Cyber Warriors and Cyber Spies Struggle to Strike Balance

by Ned Carmody

On May 2, 2011 the agonizing, decade-long hunt for Osama bin Laden finally ended. The raid by U.S. Navy seals on the walled compound in Abbottabad, Pakistan was the culmination of years of...

Defusing Leakers Means Knowing What Makes Them Tick

by Bill Evanina

Tackling insider threat — everything from leaking classified information to potential workplace violence — is a key part of the National Counterintelligence and Security Center’s mandate....

Path Not Preordained: A Profile of China’s Xi Jinping

by Kenneth Dekleva

In 2000, Xi Jinping, the then relatively unknown (outside of China) Governor of Fujian, gave a rare interview to a Chinese newspaper. In this interview, Xi spoke of his philosophy of good governance,...

Remember Cyber Risks When Rehashing NAFTA

by Ari Schwartz

With round one of renegotiations behind us, and round two scheduled to begin on September 1 in Mexico City, despite efforts to move quickly, there is still a pretty long road ahead for the next...

Expelling Digital Demons from U.S. Sensitive Supply Chains

by Michael Hsieh

If the U.S. Department of Defense were an economy unto itself, it would be the 20th largest in the world. Like any other advanced modern economy, it is deeply integrated with the entire globe, its...

Gambling with Catastrophe on the Korean Peninsula

by Mike Chinoy

If there has been one common refrain from the Trump administration, it is that President Barack Obama’s policy of “strategic patience” towards North Korea was not effective in deterring...

Wanted: Robust Intelligence and Diplomatic Reporting

by James Bruno

  Son Sen was the Khmer Rouge’s Heinrich Himmler, in charge of carrying out Cambodia’s own holocaust that killed up to two million in the 1970s. As U.S. representative at UN-led...

Cyber Deterrence Cannot Be One Size Fits All

by James N. Miller

The fallout of major cyber attacks and espionage campaigns increasingly shapes interactions between nations. The vulnerability of the United States to such digital intrusions will only grow as the...

The (Soft) Power to Transform Fragile States

by Larry Sampler

Challenges facing those who work in the developing world are complex, profound, varied, and sometimes existential. They range from assuring the health and security of our staff in settings where...

Nations, Even Adversaries, Must Work Out Cyber Issues – Carefully

by Michael Daniel

How should nations collaborate in cyberspace? Can a nation like the U.S. and one like Russia bridge their views on data collection? What’s the future of artificial intelligence? The Cipher...