Saudi Arabia has found itself some strange bedfellows in its all-out pursuit to crush the Iranian backed Houthis in Yemen, turning to al-Qaeda and the Muslim Brotherhood for help even though it has condemned both groups as terrorists inside the kingdom.
Addressing the Concerns of the Oil Industry: Security Challenges in Northeastern Mexico and Government ResponsesJan 06, 2015
The December 2013 Constitutional Reform and August 2014 secondary legislation to permit private investment in Mexico’s oil and gas sector represents significant opportunities for private oil and gas companies. While overall geopolitical risk landscape in Mexico is low, cartel-related violence and other criminal activities continue to draw concern from international oil companies and other foreign investors. This paper analyzes the Mexican Government’s response to recent threats to and attacks against energy infrastructure and personnel in Tamaulipas and Veracruz.
The war on terrorism has not been won, Gabriel Weimann argues in Terrorism in Cyberspace, the successor to his seminal 2006 book, Terror on the Internet. Weimann’s book looks at terrorism’s online reach, recent trends, future threats, and ways to mitigate or counter Internet terrorism.
This report examines how Al-Qaeda, its affiliates and other terrorist organizations have moved their online presence to YouTube, Twitter, Facebook, Instagram and other social media outlets, posing challenges to counter-terrorism agencies.
Track-Two Diplomacy toward an Israeli-Palestinian Solution, 1978–2014 is an important insider account of a crucial set of negotiations aimed at settling a seemingly endless conflict.
A new study by Prof. Stephen Tankel on militancy in India. Prof. Tankel's main focus is a loosely organized indigenous Islamist militant network known as the Indian Mujahideen.
In his upcoming book, David Jones pulls no punches as he offers his opinions on the issues facing the U.S.-Canada relationship.
Asian nations have found it difficult to respond effectively to new transnational security challenges. Resources and technical capacity are scarce, as are cooperation and coordination within and between governments, the private sector, and civil society. New Security Challenges in Asia shows how these threats are less susceptible to traditional diplomacy or military resolution and recommends ways the United States can help Asian nations address them.
Individuals and organizations using social media and crowdsourcing need two key sets of information: a systematic assessment of the vulnerabilities in these technologies and a comprehensive set of best practices describing how to address these vulnerabilities. This report identifies certain vulnerabilities and provides a guideline to develop best practices necessary to address a growing number of incidents ranging from innocent mistakes to targeted attacks that have claimed lives and cost millions of dollars.
The Search for Antiseptic War: The Prospects and Perils of Drones for the United States, the Sahel and BeyondApr 19, 2013
The U.S. Government has made clear that stabilization missions requiring deployment of large numbers of personnel—military and civilian—are not on the agenda for the foreseeable future. Not only budget constraints but also sobering experiences in Iraq and Afghanistan have produced a strategic shift.