Articles

27 Items

Military watching the start of work on the first part of some 180 kilometers of a 5.5 meter-high metal wall

AP/Czarek Sokolowski

Magazine Article - Foreign Affairs

When Migrants Become Weapons: The Long History and Worrying Future of a Coercive Tactic

| March/April 2022

Kelly Greenhill argues that by exploiting political divisions that exist within targeted states, the threatened or actual deployment of engineered flows of migrants has long been a distressingly effective policy instrument, and it is unlikely to go away anytime soon. Unless policymakers begin to confront the forces that enable weaponized migration, the favored policy responses seem destined to increase, rather than curtail, its use.

U.S. President Dwight D. Eisenhower and Secretary of State John Foster Dulles (from left) greet South Vietnamese President Ngo Dinh Diem at Washington National Airport

DoD/Department of the Air Force

Journal Article - Small Wars Journal

Bernard Fall as an Andrew Marshall Avant la Lettre (Part II)

| Dec. 09, 2019

SWJ interview with Nathaniel L. Moir, Ph.D., an Ernest May Postdoctoral Fellow in History and Policy at the Belfer Center for Science and International Affairs, Harvard Kennedy School. Dr. Moir is completing a book manuscript on Bernard Fall for publication.

Journal Article - Quarterly Journal: International Security

Correspondence: Military-Technological Imitation and Rising Powers

| Fall 2019

Michael C. Horowitz and Shahryar Pasandideh respond to Andrea Gilli and Mauro Gilli’s winter 2018/19 article, “Why China Has Not Caught Up Yet: Military-Technological Superiority and the Limits of Imitation, Reverse Engineering, and Cyber Espionage.”

Chinese stealth fighter in the air

(China Military Online)

Journal Article - Quarterly Journal: International Security

Why China Has Not Caught Up Yet: Military-Technological Superiority, Systems Integration, and the Challenges of Imitation, Reverse Engineering, and Cyber-Espionage

| Winter 2018/19

The extraordinary complexity of today’s advanced weapons systems has significantly reduced the ability of states to imitate other states’ military technology. Consequently, U.S. rivals such as China will continue to struggle to develop indigenous capabilities that can match those of the United States.

Journal Article - European Law Journal

Open Arms Behind Barred Doors: Fear, Hypocrisy and Policy Schizophrenia in the European Migration Crisis

| May 2016

"In 2015, over one million refugees and migrants arrived in Europe, laying bare the limitations of the EU's common border control and burden-sharing systems. This article examines consequences of the EU's disjoint, schizophrenic and, at times, hypocritical responses to what has become known as the European migration crisis."

Sub-Saharan migrants climb over a metallic fence that divides Morocco and the Spanish enclave of Melilla on Friday, March 28, 2014.

Santi Palacios/ AP

Journal Article - Quarterly Journal: International Security

Barriers to Entry: Who Builds Fortified Boundaries and Why

    Authors:
  • Ron E. Hassner
  • Jason Wittenberg
| Summer 2015

Contrary to conventional wisdom, states do not typically construct fortified boundaries in response to border disputes or to prevent terrorism. Instead, most build such boundaries for economic reasons, to keep out unwanted migrants from poorer states. Further, Muslim states are more likely to both build and be the targets of fortified boundaries.

Security detail overseeing the secure transportation of highly enriched uranium to Russia in Poland, October 2010

USA.gov

Journal Article - Journal of Nuclear Materials Management

Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries

| June 17, 2013

Through structured interviews and a literature review, we assess which approaches to protection against insider thefts in the casino and pharmaceutical industries could be usefully applied to strengthen protections against insider theft in the nuclear industry, where insider thefts could have very high consequences.

In this Sept. 24, 2010, file photo the National Cybersecurity & Communications Integration Center (NCCIC) prepares for the Cyber Storm III exercise at its operations center in Arlington, Va.

AP Photo

Magazine Article - Bulletin of the American Academy of Arts and Sciences

The Future of Power

| Spring 2011

"The conventional wisdom among those who looked at the Middle East used to be that you had a choice either of supporting the autocrat or being stuck with the religious extremists. The extraordinary diffusion of information created in Egypt and other Middle Eastern countries reveals a strong middle that we weren't fully aware of. What is more, new technologies allow this new middle to coordinate in ways unseen before Twitter, Facebook, and so forth, and this could lead to a very different politics of the Middle East. This introduces a new complexity to our government's dealings with the region."