Articles

17 Items

U.S. President Dwight D. Eisenhower and Secretary of State John Foster Dulles (from left) greet South Vietnamese President Ngo Dinh Diem at Washington National Airport

DoD/Department of the Air Force

Journal Article - Small Wars Journal

Bernard Fall as an Andrew Marshall Avant la Lettre (Part II)

| Dec. 09, 2019

SWJ interview with Nathaniel L. Moir, Ph.D., an Ernest May Postdoctoral Fellow in History and Policy at the Belfer Center for Science and International Affairs, Harvard Kennedy School. Dr. Moir is completing a book manuscript on Bernard Fall for publication.

Solider stand on shore with naval ship in the distance

(AP Photo/Bullit Marquez)

Journal Article - Quarterly Journal: International Security

Cautious Bully: Reputation, Resolve, and Beijing's Use of Coercion in the South China Sea

| Summer 2019

Contrary to the conventional wisdom, China is a cautious bully that seeks to balance between the need to establish resolve and the economic cost of coercion, seen through its territorial disputes in the South China Sea.

The European Central Bank building during sunset in Frankfurt, Germany

(AP Photo/Michael Probst, FILE)

Journal Article - Quarterly Journal: International Security

The End of War: How a Robust Marketplace and Liberal Hegemony Are Leading to Perpetual World Peace

| Summer 2019

Liberal market-oriented states are in a natural alliance to preserve and protect a global order that is systematically buttressing states’ embrace of market-oriented norms and values.

Security detail overseeing the secure transportation of highly enriched uranium to Russia in Poland, October 2010

USA.gov

Journal Article - Journal of Nuclear Materials Management

Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries

| June 17, 2013

Through structured interviews and a literature review, we assess which approaches to protection against insider thefts in the casino and pharmaceutical industries could be usefully applied to strengthen protections against insider theft in the nuclear industry, where insider thefts could have very high consequences.

In this Sept. 24, 2010, file photo the National Cybersecurity & Communications Integration Center (NCCIC) prepares for the Cyber Storm III exercise at its operations center in Arlington, Va.

AP Photo

Magazine Article - Bulletin of the American Academy of Arts and Sciences

The Future of Power

| Spring 2011

"The conventional wisdom among those who looked at the Middle East used to be that you had a choice either of supporting the autocrat or being stuck with the religious extremists. The extraordinary diffusion of information created in Egypt and other Middle Eastern countries reveals a strong middle that we weren't fully aware of. What is more, new technologies allow this new middle to coordinate in ways unseen before Twitter, Facebook, and so forth, and this could lead to a very different politics of the Middle East. This introduces a new complexity to our government's dealings with the region."

Indian special police officers exit the landmark Taj Hotel in Mumbai, India, Nov. 29, 2008. Indian commandos killed the last remaining gunmen holed up at the hotel, ending a 60-hour rampage through the city by suspected Islamic militants.

AP Photo

Journal Article - CTC Sentinel

Improving India's Counterterrorism Policy after Mumbai

| April 2009

"All of these pathologies were evident in the failure to prevent or appropriately respond to the Mumbai attacks. There was in fact significant intelligence suggesting a seaborne terrorist attack was likely, and even that prominent sites such as the Taj Hotel would be targeted. This information, however, was ignored by several key bureaucratic actors—including the Coast Guard and the Maharashtra state director-general of police—because it was deemed unactionable. Others, such as the Maharashtra Anti-Terrorism Squad, at least attempted some kind of preparation. The differences in readiness highlight the extent of fragmentation among the security apparatus. Even when Mumbai police tried to take preventive action, they lacked the manpower to sustain increased security at the hotels. Once the attack occurred, the security forces did not have sufficient night-vision equipment, heavy weaponry, or information about the attack sites, leading to a long response time and the emergence of a disastrous siege...."