Publications By Category

Publications By Type
Articles

Books

In-House Bulletins

Monographs

Policy Papers


Publications Related to Information and Cyberwarfare

back to publications page


Russia Reform Monitor - No. 1759
Bulletins - January 19, 2012
 

 Continuing protests, and the Kremlin's response;

U.S., Russia to expand cooperation in cyberspace
 
Iran Democracy Monitor - No. 114
Bulletins - January 13, 2012
 

 Wooing Afghanistan; Sanctions Drive Iranian Rial Downward; A Falling Out with Al-Jazeera; Iran's Newest Energy Partner; A New Cyber-Clampdown

 
Russia Reform Monitor - No. 1753
Bulletins - December 14, 2011
 

 Russia, the international lender?;

Finally, WTO membership within reach
 
Russia Reform Monitor - No. 1752
Bulletins - December 13, 2011
 

 Strongarm tactics ahead of parliamentary polls;

An Arctic boondoggle?
 
Iranian Cyberwar
Articles - September 12, 2011
 

Does the Islamic Republic of Iran pose a cyber threat to the United States? On the surface, the idea seems far-fetched. Squeezed by sanctions over its nuclear ambitions, suffering from widespread social malaise and weathering unprecedented divisions among its leadership, Iran hardly seems an imminent threat to the U.S. homeland - even if it does pose a vexing challenge to American interests in the greater Middle East.

Yet mounting indicators suggest that Iran's leadership is actively contemplating cyberwarfare against America and its allies.

 
A Smarter Kind Of Counterterrorism
Articles - November 4, 2010
 

It’s a tried-and-true tenet of warfare, showcased throughout centuries of combat, that it is a great deal easier to attack than to defend. Attacking forces have the luxury of setting the time, the place and the means by which conflict is joined, while defenders are forced to anticipate the actions and objectives of their adversaries—or suffer the consequences.

In the age of modern terrorism, those consequences could mean another 9/11, or worse. And while the United States has fared better than most in thwarting these kind of attacks (the Heritage Foundation
estimates that the U.S. government has successfully foiled over 30 significant terrorist plots since September 2001), talk to any counterterrorism professional and you’ll come away with the impression that America, like its allies abroad, is still very much playing defense.

 
Eurasia Security Watch - No. 226
Bulletins - August 20, 2010
 

Israel and Lebanon clash at the border; Arming the Saudis; Terror title shifts to South Asia; IMU leader Yuldashev dead

 
How To Support The Struggle For Iran's Soul
Articles - July 8, 2010
 

Does Washington care about freedom in Iran? On the surface, it seems like a silly question. Ever since Ayatollah Ruhollah Khomeini swept to power in 1979, Washington policymakers of all political stripes have been holding out hope that a kinder, gentler regime would emerge in Tehran. Republican and Democratic administrations alike have expressed their support for freedom within the Islamic Republic, and both sides of the political aisle have condemned the regime's repressive domestic practices. Yet, concrete proof of the U.S. commitment to pluralism in Iran is hard to come by. The strategies by which the United States can assist Iran's opposition remain poorly understood and even less effectively implemented. This is unfortunate, since with the proper vision and political will, the United States can harness economic, diplomatic, and informational strategies to significantly affect the unfolding struggle for Iran's soul.

 
China Reform Monitor - No. 833
Bulletins - June 25, 2010
 

 

Beijing audits new rural medical system; China grapples with syphilis epidemic

 
Mountain to climb -- China's complex relationship with India
Articles - May 7, 2010
 

The latest issue to raise heckles [in India] has been cyberespionage. In January, India’s National Security Advisor MK Naryanan directly blamed China for multiple hacking attacks, and the chairman of India’s Cyber Law and IT Act Committee warned that same month that China had “raised a cyber army of about 300,000 people and their only job is to intrude upon the secured networks of other countries.” In April, a study by US and Canadian researchers claimed that a Chinese ‘shadow network’ had copied secret files of India’s defence ministry, potentially compromising some of India’s advanced weapons systems.