Publications By Category

Publications By Type
Articles

Books

In-House Bulletins

Monographs

Policy Papers


Publications

Latest Articles

A Dangerous Middle East Policy
By Lawrence J. Haas, U.S. News & World Report, May 7, 2015

The growing concerns of Arab nations over an emerging Iran nuclear deal and their reported desire for U.S. weapons to protect themselves are the unfortunate outgrowths of President Barack Obama's foreign policy realism. 

What We Don't Know About Iran Could Hurt Us
By Ilan Berman, Forbes.com, April 30, 2015

To hear the Obama administration tell it, the framework nuclear accord agreed to between the P5+1 powers and Iran last month in Lausanne, Switzerland is a good deal. The White House has pledged that the final agreement to be concluded in coming weeks, backed up by a robust monitoring and verification regime, will block Iran's pathways to a bomb for at least a decade - and perhaps considerably longer. 

America's Good News Energy Story
By James S. Robbins, U.S. News & World Report, April 29, 2015

The United States is beginning to realize the strategic benefits of the fracking revolution. And they just keep growing. 

This week at the IHS CERAWeek energy summit in Texas, Secretary of Energy Ernest Moniz said that the United States anticipated "becoming big players" in the global liquefied natural gas market and that "there's a good chance that we will be LNG exporters on the scale of Qatar," which he noted was the world's largest LNG exporter. 

Iran: Isolated No Longer
By Ilan Berman, National Review Online, April 27, 2015

Less than a month after it was signed in Lausanne, Switzerland, the framework nuclear deal between Iran and the P5+1 powers is already beginning to pay dividends - for Iran, that is. 

Even before the April 2 accord, the enforced isolation that brought Iran's ayatollahs to the nuclear negotiating table back in 2013 had begun to erode, progressively undermined by hungry investors eager to return to "business as usual" with the Islamic Republic. But since the framework deal was signed, the floodgates have opened in earnest. 

Iran Is Already Winning
By Lawrence J. Haas, U.S. News & World Report, April 21, 2015

As global talks over Iran's nuclear program resume in Vienna this week, one can't help wonder whether, in a larger sense, the die of an Iranian regional, military and economic victory has already been cast. From Washington to Berlin, Moscow to Beijing, and many places in between, Iran's isolation is disappearing as governments and businesses prepare to exploit its return to global respectability. 


Latest In-House Bulletins

Russia Reform Monitor - No. 1974
May 9, 2015

Russia's ultranationalists on the march;
A hard-fought victory in Russia's "war on terror"

 

 

Russia Reform Monitor - No. 1973
May 8, 2015

Europe arms itself... but not enough;
Russia's opposition parties huddle together

 

 

China Reform Monitor - No. 1160
May 7, 2015

PLA targets corruption in logistics department;
Mainland companies snapping up Hong Kong news outlets

 

 

Global Islamism Monitor - No. 4
May 1, 2015

In Georgia, a grassroots response to ISIS;
Unlikely allies in the Sinai;
Tackling education in Egypt;
Hamas gains in the West Bank;
The Islamic state's next casualty: The Taliban 

Russia Reform Monitor - No. 1972
April 30, 2015

Moscow chafes at Ukraine's turn away from its Soviet past;
No joking allowed on Russia's Internet

 

 


Latest Policy Papers

Understanding Cybersecurity - Part 2 - Information Assurance
By Trey Herr and Eric Ormes , April 15, 2015

Information Assurance is the art and science of securing computer systems and networks against efforts by third parties to disable, intrude, or otherwise impede operations. It is the focus of most “cybersecurity” professionals in the technical community. The principal goals are to maintain an information system’s Confidentiality (the secrecy of information as it is used and stored), Integrity, reliability of data and equipment, and Availability, that a computer system is ready and able to function as needed. Information Assurance includes writing secure software, deploying it safely, and managing it to minimize the risk of compromise.

Asia for the Asians
By Scott Harold, Ph.D , January 29, 2015

In recent months, Xi Jinping’s China has rolled out a large number of new foreign policy initiatives. Some of these have been economic proposals such as the BRICS Bank; the Asian Infrastructure Investment Bank; the China-Korea and China-Australia free trade agreements; the land and maritime silk road proposals; a massive, albeit not entirely transparent, energy deal with Russia; an increasingly effective effort to promote international trade denominated in the yuan or Renminbi; and an attempt to push ahead with either the Regional Comprehensive Economic Partnership Agreement or the Free Trade Agreement of the Asia-Pacific.

Redefining Cybersecurity
By Trey Herr and Allan Friedman , January 22, 2015

Cybersecurity is an often abused and much misused term that was once intended to describe and now serves better to confuse. While originally intended to cover security related issues associated with “cyberspace,” a phrase coined by author William Gibson in the short story “Burning Chrome,” it has become the byword for a staggeringly diverse array of topics. While this is frustrating, the term is popular as shorthand, so we offer this paper to identify and explain four clusters of related topics under the larger umbrella of “cybersecurity.”  Each is a distinct issue area with unique technical and policy challenges, while retaining some association to the others...

American Deterrence and Future Conflicts
By Dr. Jacquelyn K. Davis , December 22, 2014

On the centennial of the start of World War I—a war that began largely as a result of crisis miscalculations

and escalations—we are entering a new era with important implications for deterrence, escalation control, and coalition management. Today, like at the time of World War I, we confront a large number of actors who have the potential to misread cues and red lines while relying on treaty relationships if they miscalculate. Then, as now, military technologies were widely diffused. Prevailing assumptions about how an adversary (or potential adversary) would react in a crisis or confrontation were based on imperfect intelligence and inadequate understanding of red lines...