Syria shot down a Turkish warplane last week, raising tensions between the neighbors to an all-time high. In an email interview, Sean O’Connor, a contributor to IHS Jane’s and an expert in air defenses, reviewed the state of Syria’s air defenses. WPR: What are Syria’s current air defenses, and what are their particular strengths and vulnerabilities? Sean O’Connor: A comprehensive analysis of available commercial imagery indicates that Syrian strategic air defenses primarily consist of Soviet-era surface-to-air missile (SAM) systems occupying a total of 76 fixed-site locations. A further 101 fixed-site locations are present to serve as either defensive improvements employing […]

Earlier this month, the European Union agreed to create the European Cybercrime Center based at the EU’s joint police body, Europol. In an email interview, Dominik Brodowski, a lecturer in the law faculty at Ludwig Maximilians University Munich, discussed the EU’s efforts to fight cybercrime. WPR: What mechanisms does the European Union already have in place to prevent, detect and prosecute cyber crimes, and what are the shortcomings? Dominik Brodowski: Actually, the union’s 27 member states prevent and prosecute cybercrimes — not the European Union itself. As the EU strives to provide an area of freedom, security and justice, though, […]

A Chinese flag outside the Google China headquarters in Beijing, March 25, 2010 (AP photo by Gemunu Amarasinghe).

Editor’s note: The following article is one of 30 that we’ve selected from our archives to celebrate World Politics Review’s 15th anniversary. You can find the full collection here. In June 2012, Google’s acrimonious relationship with the People’s Republic of China took a couple of new turns. In order to assist Chinese users to access information freely from behind the controls of the Great Firewall of China, Google created a unique feature for its popular search engine: When users attempt to search for banned keywords, Google warns them that this might cause their Google connection to be interrupted and suggests alternative […]

In recent years, cyberattacks against the governments and business entities of economically developed and technologically advanced nations have proliferated, with the purpose of such attacks increasingly turning toward economic information collection and industrial espionage. As adversaries have expanded their computer network operations, the use of new venues for intrusions has increased, and the increasing use of portable devices that connect to the Internet and other networks will only create new opportunities for malicious actors to conduct espionage. Meanwhile, the trend among both corporations and government organizations toward the pooling of information processing and storage will present even greater challenges to […]

The Obama administration, supported by the U.S. military, is currently trying to negotiate an International Space Code of Conduct to protect the space environment. To gain support for the effort, the administration will have to overcome objections from some members of Congress, who often cite the ambitious and supposedly aggressive nature of Chinese space activities as the reason why the U.S. should not agree to international accords regarding space. The United States has the most space assets in orbit — and is the most dependent on them — but it is not the only country with space capabilities. Sustaining the […]

As unveiled in a recent Washington Post article, the Defense Advanced Research Protection Agency, or DARPA, is working to improve U.S. military operations in cyberspace with a project known as Plan X. The Defense Department agency is seeking proposals this summer for the effort, which aims to create an advanced cyberspace map as well as a system capable of launching cyberattacks and withstanding counterattacks. Chris Bronk, a fellow in information technology policy at the Baker Institute for Public Policy at Rice University, told Trend Lines that Plan X reveals how DARPA is moving toward a more agile form of research […]