Articles & Multimedia
Showing 1-20 of 2337 Publications
CommentaryThe Russia Sanctions That Could Actually Stop Putin
Bending Russia’s macroeconomic fortunes — and Putin’s calculus — will require targeting the country’s financial system as well as key exports such as oil....
By Edward Fishman & Chris Miller
CommentaryHow North Korea Might Exploit New Video Games for Crypto
The online gaming industry has a history of illicit actors exploiting its networks and user base to conduct and facilitate cyber-enabled financial crime....
By Jason Bartlett
CommentaryUS and EU Export Control Cooperation under the US-EU Trade and Technology Council
Public Comments of Kevin Wolf, Emily Kilcrease, and Jasper Helder Regarding Areas and Priorities for US and EU Export Control Cooperation under the US-EU Trade and Technology ...
By Emily Kilcrease, Jasper Helder & Kevin Wolf
CommentaryWashington’s Missing China Strategy
The Biden administration has repeatedly identified China as the United States’ foremost foreign policy challenge. Secretary of Defense Lloyd Austin has referred to China as th...
By Richard Fontaine
CommentaryGeopolitics Keeps Overruling Cyber Norms, So What’s the Alternative?
Once governments accept the limits of political cyber norms, they can then adapt to the messier reality of cyberspace today....
By Laura G. Brent
CommentarySpiking the Problem: Developing a Resilient Posture in the Indo-Pacific With Passive Defenses
This article originally appeared in War on the Rocks....
By Stacie Pettyjohn
CommentaryWhat It Will Take to Deter Russia
Economic sanctions alone, no matter how personally painful they may be to Putin and his cronies, will not be enough....
By Jim Townsend
CommentaryProtecting The Hazara People Of Afghanistan Is A Moral Obligation The World Is Failing To Meet
Once the largest of Afghanistan’s ethnic groups, Hazaras now make uponly 9 percent of Afghanistan’s population of 36 million, and Genocide Watch has declared this a “genocide ...
By Alice Hickson
CommentaryAnother Security Breach at the Inter-Korean Border Reinforces Concerns Over South Korea’s Ability to Protect Itself
The fact that an individual can enter and exit the “most heavily fortified border in the world” without capture raises serious concerns regarding South Korea’s ability to adeq...
By Jason Bartlett
CommentaryChina’s Nuclear Buildup is About More Than Nukes
Pursuing nuclear and strategic stability between the United States and China will likely prove harder than ever — but it is perhaps more important than ever, too....
By Jacob Stokes
CommentarySecuring the Global Digital Economy Beyond the China Challenge
A revised route to digital modernization, premised on open participation, can not only offset the local costs of China’s cyber and influence power, but pave the way for an equ...
By Ainikki Riikonen
CommentaryThe Unmet Promise of the Global Posture Review
The review missed an opportunity to realign U.S. military presence overseas with the strategic priorities laid out in the interim National Security Strategic Guidance....
By Becca Wasser
CommentaryWhat Putin Learned From the Soviet Collapse
Just as Communist Party leaders in Beijing have studied Soviet history in an effort to avert its repetition, so have leaders in the Kremlin....
By Michael Kofman
CommentaryEurope’s antitrust policy shouldn’t ignore China
While the Digital Markets Act is not wrong to keep U.S. tech companies accountable, it is an opportunity for Europe to use antitrust and competition policy to recalibrate an a...
By Carisa Nietsche
CommentaryAlbania Takes the Lead in Saving Afghan Refugees
Rather than attempting to conceal or play down this influx of foreigners, Albania’s leaders have embraced them with national pride....
By Vance Serchuk
CommentaryCan America meet its next Sputnik moment?
A new Sputnik spirit today can power American technological competitiveness into the future....
By Megan Lamberth
CommentaryWhat Will North Korean Cybercrime Look Like in 2022?
North Korean hackers will likely continue to employ more phishing campaigns in the future while tailoring their level of obfuscation based on the target’s sophistication....
By Jason Bartlett
CommentaryA Strategic Response to China’s Economic Coercion
China is the most willing to deploy the widest range of economic tools in response to a geopolitical conflict. What can the U.S. do?...
By Emily Jin, Emily Kilcrease & Rachel Ziemba
CommentaryUsing a Sanctions Framework to Fix the ICTS Executive Order
While laudable in intent, establishing a licensing regime based on the current structure of the ICTS rules is likely to fail....
By Emily Kilcrease
CommentaryRightsizing in the Middle East
Washington’s large Middle East presence is more than just wasteful....
By Becca Wasser & Elisa Catalano Ewers