Articles

25 Items

Ugandan police and other security forces chase people off the streets to avoid unrest after all public transport was banned for two weeks to halt the spread of the new coronavirus.

AP Photo/Ronald Kabuubi

Journal Article - Quarterly Journal: International Security

Opportunistic Repression: Civilian Targeting by the State in Response to COVID-19

    Authors:
  • Donald Grasse
  • Melissa Pavlik
  • Hilary Matfess
  • Travis B. Curtice
| Fall 2021

Opportunistic repression arises when states use crises to suppress the political opposition. An examination of the relationship between COVID-19 shutdown policies and state violence against civilians in Africa, including and a subnational case study of Uganda, tests this theory.

U.S. President Dwight D. Eisenhower and Secretary of State John Foster Dulles (from left) greet South Vietnamese President Ngo Dinh Diem at Washington National Airport

DoD/Department of the Air Force

Journal Article - Small Wars Journal

Bernard Fall as an Andrew Marshall Avant la Lettre (Part II)

| Dec. 09, 2019

SWJ interview with Nathaniel L. Moir, Ph.D., an Ernest May Postdoctoral Fellow in History and Policy at the Belfer Center for Science and International Affairs, Harvard Kennedy School. Dr. Moir is completing a book manuscript on Bernard Fall for publication.

Journal Article - Quarterly Journal: International Security

Correspondence: Military-Technological Imitation and Rising Powers

| Fall 2019

Michael C. Horowitz and Shahryar Pasandideh respond to Andrea Gilli and Mauro Gilli’s winter 2018/19 article, “Why China Has Not Caught Up Yet: Military-Technological Superiority and the Limits of Imitation, Reverse Engineering, and Cyber Espionage.”

Chinese stealth fighter in the air

(China Military Online)

Journal Article - Quarterly Journal: International Security

Why China Has Not Caught Up Yet: Military-Technological Superiority, Systems Integration, and the Challenges of Imitation, Reverse Engineering, and Cyber-Espionage

| Winter 2018/19

The extraordinary complexity of today’s advanced weapons systems has significantly reduced the ability of states to imitate other states’ military technology. Consequently, U.S. rivals such as China will continue to struggle to develop indigenous capabilities that can match those of the United States.

The women in this image are Minova, DRC, rape survivors who are veiled so they cannot be seen or recognized in court during their testimony.

Globalpost image

Journal Article - Journal of Peace Research

Sexual Violence in Armed Conflict: Introducing the SVAC Dataset, 1989–2009

| May 2014

Which armed groups have perpetrated sexual violence in recent conflicts? This article presents patterns from the new Sexual Violence in Armed Conflict (SVAC) dataset. The dataset, coded from the three most widely used sources in the quantitative human rights literature, covers 129 active conflicts, and the 625 armed actors involved in these conflicts, during the period 1989–2009.

Journal Article - Institute of Nuclear Materials Management Journal of Nuclear Materials Management

Securing China’s Nuclear Power Plants

| Winter, 2014.

Since September 11, 2001, China has substantially advanced its physical protection system, with a switch in focus from the traditional "guns, gates, guards" approach to an effective mixed approach, combining personnel with modern techniques. Then-Chinese President Hu Jintao emphasized at the 2012 Nuclear Security Summit that, "In the future, China will further take nuclear security measures, make sure the security of its own nuclear materials and facilities, improve the overall nuclear security." This paper examines the specific and detailed physical protection approaches that are currently applied to China's nuclear power plants, and recommends further steps to improve China's existing nuclear security system.

Journal Article - Science & Global Security

Securing China’s Weapon-Usable Nuclear Materials

| Feb 18, 2014

This article describes the status of China’s military and civilian nuclear programs, fissile material production and associated nuclear facilities, and the Chinese nuclear experts and officials’ perspectives on the nuclear terrorism threat. It gives details of China’s nuclear security practices, attitudes, and regulations, as well as identifying areas of concern. The article recommends ways to strengthen China’s nuclear material protection, control, and accounting systems and suggests opportunities for increased international cooperation.

Security detail overseeing the secure transportation of highly enriched uranium to Russia in Poland, October 2010

USA.gov

Journal Article - Journal of Nuclear Materials Management

Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries

| June 17, 2013

Through structured interviews and a literature review, we assess which approaches to protection against insider thefts in the casino and pharmaceutical industries could be usefully applied to strengthen protections against insider theft in the nuclear industry, where insider thefts could have very high consequences.

Somali port workers load food aid onto trucks from a warehouse in Mogadishu's port, Dec. 7, 1992.  Disagreements between warring warlords had kept the port closed for more than a month.

AP Photo

Journal Article - International Journal

Agenda for Peace or Budget for War? Evaluating the Economic Impact of International Intervention in Somalia

| Spring 2012

This article shows how international humanitarian aid, particularly food aid, has played an instrumental role in perpetuating chronic civil war and state collapse in Somalia from 1992–2012. During the 1992 famine, food aid created lucrative opportunities for criminal elements of the Somali business community, who partnered with local warlords to create an enduring system of corruption and aid dependence. International aid financed this elite pact between business and warlords, which subsequently undermined domestic processes of order-making and reduced the bargaining power of local communities in the peace-building process.