International Security & Defense

670 Items

Image of Vladimir Putin standing in front of a podium

AP Photo

In this image released by the Department of Defense on Wednesday, Feb. 22, 2023, a U.S. Air Force U-2 pilot looks down at a suspected Chinese surveillance balloon as it hovers over the United States on Feb. 3, 2023.

Department of Defense via AP

Analysis & Opinions - Foreign Affairs

The Chinese Balloon Was a Necessary Wake-Up Call

| Feb. 23, 2023

The United States tends to react to unexpected events with a combination of fear, political recrimination, and bravado—not a particularly effective mix when it comes to evaluating and responding to potential crises. Despite widespread expressions of concern, some warranted and some hyperbolic, the Chinese surveillance balloon spotted over Montana (and tracked across the country before a fighter jet shot it down over the Atlantic) did not represent a crisis. In fact, it was a gift from Beijing: a necessary wake-up call about the shortcomings in the United States’ national defense. 

North Korean leader Kim Jong Un, second from right, inspects the preparation of the launch of a Hwasong-14 ICBM in North Korea on July 4, 2017.

AP Photo

Journal Article - Quarterly Journal: International Security

Defending the United States: Revisiting National Missile Defense against North Korea

| Winter 2021/22

The costly Ground-based Midcourse Defense system remains unproven and unreliable in deterring North Korea’s threat to use intercontinental ballistic missiles. An airborne boost-phase intercept system may offer an alternative defense against North Korea without threatening Russian or Chinese deterrents.

A member of the Afghan security forces walks in the sprawling Bagram air base after the American military departed, in Parwan province north of Kabul, Afghanistan, Monday, July 5, 2021.

AP Photo/Rahmat Gul

Paper

Easier to Get into War Than to Get Out: The Case of Afghanistan

| August 2021

The U.S. should accept with humility its inability to fully eliminate terrorism. Specifically, U.S. policy must balance “ends, ways, and means;” establish clear and achievable objectives; adopt efficient, effective, and resource-sustainable strategies; ensure synchronization of diplomatic and military efforts; build alliances to share the burden of countering terrorism; and leverage cooperative mechanisms and regional partnerships to increase the capacity and willingness of regional states to defend their sovereignty and contribute to multinational coalitions against terrorism.  A balanced, integrated, and synchronized strategy encompassing defense, diplomacy, economic, and humanitarian assistance lines of effort should be cornerstone of a revamped foreign policy in the coming decades.

people look at a destroyed houses near the village of Barisha, in Idlib province, Syria, after an operation by the U.S. military which targeted Abu Bakr al-Baghdadi, the shadowy leader of the Islamic State group.

Ghaith Alsayed

Newspaper Article - The New York Times

Intelligence From al-Baghdadi Raid, Including 2 Prisoners, Could Reveal Trove of ISIS Clues

| Oct. 28, 2019

Delta Force commandos took two Islamic State fighters as prisoners and a trove of intelligence from the now-destroyed compound where AbuBakral-Baghdadi, the world’s most wanted terrorist, had been hiding, officials said Monday.

Nigerian schoolgirls sitting in presidential palace

(AP Photo/Azeez Akunleyan)

Journal Article - Quarterly Journal: International Security

“We Have Captured Your Women”: Explaining Jihadist Norm Change

| Summer 2019

In Pakistan and Nigeria, jihadist entrepreneurs have capitalized on external trigger events not only to successfully challenge established religious doctrine and norms, but to adopt radically new norms, including the use of gendered violence.

A funeral ceremony in Kobani, Syria

Wikicommons

Journal Article - E-International Relations (E-IR)

Societal (In)Security in the Middle East: Radicalism as a Reaction?

| Apr. 24, 2019

Societal insecurity, stemming from historical and functional realities has emboldened the identity-based gap of states vs. societies in the Arab region. The division of the Ottoman Empire into new states without much attention to identity lines, created a historical identity challenge in those states. On the other hand, Arab ruling elites’ efforts to enforce state-centred identities failed to prevent the challenge of conflicting identities. Later on, their functional inefficiencies emboldened the identity dichotomy.

As a result of threats perceived by Arab societies against their collective identity as well as separate challenges facing each state, the state-society gap continues to challenge state identities. Collectively perceived threats create and strengthen collective frameworks intended to address those threats. And among other frameworks come radical and terrorist organisations.

Syrian army soldier stands at a check-point

AP/Sergei Grits

Analysis & Opinions - Haaretz

The Assad Regime Won Syria's Civil War. Can It Survive an Israeli Attack?

| Mar. 10, 2019

Chuck Freilich writes that the Syrian conflict has triggered Israel's primal fear: the threat of an entrenched Iranian presence on its borders. If a resurgent, unreliable Russia doesn't step in, then Assad and his army will be Israel's first targets.

Maintaining America's Edge

Aspen Strategy Group

Book Chapter - Aspen Strategy Group

Introduction: Navigating Uncharted Territory in the Technological Era

| Jan. 30, 2019

In August 2018, the nonpartisan Aspen Strategy Group (ASG) convened its thirtyfourth annual meeting in Aspen, Colorado. Over the course of three days, ASG members and invited experts from government, universities, think tanks, and the private sector debated the impact of dramatic technological change over the next decade on American national security. Our conversations covered a wide breadth of emerging technologies—artificial intelligence, machine learning, quantum computing, and biotechnology—and the challenges they pose to America’s military, the intelligence community, U.S. economic power, and democratic institutions. Our group grappled with the central dilemma of how the U.S. government can harness these technologies—developed primarily in the private sector and research labs—to compete with China and other adversaries in the years ahead.