The U.S. government's effort to persuade other countries to adopt norms of responsibility for cyberspace faces a significant obstacle: computers located in the United States host much of the malicious software used to carry out cyberattacks. Robert K. Knake explains.
Testifying before the House Committee on Foreign Affairs, Adjunct Senior Fellow for India, Pakistan, and South Asia Daniel S. Markey discussed the ramifications of a potential civil nuclear agreement with Pakistan. He concluded that pursuing a nuclear deal with Pakistan at this time is unrealistic, poorly timed, and unwise.
Of all the factors currently tearing the Middle East apart, none is more consequential than the war in Syria. Given the dire consequences of the status quo or military escalation, Philip Gordon outlines the best chance for de-escalating the conflict and achieving a cease-fire.
Remember the Iran nuclear deal, source of so much anxiety just one month ago? While much of the world watched in horror at the aftermath of the attacks in Paris, Iran began dismantling its centrifuges. But short-term compliance with the deal isn’t as important as what happens when it expires in 10 years.
The issue of women in combat per se was no longer a question," said Secretary of DefenseAshton Carter on Thursday as he declared that all jobs in the United States military would at last be open to all Americans.
The Islamic State, or ISIS, is the first terrorist group to hold both physical and digital territory: in addition to the swaths of land it controls in Iraq and Syria, it dominates pockets of the Internet with relative impunity. But it will hardly be the last. Although there are still some fringe terrorist groups in the western Sahel or other rural areas that do not supplement their violence digitally, it is only a matter of time before they also go online.
Recent terrorist attacks and resulting questions about the limits of surveillance have rekindled debate about how governments should deal with the challenges of powerful, commercially available encryption. With active debate in the United States and Western Europe surrounding this issue, it is instructive to note that Israel has been regulating encryption for decades.
Sheila A. Smith, senior fellow for Japan studies, reflects on the current state of the complex bilateral relationship between Tokyo and Beijing as they celebrate the seventieth anniversary of the World War II this summer.
Beginning with the Stuxnet virus launched by the United States at an Iranian nuclear facility in 2010 and continuing through to the most recent Sony hacking scandal, A Hacked World Order exposes how the Internet has ushered in a new era of geopolitical maneuvering and reveals the tremendous and terrifying implications for our economic livelihood, security, and personal identity.
Since defecting from Six Party negotiations on denuclearization in 2008, North Korea has pursued nuclear development unchecked by international constraints. Scott A. Snyder outlines steps the United States should take to lead coordinated multilateral action opposing North Korea’s nuclear status, while still leaving a denuclearized North Korea a route for regime survival.
Although China and India have repeatedly demonstrated a mutual desire to prevent conflict, the potential for their relationship to deteriorate is ever present. A border clash, conflict with Pakistan, maritime skirmish, or crisis over Tibet could raise tensions to the point of armed confrontation. Daniel S. Markey explains how the United States can promote peaceful relations between the world's two largest countries.
Learn more about CFR’s mission and its work over the past year in the 2015 Annual Report. The Annual Report spotlights new initiatives, high-profile events, and authoritative scholarship from CFR experts, and includes a message from CFR President Richard N. Haass. Read and download »