Individuals and organizations using social media and crowdsourcing need two key sets of information: a systematic assessment of the vulnerabilities in these technologies and a comprehensive set of best practices describing how to address these vulnerabilities. This report identifies certain vulnerabilities and provides a guideline to develop best practices necessary to address a growing number of incidents ranging from innocent mistakes to targeted attacks that have claimed lives and cost millions of dollars.
The Search for Antiseptic War: The Prospects and Perils of Drones for the United States, the Sahel and BeyondApr 19, 2013
The U.S. Government has made clear that stabilization missions requiring deployment of large numbers of personnel—military and civilian—are not on the agenda for the foreseeable future. Not only budget constraints but also sobering experiences in Iraq and Afghanistan have produced a strategic shift.
Social media is responsible for much positive change in the world. But these new tools can be used by bad actors to foment strife and undermine stability, as seen during violent incidents in the Assam state of northeast India in July 2012. Cybersecurity efforts must take into account the growing potential for cyber-attack using social media, where hoax messages are incorporated into a stream of otherwise legitimate messages, and understand how quickly mobile apps and text services can disseminate false information.
In the Bush era, Iran and North Korea were branded “rogue” states; the Obama administration has chosen instead to call the countries nuclear “outliers” and has proposed means other than regime change to bring them back into the fold. Outlier States explores this significant policy adjustment and raises questions about its feasibility and its possible consequences.
The Islamists Are Coming is the first book to survey the rise of Islamist groups in the wake of the Arab Spring. Often lumped together, the more than 50 Islamist parties with millions of followers now constitute a whole new spectrum—separate from either militants or secular parties. They will shape the new order in the world’s most volatile region more than any other political bloc. Yet they have diverse goals and different constituencies. Sometimes they are even rivals.
CWIHP is pleased to announce the addition of two new documents to its online Digital Archive. CWIHP e-Dossier No. 28 contains new evidence of Vietnam’s covert training of revolutionary commando forces in Southeast Asia and Latin America.
This report reviews the recent history of US immigration legislation, including new enforcement mandates passed immediately after 9/11 and unsuccessful efforts to pass CIR bills during the 109th and 110th Congresses. This history, together with asymmetries in the political process that favor enforcement-oriented responses, stack the deck against legalization and visa reform. Any possibility of success was further hurt by the timing of the reform debate with respect to the national electoral calendar in 2006-07 and the economic downturn beginning in 2008.
This timely study surveys the conflict in Afghanistan from Pakistan’s point of view and analyzes the roots of Pakistan’s ambiguous policy—supporting the United States on one hand and showing empathy for the Afghan Taliban on the other.
Environmental security scholarship provides important theoretical and methodological underpinnings for the embryonic field examining threat networks, write Richard Matthew and Bryan McDonald.