Number of results to display per page
Search Results
102. A Transatlantic Perspective on Natural Gas Security in Central and Southeastern Europe
- Author:
- David Koranyi
- Publication Date:
- 10-2013
- Content Type:
- Policy Brief
- Institution:
- Atlantic Council
- Abstract:
- The fundamentals of the natural gas sectors of the United States and European Union (EU) are on divergent paths. While the US prepares for gas exports on the back of the unconventional gas revolution, Europe is facing declining indigenous production and growing dependence on imports. The Central and Southeastern Europe (CSEE) region has moved closer to integrate into the EU's internal energy market, but it remains in a vulnerable position in the short-term compared to the rest of the EU and especially the US due to the region's historic exposure to Gazprom's monopolistic abuse. A concerted US, EU, and regional effort is needed to implement a diversification strategy, where US liquefied natural gas (LNG) exports could make a real difference. In the medium and long run, the region can benefit from and play a crucial role in Europe's gas supply diversification strategy and may even succeed in adapting the US unconventional experience, contributing to a healthier energy import balance on the continent.
- Topic:
- Economics, Energy Policy, Science and Technology, and Natural Resources
- Political Geography:
- United States, Europe, and North America
103. To judge NSA reforms, look to the tech industry
- Author:
- Mieke Eoyang
- Publication Date:
- 01-2013
- Content Type:
- Working Paper
- Institution:
- Third Way
- Abstract:
- In 1976, Senator Edward Kennedy first introduced the Foreign Intelligence Surveillance Act to rein in government scrutiny of Americans. That law made America’s telecommunications companies the gatekeepers of the public’s information. But back then, “Ma Bell” was still around — AT&T wasn’t broken up until 1982 — and mobile phones were a distant dream. Now, nearly 40 years and a tech revolution later, President Obama faced similar questions on how to protect the American people’s privacy.
- Topic:
- Security, Defense Policy, Science and Technology, Surveillance, and Civil Liberties
- Political Geography:
- United States and North America
104. The US Cyber Policy Reboot
- Author:
- Jason Healey
- Publication Date:
- 04-2012
- Content Type:
- Policy Brief
- Institution:
- Atlantic Council
- Abstract:
- Over the course of 2011, the United States government released a coordinated set of policies that represents the most energetic cyber statecraft in nearly a decade.
- Topic:
- Security, Defense Policy, and Science and Technology
- Political Geography:
- United States and North America
105. Drones in Our World, Part III: Non-Kinetic Solutions
- Author:
- Whitney Grespin
- Publication Date:
- 05-2012
- Content Type:
- Working Paper
- Institution:
- The Diplomatic Courier
- Abstract:
- Drone strikes on militants capture the negative headlines, but increasingly UAVs are winning fans amongst war fighters and civilians by other means. From providing eyes in the sky to taking on high-risk life support missions, the use of unmanned platforms is growing with no slowdown in sight. There are five fronts where UAVs are supporting the troops in ways that exploit their capabilities beyond offensive missions: surveillance/reconnaissance, intelligence, logistics, chronological reach back, and perhaps most surprisingly, community engagement. While context specific intelligence analysis is inseparable from its acquisition via surveillance and reconnaissance missions, it is separable for the purpose of this discussion about UAVs and how they are challenging traditional practices. UAVs can be both tactical and strategic assets – they are not only informing today’s missions, and they do not solely provide data that informs theater level decision making. These systems are achieving both tactical and strategic objectives, and they are sometimes doing so with the same machine in the same mission.
- Topic:
- Intelligence, Science and Technology, Military Strategy, and Drones
- Political Geography:
- North America and United States of America
106. Storm Clouds on the Horizon: A Possible New Cold War With China
- Author:
- Paul Nash
- Publication Date:
- 06-2012
- Content Type:
- Working Paper
- Institution:
- The Diplomatic Courier
- Abstract:
- “Red China’s sub fleet can prove a major threat to American ships,” wrote Albert Ravenholt for the Chicago Daily News Service in 1964, referring to Mao’s underwater menace to American naval forces assembling in the South China Sea off the coast of Vietnam. The communist submarines, supplied by the Russians, were stationed on Hainan Island, at the southernmost tip of the Chinese mainland, across the Gulf of Tonkin. At the time, China was estimated to have between 30 and 40 in operation, the fourth largest fleet after the U.S.S.R, the United States and Great Britain. Nearly 48 years on, much has changed and yet much continues on the same trajectory. When Ravenholt, who set about becoming a reporter in Shanghai in the 1940s during the Second Sino-Japanese war, died at the age of 90 in 2010, China remained Red, even though its ideological hue had turned arguably more nationalistic after three decades of rising prosperity. China has modernized its military in tandem with its economic growth. It has committed itself to significant military spending, endeavouring to catch up to the West’s technological prowess by building advanced precision-guided munitions, anti-satellite and cyber-warfare capabilities. Last year, it unveiled the Chengdu J-20 stealth fighter jet, which is expected to go into service in 2017-19. It has also set up a land-based anti-ship missile system to limit the ability of other nations to navigate freely in regional waters, including those around the disputed Paracel and Spratly Islands, which it estimates may contain the world’s fourth largest reserve of oil and natural gas.
