymakers have expressed interest in a new approach to America’s role in the world: a realist grand strategy of restraint under which the United States would cooperate more with other powers, reduce its forward military presence and end or renegotiate some security commitments. A new report explains how U.S. regional security policies would change if this strategy were adopted.
-
-
An Avalanche of Violence: Revealing Predictable Patterns in Armed Conflicts
New research finds that human conflict exhibits remarkable regularity despite substantial geographic and cultural differences.
-
-
Israel, Cyberattacks and International Law
Recently, several cyberattacks have hit Israeli companies. While Israel has not yet publicly attributed the attacks to any foreign state, media outlets report that Israeli cybersecurity experts have tied the operations of the main hacker groups behind these attacks—BlackShadow and Pay2Kitten—to Iran. Tal Mimran and Yuval Shany write that in response, Israel seems to be increasingly turning toward international law to guide its approach to hostile activities in cyberspace
-
-
Israel, Cyberattacks and International Law
Recently, several cyberattacks have hit Israeli companies. While Israel has not yet publicly attributed the attacks to any foreign state, media outlets report that Israeli cybersecurity experts have tied the operations of the main hacker groups behind these attacks—BlackShadow and Pay2Kitten—to Iran. Tal Mimran and Yuval Shany write that in response, Israel seems to be increasingly turning toward international law to guide its approach to hostile activities in cyberspace
-
More headlines
The long view
Time to Reassess the Costs of Euro-Atlantic Security
The undeniable truth is that security comes at a cost. If Europeans fail to invest more now to deter Russia and China, the alliance will face far greater expenses and risks. The problem is that Europeans, with few exceptions, fail to grasp the immense costs such a scenario would inflict on allied security.