Critical Questions for 2012
From international security and regional study to global challenges, CSIS experts will address many of the world's most difficult policy concerns and critical questions in 2012. To kick off the new...
View ArticleU.S. and Iranian Strategic Competition: The Impact of the EU, EU3, and Non-EU...
The various states that comprise the EU and non-EU Europe play a critical role in the competition between the US and Iran. Iran’s progress towards a nuclear weapons threshold capability, and evidence...
View ArticleOptions for Dealing with Iran's Nuclear Program
The growing confrontation with Iran over its nuclear, missiles, and asymmetric warfare programs presents major problems in risk assessment. The Burke Chair is circulating a briefing that uses a new...
View ArticleU.S. and Iranian Strategic Competition: The Sanctions game: Energy, Arms...
Tightening sanctions and Iran’s reactions have become a race against time. Every day brings a new event as the competition between the US and Iran plays out on a global level. The Burke Chair at CSIS...
View ArticlePacNet #41 - Moving Forward with US-Japan Cybersecurity Cooperation
Countering cyber threats demands cooperation among nations, in particular public-private partnerships. The key is the timely exchange of warnings and follow-up information at the governmental,...
View ArticleThe U.S.-Japan Alliance
This new report on the U.S.-Japan alliance comes at a time of drift in the relationship. As leaders in both the United States and Japan face a myriad of other challenges, the health and welfare of one...
View ArticleUpdating U.S. Federal Cybersecurity Policy and Guidance
As the threat to the cyber infrastructure on which the federal government and the nation relies grows, the urgency of investing wisely in protection against, detecting, mitigating, and recovering from...
View ArticleHomeland Security at a Crossroads: Evolving DHS to Meet the Next Generation...
The Department of Homeland Security (DHS) finds itself at a crossroads as it enters its second decade of existence. Since its creation in 2002, DHS has worked diligently to keep the United States safe...
View ArticleConflict and Negotiation in Cyberspace
This report looks at the political-military aspects of cybersecurity and attempts to place it in the larger context of international security. Networks are embedded in our economies and our political...
View ArticleRaising the Bar for Cybersecurity
Extracting value from the computers or networks of unsuspecting companies and government agencies has become a big business. No company or agency can ignore network security; it is the source of...
View ArticleHidden Arena: Cyber Competition and Conflict in Indo-Pacific Asia
Cyber infrastructure is critical to the global economy. Yet it is badly secured, worse governed, and a place of interstate competition and potential conflict. There is widespread concern among states...
View ArticleCyber Incidents Attributed to China
Many times in discussion of cybersecurity with Chinese colleagues one hears the charge that there is no evidence that China and Chinese hackers are responsible for the many incidents attributed to...
View ArticlePrivate Retaliation in Cyberspace
There has been a resounding chorus of voices in Washington calling for the United States to give companies the right to retaliate against cyber attackers in China with counterstrikes of their own, the...
View ArticleDónde está Edward Snowden?
As of the time of publication, NSA leak Edward Snowden remains in Moscow, Russia, having flown there from Hong Kong, his initial destination upon releasing information about the NSA’s intelligence...
View ArticleU.S.-China S&ED: New Players, Familiar Issues
The fifth meeting of the U.S.-China Strategic & Economic Dialogue (S&ED) will be held in Washington on July 10–11. This annual gathering of senior officials from across the U.S. and Chinese...
View ArticleSnowden, Latin America, and Russia
Hard as it may be to believe, it was nearly a full month ago that Edward Snowden leaked highly classified NSA documents revealing the details of the agency’s widespread, global surveillance programs....
View ArticleThe Economic Impact of Cybercrime and Cyber Espionage
Is cybercrime, cyber espionage, and other malicious cyber activities what some call “the greatest transfer of wealth in human history,” or is it what others say is a “rounding error in a fourteen...
View ArticleThe Ironies of Edward Snowden and U.S.-Russia Relations
Reports coming out of Moscow this morning suggest that Edward Snowden may be granted documents from Russian authorities that would allow him to leave the transit zone of Sheremetyevo Airport, go...
View Article
More Pages to Explore .....