- Topic:
- International Cooperation, Science and Technology, Military Strategy, and Conflict
- Political Geography:
- United States, China, Asia, and North America
107. Drones in Our World, Part IV: Adapting a Warfighter
- Author:
- Whitney Grespin
- Publication Date:
- 08-2012
- Content Type:
- Working Paper
- Institution:
- The Diplomatic Courier
- Abstract:
- Aerial surveillance and remote sensing are nothing new in the world of combat reconnaissance, but they are new tools in the arsenal of the humanitarian relief and development communities. And they are rapidly evolving. Complex, disaster, and rapidly evolving environments all require the capability to promptly collect, analyze, and disseminate critical information that UAVs can gather and exploit in ways and quantities that other resources cannot rival.
- Topic:
- Science and Technology, Military Strategy, Drones, Humanitarian Intervention, and Conflict
- Political Geography:
- North America and United States of America
108. Toward Greater Pragmatism? China\'s Approach to Innovation and Standardization
- Author:
- Dieter Ernst
- Publication Date:
- 08-2011
- Content Type:
- Policy Brief
- Institution:
- University of California Institute on Global Conflict and Cooperation (IGCC)
- Abstract:
- China\'s innovation policy and its perceived threat to American innovation and competitiveness is a hot topic in U.S.-China economic relations. The role of standardization, together with intellectual property rights and government procurement, are at the center of this conflict. Fundamental differences in their levels of development and economic institutions lead to quite different approaches to standards and innovation policy by the two countries. China\'s strategy of pursuing indigenous innovation based on local standards faces internal challenges in trying to bring together a diverse group of stakeholders with conflicting interests, as well as external pressures to adopt international standards. Enhanced cooperation on standards and innovation policies should be possible, once the United States and China accept that, while their economic and innovation systems are different, they are deeply interdependent. Both sides would benefit, creating new Chinese markets for American firms and easing technology licensing restrictions for Chinese firms.
- Topic:
- Economics, International Trade and Finance, Science and Technology, and Bilateral Relations
- Political Geography:
- United States, China, America, Asia, and North America
109. The Five Futures of Cyber Conflict and Cooperation
- Author:
- Jason Healey
- Publication Date:
- 12-2011
- Content Type:
- Policy Brief
- Institution:
- Atlantic Council
- Abstract:
- The word cyberspace is nearly thirty years old, and during that time, academics, theorists, and strategists have been considering how conflict will unfold in this new domain .As yet, though, little has been published on what kinds of different futures may await us .For example, many writers seem to imply that cyberspace itself is relatively static, when it is in fact constantly transformed through changes in usage and technology. Indeed, today's generation of digital natives has never known a world without the Internet, and their experience of cyberspace—especially in terms of security, privacy, and collaboration—will be very different from that of previous generations weaned on mainframes, modems, desktop computers, and AOL. If cyberspace is different and younger generations use it differently, then future conflict and cooperation in cyberspace may be unlike anything experienced or even envisioned by Cold War-era thinkers and strategists.
- Topic:
- Defense Policy, Science and Technology, Terrorism, and International Security
- Political Geography:
- North America
110. Cyber Security: An Integrated Governmental Strategy for Progress
- Author:
- Franklin D. Kramer
- Publication Date:
- 09-2010
- Content Type:
- Policy Brief
- Institution:
- Atlantic Council
- Abstract:
- Cyber security has emerged as a critical challenge in an era defined by global interconnectedness and digital information. While there are multiple ongoing efforts that seek to enhance cyber security, an integrated governmental strategy to meet that challenge has only begun and has yet fully to take shape. All strategies demand recognition of risk and prioritization of resources, and cyber strategy will be no different.
- Topic:
- Defense Policy, Intelligence, Science and Technology, and Terrorism
- Political Geography:
- United States and North America