|Publications By Category|
|Publications By Type|
Time To Refocus On The EMP Threat
In late July, the US Senate Committee on Homeland Security and Governmental Affairs assembled a number of top experts to discuss a critical threat to the homeland: electromagnetic pulse (EMP).
Why Obama Will Open A US Embassy In Iran
What's next after the Obama administration's opening to Cuba? Why, an embassy in Tehran, of course.
Nothing In Moderation
In July, President Barack Obama said that he hoped the proposed nuclear deal with Iran could lead to continued conversations with the Islamic regime "that incentivize them to behave differently in the region, to be less aggressive, less hostile, more cooperative," and to generally behave in the way nations in the international community are expected to behave. The most optimistic proponents of the deal believe that the process could open the door to more comprehensive detente, empower Iranian moderates and lead to a gradual, peaceful form of regime change - a change of heart, if not of leadership.
North Korea: Iran's Pathway To A Nuclear Weapon
A central plank of the Obama administration's case for the nuclear deal just concluded by the P5+1 powers is that the agreement closes off "all pathways" by which the Iranian regime could acquire a nuclear capability, at least for the coming decade.
Iran's European Enablers
Not all that long ago, it seemed as if the United States could learn a thing or two from Europe when it came to economic pressure on Iran. Today, a great deal has changed.
Latest In-House Bulletins
Russia Reform Monitor - No. 1999
Litvinenko killing "personally ordered" by Putin, court hears;
Russia Reform Monitor - No. 1998
Despite economic troubles, Russian defense spending soars;
Russia Reform Monitor - No. 1997
Russia doubles down on the Kurils;
China Reform Monitor - No. 1179
Crackdown on illegal mining of rare earth materials;
China Reform Monitor - No. 1178
Xi promotes former acolytes;
Latest Policy Papers
Cyber Crime: Security Under Scarce Resources
Cyber crime covers a wide range of activities that includes theft, fraud and harassment; stealing
valuable intellectual property as part of industrial espionage; committing financial fraud and credit card theft; and disrupting internet services for ideological goals (“hacktivism”). The crimes target both firms and consumers, and while they rarely result in physical harm or property damage, there can still be severe consequences...
Iran Strategy Brief No. 7: Iran's Various Voices
Is the Islamic Republic of Iran a country or a cause? For decades, the question is one that has bedeviled Western observers. Foreign politicians and diplomats long have struggled to reconcile the Iranian regime’s radical rhetoric and destructive international behavior with its pragmatic participation in numerous treaty arrangements, and its prominent role in various multilateral forums.
Understanding Cybersecurity - Part 2 - Information Assurance
Information Assurance is the art and science of securing computer systems and networks against efforts by third parties to disable, intrude, or otherwise impede operations. It is the focus of most “cybersecurity” professionals in the technical community. The principal goals are to maintain an information system’s Confidentiality (the secrecy of information as it is used and stored), Integrity, reliability of data and equipment, and Availability, that a computer system is ready and able to function as needed. Information Assurance includes writing secure software, deploying it safely, and managing it to minimize the risk of compromise.