Content

CHINESE DISCOURSE POWER: ASPIRATIONS, REALITY, AND AMBITIONS IN THE DIGITAL DOMAIN

In-Depth Research & Reports

Aug 24, 2022

Chinese discourse power: Ambitions and reality in the digital domain

By Kenton Thibaut

The CCP has embarked on a concerted strategy to gain control over the global digital and information environment. Its goal: create an alternative global order with China at its heart.

China
Digital Policy
NATO, Finland and Sweden

Issue Brief

Aug 22, 2022

Sweden and Finland are on their way to NATO membership. Here’s what needs to happen next.

By John R. Deni

In response to Russia's unprovoked invasion of Ukraine, Finland and Sweden took the historic step of applying to join NATO. Both nations will bring modern capabilities that will help defend against malign actors. As Finland and Sweden's membership is forthcoming, Alliance leaders, NATO watchers, and transatlantic security experts need to consider how to fully integrate the new allies, include them in operational plans, and best enhance defense of a longer border with Russia.

Europe & Eurasia
National Security

Issue Brief

Aug 15, 2022

Beyond munitions: A gender analysis for Ukrainian security assistance

By Cori Fleser

Allies need to incorporate human security into their bilateral military assistance to Ukraine.

Defense Policy
Europe & Eurasia

Issue Brief

Aug 11, 2022

China Pathfinder: Q2 2022 Update

By GeoEconomics Center and Rhodium Group

Over the past ten months, teams from the Atlantic Council and Rhodium Group have taken a dive into China’s economy to address a fundamental question: Is China becoming more or less like other open-market economies? 

China
Fiscal and Structural Reform

Issue Brief

Aug 2, 2022

Space traffic management: Time for action

By Mir Sadat, Julia Siegel

Mir Sadat and Julia Siegel highlight challenges to and opportunities for addressing space traffic management in this Forward Defense issue brief.

China
National Security

Issue Brief

Aug 2, 2022

Behind the rise of ransomware

By John Sakellariadis

Between 2016 and 2019, cybercriminals shifted from automated ransomware campaigns that emphasized scale to targeted extortion operations against organizations. This adaption made ransomware more disruptive and more profitable, culminating in the 2021 surge in ransomware. Though the US government has devoted more attention to ransomware since 2021, ransomware remains a significant and long-term threat to the US economy.

Cybersecurity
data, public, ethical

Issue Brief

Jul 28, 2022

Principles to practice: Using ethical spectrums to guide decision-making

By Steven Tiell and Lara Pesce Ares

There is widespread awareness among researchers, companies, policy makers, and the public that the use of artificial intelligence (AI) and big data raises challenges involving justice, privacy, autonomy, transparency, and accountability.

Digital Policy
Inclusive Growth

Report

Jul 28, 2022

Cooperation with China: Challenges and opportunities

By Michael Schuman, David O. Shullman

Cooperation with China should focus on areas where our interests still align and where we can keep Beijing grounded in the international system. Like-minded allies and partners must pair such efforts with commitments to defend against China’s violations of international norms, impose costs on irresponsible behavior, and strengthen themselves and current global institutions to compete effectively and uphold liberal values.

China
Economy & Business

Report

Jul 25, 2022

Cybersecure the future: Ransomware

By Trent Teyema, Kiran S. Jivnani, David Bray

This report endeavors to examine key challenges in predicting, safeguarding against, and dealing with ransomware attacks, thereby better informing US and international policy to combat such attacks and their perpetrators.

Cybersecurity
Technology & Innovation

Conflict, Risk, and Tech

Jul 25, 2022

Hackers, Hoodies, and Helmets: Technology and the changing face of Russian private military contractors

By Emma Schroeder, Gavin Wilde, Justin Sherman, and Trey Herr

This issue brief explores the technological capabilities of Russian private military companies and how they are used across various types of missions in support of and in parallel with Russian policy.

Africa
Cybersecurity