Join our newsletter to stay up to date on features and releases.

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

Resources

  • Home
  • About
  • Publications
  • Support

Follow Us

  • Facebook
  • Instagram
  • Twitter
  • LinkedIn

© 2025 The New Security Project. All rights reserved.

Privacy Policy

All Publications

A Comparison Of National Artificial Intelligence Regulations
Oct 09, 2025
A Comparison Of National Artificial Intelligence Regulations
Nine national AI regulations compared to each other as well as individual metrics. This article does not aim to identify which country has the strongest regulation, rather to serve as a basis for comparison of the legal instruments.
Technology
Innovation
Opinion
The Five Day Thai-Cambodian Border Conflict: An OSINT Timeline using Local Language Sources and Keywords
Sep 15, 2025
The Five Day Thai-Cambodian Border Conflict: An OSINT Timeline using Local Language Sources and Keywords
This publication explores the background, buildup, timeline, aftermath, and risk outlook of the July 2025 border conflict between Thailand and Cambodia
Security
Geopoliti...
Internati...
Tea, Coffee and Everything In-Between: Context, Risks and Implications of the Belt and Road Initiative in Colombia
May 22, 2025
Tea, Coffee and Everything In-Between: Context, Risks and Implications of the Belt and Road Initiative in Colombia
This publication examines Colombia’s decision to formally embrace Chinese investments under the umbrella of the Belt and Road Initiative
Security
Technology
Geopoliti...
Application Versus Hype: Cybersecurity Applications of AI
May 18, 2025
Application Versus Hype: Cybersecurity Applications of AI
The gap between hype and reality for AI deployments in cybersecurity is widening.
Technology
Innovation
Analysis
Detecting the Undetectable: The Rise and Threat of 3D-Printed ‘Ghost Guns’
May 10, 2025
Detecting the Undetectable: The Rise and Threat of 3D-Printed ‘Ghost Guns’
This article examines the rise and threats posed by so-called 'ghost guns'.
Security
Technology
Analysis
Security State, Stagnation, and Surveillance Capitalism: The End of American Democracy?
Apr 21, 2025
Security State, Stagnation, and Surveillance Capitalism: The End of American Democracy?
This essay discusses three major factors which I believe have contributed to democratic backsliding in the United States.
Security
Technology
Geopoliti...
Instability, Authoritarianism, and the Fragmentation of Global Order in 2025
Mar 03, 2025
Instability, Authoritarianism, and the Fragmentation of Global Order in 2025
The state of the world in 2025 is one of increasing fragmentation, waning democratic rights, and a very real sense of danger permeating the field of international relations.
Geopoliti...
Opinion
Internati...
How They Stay Afloat: the Imposer, the Evader, and the Shadow Fleet That Sits In-Between
Mar 01, 2025
How They Stay Afloat: the Imposer, the Evader, and the Shadow Fleet That Sits In-Between
In practice, nation-state actors such as Iran and Russia have attempted (and have proven at least partly successful) in evading sanctions imposed by Washington and its allies. A clear example of this is the Shadow Fleet.
Security
Geopoliti...
Analysis
The Collapse of Iranian Deterrence and Potential Paths to Israeli / US Military Action in Iran
Mar 01, 2025
The Collapse of Iranian Deterrence and Potential Paths to Israeli / US Military Action in Iran
Recent developments in the Middle East have created what Israeli and American strategists likely view as a once-in-a-generation opportunity to decisively strike Iran's military and nuclear infrastructure and potentially achieve regime change in Tehran
Security
Geopoliti...
Analysis
Is Conflict in Eastern DRC the Beginning of a Third Congo War?
Feb 27, 2025
Is Conflict in Eastern DRC the Beginning of a Third Congo War?
Conflict in the eastern Democratic Republic of the Congo has significantly intensified in recent months, sparking fears that it could spiral into a broader regional war. This has become particularly critical following the capture of Goma
Security
Geopoliti...
Analysis
Rows per page
  • Previous
  • 1
  • 2
  • 3
  • Next