International Security Publications
The war on terrorism has not been won, Gabriel Weimann argues in Terrorism in Cyberspace, the successor to his seminal 2006 book, Terror on the Internet. Weimann’s book looks at terrorism’s online reach, recent trends, future threats, and ways to mitigate or counter Internet terrorism.
Track-Two Diplomacy toward an Israeli-Palestinian Solution, 1978–2014 is an important insider account of a crucial set of negotiations aimed at settling a seemingly endless conflict.
The Sino-Russian Challenge to the World Order: National Identities, Bilateral Relations, and East versus West in the 2010sJan 28, 2014
The Sino-Russian Challenge argues that China and Russia’s national identities are much closer to each other than usually thought. The closeness of their identities comes neither from prerevolutionary pasts nor from today’s practical politics, but rather from habits carried over from their communist periods.
A new study by Prof. Stephen Tankel on militancy in India. Prof. Tankel's main focus is a loosely organized indigenous Islamist militant network known as the Indian Mujahideen.
A report by the Eurasia Group for the Wilson Center's Canada Institute. As climate change renders the Arctic increasingly accessible, there has been a substantial uptick in industry interest in the region; it is believed an estimated $100 billion could be invested in the Arctic over the next decade.The Arctic contains vast oil and natural gas reserves - the U.S. Geological Survey estimates the Arctic could contain 1,670 trillion cubic feet (tcf) of natural gas and 90 billion barrels of oil, or 30 percent of the world’s undiscovered gas and 13 percent of oil. Energy companies are certain to be at the forefront of Arctic development and investment.
This report explores the complex linkages between conflict and food security, drawing insights from scholarly work to help inform more effective programming for practitioners. Food insecurity both results from and contributes to repeated rounds of armed conflict in many places. Conflict can reduce the amount of food available, disrupt people’s access to food, limits families’ access to food preparation facilities and health care, and increase uncertainty about satisfying future needs for food and nutrition. Likewise, food insecurity may help to sustain conflict or reverse post-conflict recovery efforts.
The growing use of social media and other mass collaboration technologies is opening up new opportunities in disaster management efforts, but is also creating new challenges for policymakers looking to incorporate these tools into existing frameworks. The Commons Lab, part of the Science & Technology Innovation Program, hosted a September 2012 workshop bringing together emergency responders, crisis mappers, researchers, and software programmers to discuss issues surrounding the adoption of these new technologies. This report discusses the key findings, policy suggestions, and success stories that emerged during the workshop.
Amid the growing number of reports warning that climate change threatens security, one potentially dangerous – but counterintuitive – dimension has been largely ignored. Could efforts to reduce our carbon footprint and lower our vulnerability to climate change inadvertently exacerbate existing conflicts?
Individuals and organizations using social media and crowdsourcing need two key sets of information: a systematic assessment of the vulnerabilities in these technologies and a comprehensive set of best practices describing how to address these vulnerabilities. This report identifies certain vulnerabilities and provides a guideline to develop best practices necessary to address a growing number of incidents ranging from innocent mistakes to targeted attacks that have claimed lives and cost millions of dollars.
Social media is responsible for much positive change in the world. But these new tools can be used by bad actors to foment strife and undermine stability, as seen during violent incidents in the Assam state of northeast India in July 2012. Cybersecurity efforts must take into account the growing potential for cyber-attack using social media, where hoax messages are incorporated into a stream of otherwise legitimate messages, and understand how quickly mobile apps and text services can disseminate false information.