Policy Papers

The War Against ISIS Through Social Media

July 6, 2015 Richard M. Harrison

On July 7, the American Foreign Policy Council (AFPC) held the fourth installment of its Defense Technology Program’s Understanding Cybersecurity lunch briefing series for Congressional Staffers. This event, entitled, “How the Caliphate is Communicating:” Understanding and Countering the Islamic State’s Messaging outlined how and why the Islamic State has been winning the “war of ideas” through the use of social media, and how the group is using social media to further its operations...

Understanding Cybersecurity - Part 3 | Cyber Crime

June 29, 2015 Richard M. Harrison

Cyber crime covers a wide range of activities that includes theft, fraud and harassment; stealing valuable intellectual property as part of industrial espionage; committing financial fraud and credit card theft; and disrupting internet services for ideological goals (“hacktivism”). The crimes target both firms and consumers, and while they rarely result in physical harm or property damage, there can still be severe consequences...

Iran Strategy Brief No. 7: Iran’s Various Voices

June 16, 2015 Ilan I. Berman

Is the Islamic Republic of Iran a country or a cause? For decades, the question is one that has bedeviled Western observers. Foreign politicians and diplomats long have struggled to reconcile the Iranian regime’s radical rhetoric and destructive international behavior with its pragmatic participation in numerous treaty arrangements, and its prominent role in various multilateral forums.

Understanding Cybersecurity - Part 2 | Information Assurance

April 14, 2015 Richard M. Harrison

Information Assurance is the art and science of securing computer systems and networks against efforts by third parties to disable, intrude, or otherwise impede operations. It is the focus of most “cybersecurity” professionals in the technical community. The principal goals are to maintain an information system’s Confidentiality (the secrecy of information as it is used and stored), Integrity, reliability of data and equipment, and Availability, that a computer system is ready and able to function as needed. Information Assurance includes writing secure software, deploying it safely, and managing it to minimize the risk of compromise.

Asia for the Asians

In recent months, Xi Jinping’s China has rolled out a large number of new foreign policy initiatives. Some of these have been economic proposals such as the BRICS Bank; the Asian Infrastructure Investment Bank; the China-Korea and China-Australia free trade agreements; the land and maritime silk road proposals; a massive, albeit not entirely transparent, energy deal with Russia; an increasingly effective effort to promote international trade denominated in the yuan or Renminbi; and an attempt to push ahead with either the Regional Comprehensive Economic Partnership Agreement or the Free Trade Agreement of the Asia-Pacific.