Articles

9 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

U.S. President Dwight D. Eisenhower and Secretary of State John Foster Dulles (from left) greet South Vietnamese President Ngo Dinh Diem at Washington National Airport

DoD/Department of the Air Force

Journal Article - Small Wars Journal

Bernard Fall as an Andrew Marshall Avant la Lettre (Part II)

| Dec. 09, 2019

SWJ interview with Nathaniel L. Moir, Ph.D., an Ernest May Postdoctoral Fellow in History and Policy at the Belfer Center for Science and International Affairs, Harvard Kennedy School. Dr. Moir is completing a book manuscript on Bernard Fall for publication.

March 8, 2012: Norwich University student Adam Marenna, of Belair, Md.  Deep in the bowels of a building on the campus of the nation's oldest private military academy, students from across the globe are being taught to fight the war of the future.

AP Photo/Toby Talbot

Journal Article - Quarterly Journal: International Security

The Meaning of the Cyber Revolution: Perils to Theory and Statecraft

| Fall 2013

While decisionmakers warn about the cyber threat constantly, there is little systematic analysis of the issue from an international security studies perspective. Cyberweapons are expanding the range of possible harm between the concepts of war and peace, and give rise to enormous defense complications and dangers to strategic stability. It is detrimental to the intellectual progress and policy relevance of the security studies field to continue to avoid the cyber revolution's central questions.

Indian special police officers exit the landmark Taj Hotel in Mumbai, India, Nov. 29, 2008. Indian commandos killed the last remaining gunmen holed up at the hotel, ending a 60-hour rampage through the city by suspected Islamic militants.

AP Photo

Journal Article - CTC Sentinel

Improving India's Counterterrorism Policy after Mumbai

| April 2009

"All of these pathologies were evident in the failure to prevent or appropriately respond to the Mumbai attacks. There was in fact significant intelligence suggesting a seaborne terrorist attack was likely, and even that prominent sites such as the Taj Hotel would be targeted. This information, however, was ignored by several key bureaucratic actors—including the Coast Guard and the Maharashtra state director-general of police—because it was deemed unactionable. Others, such as the Maharashtra Anti-Terrorism Squad, at least attempted some kind of preparation. The differences in readiness highlight the extent of fragmentation among the security apparatus. Even when Mumbai police tried to take preventive action, they lacked the manpower to sustain increased security at the hotels. Once the attack occurred, the security forces did not have sufficient night-vision equipment, heavy weaponry, or information about the attack sites, leading to a long response time and the emergence of a disastrous siege...."