In this podcast, INPROL Director Lelia Mooney and Senior Program Assistant Chelsea Dreher discuss data collection technologies with Derek Caelin, Senior Specialist for Peace Tech Lab. Derek works on the Lab’s PeaceTech Exchange program, an initiative to connect peacebuilders in conflict zones to media, technology, and data for them help them achieve their objectives. Working with local partners, Derek and the PeaceTech Exchange team have put on workshops in countries like Iraq, Afghanistan, and Pakistan to address issues such as Transparency & Accountability, Countering Violent Extremism and Gender Based Violence. Recognizing that sound research sets a foundation for successful rule of law initiatives, we use this episode to reflect on how PeaceTech can enhance practitioners’ assessments and analysis in challenging contexts. Derek introduces and explains a number of low cost technologies that rule of law professionals can use to collect critical data when funds are tight, and internet access is unreliable.

The Peace Frequency presents in-depth interviews with ordinary people doing extraordinary things to create a world free of violent conflict. It is produced by the U.S. Institute of Peace Academy.


Latest Research & Analysis

Philippines: Former Combatants Help Keep the Peace During Recent Polls

Philippines: Former Combatants Help Keep the Peace During Recent Polls

Wednesday, June 25, 2025

By: Haroro Ingram, Country Director, Philippines, USIP

For decades, the struggle for peace in the Philippines’ southernmost island of Mindanao has been characterized by armed conflict between the Philippines government and Moro separatist groups, like the Moro Islamic Liberation Front (MILF), and cycles of failed peace processes. The historic 2014 peace agreement between the Philippines government and MILF led to the granting of greater self-governance with the creation of the Bangsamoro Autonomous Region in Muslim Mindanao (BARMM) five years later. What has followed since is an unprecedented, yet very fragile, period of peace and stability.

Type: Analysis

With Cease-fire Holding, Can Israel and Iran Move Toward De-escalation?

With Cease-fire Holding, Can Israel and Iran Move Toward De-escalation?

Wednesday, June 25, 2025

Israel’s stunning and sophisticated June 13 attack on Iran set off a worrying 12-day escalatory spiral. Iran responded in short order with ballistic missile and drone strikes, which led to a series of tit-for-tat exchanges between the two sides. A cease-fire is now in place -- but will it hold?

Type: Analysis

What Are the Limits of U.S.-India Security Burden-Sharing in the Indian Ocean?

What Are the Limits of U.S.-India Security Burden-Sharing in the Indian Ocean?

Monday, June 23, 2025

By: Nilanthi Samaranayake, Adjunct Fellow, East-West Center

When viewing U.S. partnerships in the maritime domain, relations with India, in particular, have thrived — especially over the past decade. Moreover, the partnership enjoys bipartisan support in the United States. Indications after Prime Minister Narendra Modi’s visit to the White House in February 2025 are that U.S.-India security relations will continue to be strong in the second Trump administration.

Type: Analysis

What’s at Stake for China in the Iran War?

What’s at Stake for China in the Iran War?

Monday, June 23, 2025

China has major energy and economic interests that are threatened by an escalating conflict. But Beijing may also see some strategic opportunities with the U.S. focused on the war. Ultimately, China is likely unwilling, and unable, to make a serious effort to broker peace.

Type: Analysis

The Element of Surprise: Space and Cyber Warfare in U.S.-China Rivalry

The Element of Surprise: Space and Cyber Warfare in U.S.-China Rivalry

Wednesday, June 18, 2025

The 2024 revelations over China’s effort to implant malware in critical U.S. infrastructure by the Volt Typhoon hacking group — as well as the Salt Typhoon group’s successful breaching of at least nine major U.S. telecoms — have renewed concern over Beijing’s constant, ongoing efforts to hack Western companies, governments and non-governmental organizations. Unlike past incidents, like those involving Chinese military unit 61398, which were largely about cyber espionage, the Volt Typhoon group was actively implanting malware designed to disrupt critical infrastructure such as water and power systems.

Type: Analysis

View All Research & Analysis