Number of results to display per page
Search Results
42. U.S.-India and India-East Asia Relations
- Author:
- Satu Limaye
- Publication Date:
- 01-2009
- Content Type:
- Journal Article
- Journal:
- Comparative Connections
- Institution:
- Center for Strategic and International Studies
- Abstract:
- India's relations with the U.S. and East Asia during 2008 took place amidst remarkable flux domestically, within the South Asian region, and around the world – all of which directly and indirectly influenced developments in bilateral relations. The two issues that dominated U.S.-India relations during 2008 were the civilian nuclear cooperation deal and, at the end of the year, the U.S.-India-Pakistan triangle including the issues of terrorism and Kashmir. India's relations with East Asia were quiescent during 2008. A notable development was the completion of an India-ASEAN free trade agreement, although its economic implications remain uncertain. India accentuated the positive with Myanmar as bilateral relations became more cordial while relations with China seemed to be on hold for most of the year as the border dispute remained unresolved and India responded cautiously to the Chinese handling of unrest in Tibet.
- Topic:
- International Relations, Development, and Terrorism
- Political Geography:
- Pakistan, United States, South Asia, India, and East Asia
43. U.S.-Korea Relations Chronology
- Publication Date:
- 10-2009
- Content Type:
- Journal Article
- Journal:
- Comparative Connections
- Institution:
- Center for Strategic and International Studies
- Abstract:
- No abstract is available.
- Topic:
- Terrorism
- Political Geography:
- United States, China, Washington, and Korea
44. Japan-Korea Relations Chronology
- Publication Date:
- 10-2008
- Content Type:
- Journal Article
- Journal:
- Comparative Connections
- Institution:
- Center for Strategic and International Studies
- Abstract:
- July 9, 2008: New York Times carries a full-page advertisement, “Do you know?” claiming South Korean sovereignty over the Dokdo/Takeshima islets. July 10-12, 2008: A Heads of Delegation Meeting of the Six-Party Talks is held in Beijing. July 14, 2008: The Japanese government announces that new guidelines for middle school teachers will describe the Dokdo/Takeshima islets as an integral part of Japanese territory.
- Topic:
- Security and Terrorism
- Political Geography:
- Japan, New York, and Korea
45. China-Russia Relations Chronology
- Publication Date:
- 10-2008
- Content Type:
- Journal Article
- Journal:
- Comparative Connections
- Institution:
- Center for Strategic and International Studies
- Abstract:
- July 9, 2008: President Hu Jintao and President Dmitry Medvedev meet in Toyako, Hokkaido, on the sidelines of the G8 summit. The two agree to promote bilateral strategic and cooperative partnership, and express their determination to give priority to the development of a long-term and steady partnership. July 17, 2008: One hundred Chinese children affected by a devastating earthquake in Sichuan Province arrive in the Kemerovo region to spend three weeks in a regional children recreation center. A total of 1,000 Chinese children from the quake area would go to Russian resorts during the third quarter.
- Topic:
- Terrorism
- Political Geography:
- Russia, China, and Tajikistan
46. Understanding Islamic Charities
- Author:
- Jon B. Alterman and Karin von Hippel
- Publication Date:
- 12-2007
- Content Type:
- Book
- Institution:
- Center for Strategic and International Studies
- Abstract:
- Since 9/11, intelligence agencies, independent commissions, and private-sector analyses have repeatedly asserted that terrorist organizations rely heavily on funding from Islamic charities. This alleged support for acts of violence and terrorism in the Islamic charitable sector-and a seeming toleration of such activities-raises serious questions. Is a significant portion of this charitable sector a front for terrorist activities? Or is a small minority tainting the good deeds of the majority? How do legitimate charities relate to their illegitimate peers, if at all, and how can one distinguish between the two? How do organizations that have both bona fide charitable operations and armed wings blend their charity with acts of violence? How much are the charitable and social service arms of such blended organizations intended as recruitment mechanisms for a fundamentally violent set of goals?In general, Western understanding of Islamic charities remains limited. This volume, therefore, seeks to answer some of the more important questions related to philanthropy in the Muslim world. How do these charities operate? How are they funded? And how, in some cases, are they involved in terrorist activities? The authors explore the variety of roles that Muslim philanthropies play in different countries, their interactions with national and international institutions, and the boundaries and connections between their philanthropic roles and their political impacts.
