The Burke Chair in Strategy at the CSIS has released a comprehensive report detailing the US-Iranian strategic competition in Turkey and the South Caucasus. This report describes the economic and political relationships, Iranian and US influence, energy resources, and competition in four states, Turkey, Armenia, Azerbaijan, and Georgia.
We need to reform the ways we spend on national security. We need to debate our levels of spending on defense, foreign aid, and dealing with terrorism.
Gains in science and technology have a tremendous impact on advancing living standards and are increasingly recognized as vital components of development efforts.
Government is being asked to deliver more and better services for the American people, yet tighter budgets will limit resources and capacity. Squaring this circle is not impossible. New technologies and ways of doing business can help government do more with less, but only if leaders are bold.
After its successful rocket launch last month, and Kim Jong-un’s New Year’s address last week calling for an “industrial revolution,” the DPRK or North Korea may now be preparing for a visit from the top executive of Google, the world’s largest Internet search provider.
Potential sales of billions of dollars of energy equipment produced by U.S. companies are at stake in the major economies of the region. They are expected to import as much as $16 billion worth of energy products over the next few years to power their economic growth. But unless the United States launches new initiatives to snare sizable shares of this investment, U.S.
Mobile telephone technology is poised to dramatically improve millions of lives across the globe's weak and failed states. No other recently-introduced technology has so much potential to improve rural and urban outcomes in Africa, Asia, Latin America, and elsewhere.
As part of a concerted effort to promote indigenous innovation, Chinese policymakers crafted a set of information security standards entitled “Regulations on Classified Protection of Information Security.” These far-reaching regulations (often referred to in English as the Multi-Level Protection Scheme, or MLPS)—in theory aimed at protecting China’s national security&mda
As the threat to the cyber infrastructure on which the federal government and the nation relies grows, the urgency of investing wisely in protection against, detecting, mitigating, and recovering from cyber events takes on increasing urgency. Our adversaries are well equipped and agile. Our defenses must be equal to the threat, and they are not.