• Survival

    Spying on Allies

    25 July 2014.  Although some programmes crossed lines of propriety, US surveillance of partners did not constitute a breach of trust.


  • Survival

    Cyber Warfare and Sino-American Crisis Instability

    25 July 2014.  China and the US both recognise that an armed conflict between them would include cyber warfare. But there is a curious and risky failure to connect the tactical military advantages of cyber attacks with the strategic hazards.

  • Events

    China’s Cyber Power: Policy, Capability and Exploitation

    23 July 2014. 

    Discussion Meeting
    Nigel Inkster
    Director for Transnational Threats and Political Risk, IISS
    Arundel House, London
    Wednesday 23 July 2014

  • IISS Voices

    Strategic Snapshots: Surveillance diplomacy

    15 July 2014.  Adam Ward and Nigel Inkster reflect on events and revelations in London, Berlin and Washington to assess the domestic and foreign policy implications of diverging government attitudes and capabilities towards data communications-intercept operations.

  • Events

    How the US is Perceived in the Cyber Domain by Other Major Actors

    25 June 2014. 

    IISS-US Discussion Meeting
    Nigel Inkster
    Director of Transnational Threats and Political Risk, IISS 
    Eneken Tikk-Ringas
    Senior Fellow for Cyber Security, IISS
    Rafal Rohozinski
    Consulting Senior Fellow for Cyber Security, IISS
    Wednesday 25 June 2014, 10-11am EDT/ 3-4pm BST

  • Shangri-La Voices

    Nigel Inkster: Wanted dead or alive - The US declares war on China’s cyber warriors

    28 May 2014.  By Nigel Inkster, Director, Transnational Threats and Political Risk On 19 May 2014 the US Department of Justice issued an indictment against five named Chinese nationals – Wang Dong, Sun Kailiang, Wen Xinyu, Huang Zhenyu and Gu Chunhui – for cyber attacks conducted against five US corporations and one labour union between 2006 and 2014. According to the West Pennsylvania Grand Jury, which had drawn up the indictment two weeks previously...

  • Strategic Dossiers

    Chapter Ten: Cyber threats and responses in the Asia-Pacific

    10 May 2014. 

    The outlook for information and communications technology (ICT) in the Asia-Pacific; China; Japan; The Republic of Korea (South Korea); Singapore; Malaysia; Indonesia; Australia; Democratic People’s Republic of Korea (North Korea); India; Asia-Pacific states’ contribution to regional and international cooperation on cyber security; Conclusion

  • Events

    Cyber Security: Strategies in the Gulf

    03 April 2014. 

    IISS-Middle East Cyber Security Expert Series
    Dr John B Sheldon
    Founder, and Principal Consultant, The Torridon Group
    Lt Col Mika Kerttunen
    Director, Department of Leadership, Baltic Defence College
    Chris Spirito
    International Cyber Lead, The MITRE Corporation
    IISS-Middle East, Manama
    Thursday 03 April 2014 4-5:30pm Bahrain Time/2-3:30pm BST

  • Events

    Data Collection and Privacy Considerations for the GCC

    03 March 2014. 

    IISS-Middle East Round Table Discussion
    Nigel Inkster, Director of Transnational Threats and Political Risk
    Eneken Tikk-Ringas
    IISS-Middle East, Manama
    Sunday 09 March 2014

  • Politics and Strategy

    Jeffrey Mazo: Culture wars

    24 February 2014.  Estonian President Toomas Hendrik Ilves’s opening address on cyber security at the 2014 Munich Security Conference on 31 January is well worth reading. In discussing the relationship between states and their citizens in the electronic age, he referenced philosophers ranging from Hobbes and Locke to McLuhan and the Grateful Dead. But he said that, personally, he thought ‘much of the problem we face today represents the culmination of a problem diagnosed 55...

Welcome to the IISS’ new search feature: here you will find content from the Institute on the topic/region selected. Click ‘advanced search options’ to filter by content type, date, related topics and/or experts.

To see your previous purchases and favourites, log-in to My IISS.