Though employees may think their company’s office building is secure, the outward appearance of security is rarely correlated with the actual protection of that building, or the people and contents within. In an excerpt from his book, Red Team: How to Succeed by Thinking Like the Enemy, Micah Zenko details how penetration tests are used to identify vulnerabilities in a building’s physical security.
Chinese Premier Li Keqiang, Japanese Prime Minister Shinzo Abe, and South Korean President Park Geun-hye met in Seoul on November 1, 2015, for the Sixth Trilateral Summit, the first since 2012. The trilateral talks were proposed by South Korea in 2004 as a meeting outside of ASEAN to build cooperation on economic, humanitarian, security, and diplomatic issues. The first summit was held in Japan in 2008.
Micah Zenko gives the first, ever look inside the CIA’s Red Cell—a unit tasked with conducting alternative analyses to anticipate threats and challenge conventional thinking. This is an excerpt of his book, Red Team: How to Succeed by Thinking Like the Enemy.
Policymakers around the world are increasingly concerned about the security of information and communications technology (ICT) supply chains. Danielle Kriz explains how the U.S. government can defend its ICT supply chains against counterfeit products, malicious code, and cyberattacks.
The events of the past five years have put an intense strain on the relationship between the United States and its traditional partners in the Arab world, particularly the countries that belong to the Gulf Cooperation Council: Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, and the United Arab Emirates.
In the last year, some 39,000 migrants, mostly from North Africa, tried to make their way to the United Kingdom from the French port of Calais by boarding trucks and trains crossing the English Channel.
This bill would require websites and technology firms to share user information with the government if the government wants the information to response to a cyber threat. Critics of the bill say it is similar to Cyber Intelligence Sharing and Protection Act (CISPA), which did not pass the Senate two years ago.
With over 40 percent of the world's population now online, the Internet has revolutionized the way the world communicates. But with fast evolving technology, a proliferation of actors with access to the Internet, and an absence of international consensus on what should be permissible, the gap between existing world arrangements and the challenges posed by the Internet is in fact widening.
Before the House Committee on Foreign Affairs, Senior Fellow for Middle Eastern Studies Elliott Abrams argued that incitement by Palestinian leaders and media—not poverty and hopelessness—has been the motivating forces behind recent violence against Israel.
President Obama and President Park spoke at a joint press conference on October 16, 2015. They discussed North Korea's nuclear activities, trade initiatives such as the Korea-United States U.S-ROK Free Trade Agreement (KORUS FTA) and the Trans Pacific Partnership, and U.S.-Korean cooperation in issues such as climate change and global health.
With the U.S. government still dealing with the fallout from the cyber theft of over twenty million personnel records in 2014—one of the largest data breaches in history—a new book from Council on Foreign Relations Senior Fellow Micah Zenkoreveals how red teams might have helped avoid such adisaster.
Learn more about CFR’s mission and its work over the past year in the 2015 Annual Report. The Annual Report spotlights new initiatives, high-profile events, and authoritative scholarship from CFR experts, and includes a message from CFR President Richard N. Haass. Read and download »