All political parties are focused on survival. That is certainly the case in Vietnam and in many of its neighboring countries. As economic growth moves from the fast lane to something more qualitatively sustainable, newly empowered constituents are demanding more access to information, better services from governments, more substantial social safety nets, and better economic governance.
Many times in discussion of cybersecurity with Chinese colleagues one hears the charge that there is no evidence that China and Chinese hackers are responsible for the many incidents attributed to them. CSIS did a review of open source literature identifying China as the source of hacking and cyber espionage incidents.
Cyber infrastructure is critical to the global economy. Yet it is badly secured, worse governed, and a place of interstate competition and potential conflict. There is widespread concern among states over strategic competition in cyberspace, including cyber espionage and cyber attack.
The US needs to comprehensively reexamine its strategy and force posture in the USCENTCOM area of responsibility (AOR). America faces multiple challenges with a fiscally constrained environment at home, and a demanding mix of rising strategic concerns across Asia and the Middle East.
The US and its Arab Gulf allies face the steadily increasing threat that some form of conflict may occur with Iran in the coming years, and accordingly, they must develop the most effective possible deterrent to Iran’s military ambitions.
Extracting value from the computers or networks of unsuspecting companies and government agencies has become a big business. No company or agency can ignore network security; it is the source of systemic risk that threatens long-term health and profitability. Companies must secure their networks if they are to exercise fiduciary responsibility and due diligence.
As the March deadline for sequestration fast approaches, recent reporting by the Congressional Budget Office. Office of Management and Budget, the Department of Defense, and the military services have shown the damage sudden across-the-board cuts could have on national security and strategic planning.
This report looks at the political-military aspects of cybersecurity and attempts to place it in the larger context of international security. Networks are embedded in our economies and our political and social life. They have become the central tool for human activity. These networks form cyberspace.
The Burke Chair in Strategy at the CSIS has released a comprehensive report detailing the US-Iranian strategic competition in Turkey and the South Caucasus. This report describes the economic and political relationships, Iranian and US influence, energy resources, and competition in four states, Turkey, Armenia, Azerbaijan, and Georgia.
We need to reform the ways we spend on national security. We need to debate our levels of spending on defense, foreign aid, and dealing with terrorism.