Twitter | Search | |
CSIS ISP
The CSIS International Security Program (ISP) is a constant source of reliable analysis on the threats and opportunities shaping U.S. security interests.
20,822
Tweets
644
Following
6,780
Followers
Tweets
CSIS ISP 3h
Learn more about the acquisition of software-defined and hardware-based adaptable systems in this NEW report by Maura McQuade, , and Schuyler Moore:
Reply Retweet Like
CSIS ISP 5h
Adversaries are relying on proxy forces to carry out militarized intimidation and control territory. Learn how proxy groups are contributing to "gray zone" conflict and how the U.S. can deter their use: .
Reply Retweet Like
CSIS ISP 7h
“It may be that as we get farther away from the 2016 election that people are more willing to accept that Russia is interfering in our election,” told .
Reply Retweet Like
CSIS ISP retweeted
CSIS Smart Women 8h
NEW: sat down with Liz Smith, former CEO of , to discuss the importance of embracing your failures in the workplace, learning the lessons, and moving on quickly. iTunes: Spotify:
Reply Retweet Like
CSIS ISP 11h
Foreign adversaries use economic tools to hurt the economies of the U.S. and its allies. Learn how economic coercion is utilized in "gray zone" conflict: .
Reply Retweet Like
CSIS ISP retweeted
CSIS 15h
Russia has become expert in “gray zone” military activities that help it achieve its security goals. It's time for the United States to mount a campaign to fight back, argues director .
Reply Retweet Like
CSIS ISP Aug 20
Not only are the defense acquisition and budgeting processes misaligned for adaptable systems, but so too are the business incentives within the defense industry. Learn more about “adaptable systems” here:
Reply Retweet Like
CSIS ISP Aug 20
"Gray zone" space operations disrupt the space-enabled services the U.S. military depends on. Learn how adversarial powers are utilizing space operations in the "gray zone" and how the U.S. can counter them: .
Reply Retweet Like
CSIS ISP retweeted
CSIS Aug 20
To compete in the gray zone, the U.S. must: 1. Synchronize its power 2. Improve intelligence/warning systems 3. Designate information a critical domain of statecraft 4. Buttress its cyber capabilities 5. Advance and strengthen coalitions Learn more:
Reply Retweet Like
CSIS ISP Aug 19
The U.S. needs to designate information as a critical domain of statecraft and buttress cyber capabilities to compete and win in the gray zone. Find out more in our latest report, “By Other Means (Part II): U.S. Priorities in the Gray Zone.”
Reply Retweet Like
CSIS ISP Aug 19
How do emerging technologies for strategic situational awareness impact nuclear strategic stability? Check out “On the Radar,” a two-year collaboration between & , to find out:
Reply Retweet Like
CSIS ISP retweeted
Def & Aero Report Aug 19
We spoke to senior fellow and director Karako on Iran's use of offensive drones and how you counter them
Reply Retweet Like
CSIS ISP Aug 19
Adversaries use provocations by state-controlled forces to achieve their goals without the formal use of force. Learn how the U.S. can counter this "gray zone" tactic:
Reply Retweet Like
CSIS ISP retweeted
CSIS Aug 19
5 risks to watch in 2019 3.0: 1. Unresolved Risks - North Korea, Iran, Brexit, U.S.-China trade 2. U.S.-Iran tensions continue to mount 3. Rural-urban divides deepens 4. Biodiversity Crisis & Mass Extinctions 5. Growth of "Deepfake" Videos Learn more:
Reply Retweet Like
CSIS ISP Aug 19
Join in September for a 3-day executive education course at HQ designed to explore a range of contemporary defense and deterrence issues. Click the link to learn more and apply today:
Reply Retweet Like
CSIS ISP Aug 19
ISP Fellow and 's examine recent oil facility and tanker attacks in the Strait of Hormuz, the threat that they pose to the oil market, and how the current strategy to protect oil flows from the Persian Gulf is evolving.
Reply Retweet Like
CSIS ISP Aug 18
Foreign adversaries use economic tools to hurt the economies of the U.S. and its allies. Learn how economic coercion is utilized in "gray zone" conflict: .
Reply Retweet Like
CSIS ISP Aug 18
ICYMI: sat down with to discuss how U.S. adversaries access sensitive national security technologies and intellectual property through bankruptcy proceedings. Listen now! Soundcloud: Spotify:
Reply Retweet Like
CSIS ISP Aug 18
After expending nearly $800 billion in Afghanistan over the last 18 years, the United States has achieved at best a stalemate. A new report from Mark Cancian explores how this happened, what lessons we have learned, and how we can move forward:
Reply Retweet Like
CSIS ISP Aug 18
Adversaries use provocations by state-controlled forces to achieve their goals without the formal use of force. Learn how the U.S. can counter this "gray zone" tactic: .
Reply Retweet Like