- Topic:
- Islam and Terrorism
47. Currents and Crosscurrents of Radical Islamism
- Author:
- Julianne Smith, Aidan Kirby, and Daniel Benjamin
- Publication Date:
- 04-2006
- Content Type:
- Working Paper
- Institution:
- Center for Strategic and International Studies
- Abstract:
- The second phase of the Center for Strategic and International Studies' Transatlantic Dialogue on Terror took place against a backdrop of rapid change. When the first conference in this series took place in Berlin in the spring of 2005, scholars and practitioners were still absorbing the details of the previous year's attacks against the Madrid light rail system, the murder of Dutch artist Theo van Gogh and a host of other attacks and foiled plots. Global radicalism continued to be shaped by the deepening insurgency in Iraq, in which radical Islamists from inside and outside that country play a pivotal role. In the months following the Berlin meeting, the bombing of the London Underground, the attacks in Sharm el-Sheikh and Amman, and a stream of revelations about radical Islamist activity from Europe to the Middle East to South Asia and Australia — where a group of conspirators were arrested for plotting an attack against that country's sole nuclear facility — had also to be taken into account.
- Topic:
- International Relations, Ethnic Conflict, Islam, Religion, and Terrorism
- Political Geography:
- Europe, South Asia, Middle East, London, and Australia
48. Deepening America's Response to Terrorism
- Author:
- Patrick M. Cronin
- Publication Date:
- 10-2003
- Content Type:
- Policy Brief
- Institution:
- Center for Strategic and International Studies
- Abstract:
- Hidden away in President Bush's trip to Asia, especially his short stopover in Bali, are clues that the administration may be finally broadening and deepening its counter terror strategy. Unveiled during the president's trip is an investment of $157 million over the next six years to improve the quality of secular basic education and moderate the influence of extremist views in Islamic day and boarding schools –madrasahs and pesantren, respectively. The president's trip to the world's largest Muslim-majority country may not be remembered for education, but it should be.
- Topic:
- Terrorism
- Political Geography:
- China, Israel, and Asia
49. Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats
- Author:
- James A. Lewis
- Publication Date:
- 12-2002
- Content Type:
- Working Paper
- Institution:
- Center for Strategic and International Studies
- Abstract:
- Cyber-warfare conjures up images of information warriors unleashing vicious attacks against an unsuspecting opponent's computer networks, wreaking havoc and paralyzing nations. This a frightening scenario, but how likely is it to occur? What would the effects of a cyber attack be on a potential opponent? Cyber attacks, network security and information pose complex problems that reach into new areas for national security and public policy. This paper looks at one set of issues – those related to cyber-terrorism and cyber attacks on critical infrastructure and their implications for national security. Cyber-terrorism is “the use of computer network tools to shut down critical national infrastructures (such as energy, transportation, government operations) or to coerce or intimidate a government or civilian population.” The premise of cyber terrorism is that as nations and critical infrastructure became more dependent on computer networks for their operation, new vulnerabilities are created – “a massive electronic Achilles' heel.” A hostile nation or group could exploit these vulnerabilities to penetrate a poorly secured computer network and disrupt or even shut down critical functions.
- Topic:
- Security, Science and Technology, and Terrorism
50. Strengthening Law Enforcement Capabilities to Combat Terrorism
- Author:
- James A. Lewis
- Publication Date:
- 10-2002
- Content Type:
- Working Paper
- Institution:
- Center for Strategic and International Studies
- Abstract:
- Ten days after the terrorist strikes on New York and Washington, Attorney General John Ashcroft and Federal Bureau of Investigation Director Robert Mueller toured the smoldering rubble where the Twin Towers once had stood. “It's unspeakable,” the Attorney General kept repeating as he took in the horrible scene. Mueller walked with New York Governor George Pataki. “We'll get them,” he said.
- Topic:
- Security, Science and Technology, and Terrorism
- Political Geography:
- New York and Washington