- Critical QuestionsSep 16, 2014
Top U.S. Air Force (USAF) leaders convene this week in the Washington, DC area for the Air Force Association Air and Space Conference. The annual conference gathers active duty and retired uniformed and civilian USAF officials, defense analysts, defense companies, the media, and foreign allies and partners.
- CommentaryBy Richard M. Rossow, Rasika GynediAug 26, 2014
During the last Bharatiya Janata Party (BJP) regime (1999-2004), two seemingly unrelated events— the New Telecom Policy 1999 and the Y2K crisis—triggered the explosive growth of India’s information technology-enabled services (ITeS) industry.
- CommentaryAug 4, 2014
In March of this year, the Obama administration announced it would relinquish its role over the way domain names and Internet addresses are distributed. Commonly referred to as the Internet Corporation for Assigned Names and Numbers (ICANN), this U.S. nonprofit group has managed the use and governance of Internet addresses since 1998. At that time, U.S.
- ReportJul 24, 2014
Of Africa’s over 1 billion citizens, roughly 60 percent are below the age of 30; and the number of youth on the continent is expected to double to 600 million by 2050. They are and will be Africa’s doctors, teachers, lawyers, entrepreneurs, engineers, farmers, journalists, and political leaders.
- ReportJul 8, 2014
The international environment for space activities has changed significantly since the United States, Japan, Europe, and Russia agreed to build the International Space Station (ISS).
- NewsletterJul 1, 2014
We are pleased to present this fifth issue of the newsletter for the CSIS-IYF Youth, Prosperity, and Security Initiative.
- ReportJun 11, 2014
China’s reemergence as a great power over the next few decades represents the primary strategic challenge for the U.S.-Japan security alliance and for the East Asian security landscape writ large.
- NewsletterMay 22, 2014
This month's edition of the International Security Program's electronic publication includes:
Nuclear Security: The Road to 2016
By Sharon Squassoni
Responding to Chinese Assertiveness
By Zack Cooper
- CommentaryMay 19, 2014
The lack of consequences helps explain why cybercrime and cyber espionage are rampant. If you don’t hold countries accountable for bad actions, they see no reason to stop. China has been engaged in a massive campaign of economic espionage against the United States for years, and in the last decade, much of the spying has moved into cyberspace. An internal U.S.
- Critical QuestionsBy Carl MeachamMay 15, 2014
On May 15, the U.S. Federal Communications Commission (FCC) will vote on a notice of proposed rulemaking for a new net neutrality regulation. The proposal is not yet available to the public, but the FCC announced that the new regulations would allow for "commercially reasonable" traffic management—a provision that has caused uproar in online communities.