After its successful rocket launch last month, and Kim Jong-un’s New Year’s address last week calling for an “industrial revolution,” the DPRK or North Korea may now be preparing for a visit from the top executive of Google, the world’s largest Internet search provider.
Potential sales of billions of dollars of energy equipment produced by U.S. companies are at stake in the major economies of the region. They are expected to import as much as $16 billion worth of energy products over the next few years to power their economic growth. But unless the United States launches new initiatives to snare sizable shares of this investment, U.S.
Mobile telephone technology is poised to dramatically improve millions of lives across the globe's weak and failed states. No other recently-introduced technology has so much potential to improve rural and urban outcomes in Africa, Asia, Latin America, and elsewhere.
As part of a concerted effort to promote indigenous innovation, Chinese policymakers crafted a set of information security standards entitled “Regulations on Classified Protection of Information Security.” These far-reaching regulations (often referred to in English as the Multi-Level Protection Scheme, or MLPS)—in theory aimed at protecting China’s national security&mda
As the threat to the cyber infrastructure on which the federal government and the nation relies grows, the urgency of investing wisely in protection against, detecting, mitigating, and recovering from cyber events takes on increasing urgency. Our adversaries are well equipped and agile. Our defenses must be equal to the threat, and they are not.
Deputy Defense Secretary Ashton Carter’s visit to India in late July capped a two-month focus for the Pentagon on India that began with Defense Secretary Leon Panetta’s own visit in early June.
India suffered two massive power failures in as many days. 600 million people were affected, with disruptions not only in electricity, but in transport around the north of the country as well. The first power grid collapse, on Monday  affected seven states in northern India, home to more than 350 million people.
Countering cyber threats demands cooperation among nations, in particular public-private partnerships. The key is the timely exchange of warnings and follow-up information at the governmental, military, and private levels. Without prompt alerts regarding cyber-attacks or espionage methods and targets, all countries will find it difficult, if not impossible, to detect and prevent attacks.
We badly need to rethink our approach to Iran’s nuclear programs. We are putting far too much emphasis on Iran’s nuclear efforts without considering how these programs fit into Iran’s over military and strategic objectives. At the same time, we are placing too much emphasis on whether Iran has revived its formal nuclear program and the current shape of its nuclear facilities.
Tightening sanctions and Iran’s reactions have become a race against time. Every day brings a new event as the competition between the US and Iran plays out on a global level. The Burke Chair at CSIS is issuing a new report that puts this competition in a broader perspective, as part of its on-going series on US and Iranian strategic competition.