Publications By Category

Publications By Type
Articles

Books

In-House Bulletins

Monographs

Policy Papers


Publications Related to China and East Asia Program

back to publications page


Understanding North Korea's Cyber Strategy
Policy Papers - May 4, 2018
 
How does North Korea use cyber means to achieve its political and military objectives? Ever since the Korean War, North Korea’s stated foreign policy goal has been to reunify the Korean peninsula under its rule. However, by the 1980s, winning a conventional war on the peninsula had become unrealistic, and the military balance between the North and South had started to shift in favor of the latter. With the end of the Cold War, Russian and Chinese patronage diminished, while the U.S.-ROK alliance grew stronger. In this strategic context, how does North Korea ensure regime security, deter foreign aggression, and achieve this objective without explicitly taking it by force?...
 
China Reform Monitor - No. 1326
Bulletins - May 4, 2018
 

Chinese Christians take aim at the Vatican;
Monitoring China’s bathrooms

 
China Reform Monitor - No. 1325
Bulletins - May 3, 2018
 

Moscow, Beijing draw closer;
Overtures, and thinly-veiled threats, toward Taiwan

 
China Reform Monitor - No. 1324
Bulletins - April 19, 2018
 

China to more closely monitor political outlook at universities;
Travel bans for troublemakers

 
China Reform Monitor - No. 1323
Bulletins - April 18, 2018
 

Greater protections, less "family planning";
Reining in China’s military

 
The Other Iranian Threat
Articles - April 17, 2018
 

Whatever happened to the Iranian cyberthreat? Not all that long ago, American officials were preoccupied with the growing disruptive capabilities that the Islamic Republic had begun to demonstrate on the World-Wide Web. That, however, was before the start of negotiations over Iran's atomic program in 2013. Those talks allowed Iran's cyber activities to recede from public view, as policymakers in Washington focused their attention on nuclear diplomacy with Tehran, while Iranian hackers temporarily became more cautious in their choice of targets and the visibility of their attacks. More recently, worries about Iran's cyber capabilities have taken a back seat to concerns regarding Iran's growing conventional military might, and its mounting regional adventurism in places like Syria and Yemen.

 
China Reform Monitor - No. 1322
Bulletins - April 16, 2018
 

Chinese household debt grows;
Congress moves to limit Chinese influence in academia

 
China Reform Monitor - No. 1321
Bulletins - March 28, 2018
 

China's surveillance state gets bigger;
The dark side of the BRI

 
The End Of The Petrodollar?
Articles - March 21, 2018
 

In a move that could portend massive shifts in the global oil game, the Shanghai International Energy Exchange will soon unveil an oil-futures contract denominated in Chinese yuan rather than U.S. dollars (product symbol: SC). Experts warn that the growing clout of Chinese currency in international financial markets could erode the primacy of the U.S. dollar, a long-term economic trend that should greatly trouble Washington.

 
China Reform Monitor - No. 1320
Bulletins - March 13, 2018
 

China's army backs Xi's bid for expanded powers;
A deepening political footprint in Afghanistan