Search

Search Constraints

Begin New Search You searched for: Content Type Special Report Remove constraint Content Type: Special Report Publication Year within 5 Years Remove constraint Publication Year: within 5 Years Publication Year within 25 Years Remove constraint Publication Year: within 25 Years

Search Results

681. Following the Crypto: Using Blockchain Analysis to Assess the Strengths and Vulnerabilities of North Korean Hackers

682. When the Chips Are Down: Gaming the Global Semiconductor Competition

683. Dealing with a Taliban-Controlled Afghanistan: Supporting the Afghan People without Legitimizing the Regime

684. Finding Firmer Ground: The Role of Higher Education in U.S.-China Relations

685. Analysis of the Botnets that Operated in Honduras During the Primary and General Elections of 2021

686. Risk-Limiting Audits: A Guide for Election Observation Efforts

687. Risks, Recruits, and Plots: Understanding and Mitigating the Influence of the Islamic State in Malaysia

688. AQIM’s Imperial Playbook: Understanding al-Qa’ida in the Islamic Maghreb’s Expansion into West Africa

689. Iran Entangled: Iran and Hezbollah’s Support to Proxies Operating in Syria

690. Assessing U.S. Counterterrorism in Africa, 2001-2021: Summary Document of CTC’s Africa Regional Workshop