International Security Publications

Terrorism in Cyberspace: The Next Generation by Gabriel Weimann

Terrorism in Cyberspace: The Next Generation

Sep 10, 2014
The war on terrorism has not been won, Gabriel Weimann argues in Terrorism in Cyberspace, the successor to his seminal 2006 book, Terror on the Internet. Weimann’s book looks at terrorism’s online reach, recent trends, future threats, and ways to mitigate or counter Internet terrorism. more

Track-Two Diplomacy toward an Israeli-Palestinian Solution, 1978–2014 by Yair Hirschfeld

Track-Two Diplomacy toward an Israeli-Palestinian Solution, 1978–2014

Feb 12, 2014
Track-Two Diplomacy toward an Israeli-Palestinian Solution, 1978–2014 is an important insider account of a crucial set of negotiations aimed at settling a seemingly endless conflict. more

The Sino-Russian Challenge to the World Order: National Identities, Bilateral Relations, and East versus West in the 2010s by Gilbert Rozman

The Sino-Russian Challenge to the World Order: National Identities, Bilateral Relations, and East versus West in the 2010s

Jan 28, 2014
The Sino-Russian Challenge argues that China and Russia’s national identities are much closer to each other than usually thought. The closeness of their identities comes neither from prerevolutionary pasts nor from today’s practical politics, but rather from habits carried over from their communist periods. more

Jihadist Violence: The Indian Threat

Dec 30, 2013
A new study by Prof. Stephen Tankel on militancy in India. Prof. Tankel's main focus is a loosely organized indigenous Islamist militant network known as the Indian Mujahideen. more

In Search of Arctic Energy

Dec 10, 2013
A report by the Eurasia Group for the Wilson Center's Canada Institute. As climate change renders the Arctic increasingly accessible, there has been a substantial uptick in industry interest in the region; it is believed an estimated $100 billion could be invested in the Arctic over the next decade.The Arctic contains vast oil and natural gas reserves - the U.S. Geological Survey estimates the Arctic could contain 1,670 trillion cubic feet (tcf) of natural gas and 90 billion barrels of oil, or 30 percent of the world’s undiscovered gas and 13 percent of oil. Energy companies are certain to be at the forefront of Arctic development and investment. more

Harvesting Peace: Food Security, Conflict, and Cooperation

Sep 10, 2013
This report explores the complex linkages between conflict and food security, drawing insights from scholarly work to help inform more effective programming for practitioners. Food insecurity both results from and contributes to repeated rounds of armed conflict in many places. Conflict can reduce the amount of food available, disrupt people’s access to food, limits families’ access to food preparation facilities and health care, and increase uncertainty about satisfying future needs for food and nutrition. Likewise, food insecurity may help to sustain conflict or reverse post-conflict recovery efforts. more

Connecting Grassroots to Government for Disaster Management: Workshop Summary

Sep 06, 2013
The growing use of social media and other mass collaboration technologies is opening up new opportunities in disaster management efforts, but is also creating new challenges for policymakers looking to incorporate these tools into existing frameworks. The Commons Lab, part of the Science & Technology Innovation Program, hosted a September 2012 workshop bringing together emergency responders, crisis mappers, researchers, and software programmers to discuss issues surrounding the adoption of these new technologies. This report discusses the key findings, policy suggestions, and success stories that emerged during the workshop. more

Backdraft: The Conflict Potential of Climate Change Adaptation and Mitigation

May 14, 2013
Amid the growing number of reports warning that climate change threatens security, one potentially dangerous – but counterintuitive – dimension has been largely ignored. Could efforts to reduce our carbon footprint and lower our vulnerability to climate change inadvertently exacerbate existing conflicts? more

Towards Trustworthy Social Media and Crowdsourcing

Apr 29, 2013
Individuals and organizations using social media and crowdsourcing need two key sets of information: a systematic assessment of the vulnerabilities in these technologies and a comprehensive set of best practices describing how to address these vulnerabilities. This report identifies certain vulnerabilities and provides a guideline to develop best practices necessary to address a growing number of incidents ranging from innocent mistakes to targeted attacks that have claimed lives and cost millions of dollars. more

On Cybersecurity, Crowdsourcing, and Social Cyber-Attack

Mar 04, 2013
Social media is responsible for much positive change in the world. But these new tools can be used by bad actors to foment strife and undermine stability, as seen during violent incidents in the Assam state of northeast India in July 2012. Cybersecurity efforts must take into account the growing potential for cyber-attack using social media, where hoax messages are incorporated into a stream of otherwise legitimate messages, and understand how quickly mobile apps and text services can disseminate false information. more

Pages

Dialogue

The Future of Higher Education

Mar 26, 2014Apr 02, 2014

Jeff Abernathy and Richard Morrill discuss how colleges and universities are dealing with rapidly rising costs and how the United States can still compete for students in a globalized environment.