Articles

45 Items

North Korea celebrates Victory Day in 2013

Stefan Krasowski

Journal Article - Intelligence and National Security

Countering a Technological Berlin Tunnel: North Korean Operatives, Helicopters, and Intelligence in the Cold War Illicit Arms Trade, 1981-1986

| Apr. 04, 2022

This article considers the relationship between intelligence and the arms trade by examining North Korea’s procurement of 86 Hughes helicopters in the 1980s. Using recently declassified documents, the article contextualises the case using US intelligence assessments of North Korea’s procurement, and considers the role of the DPRK’s diplomats in Berlin, and the Western powers’ response. This history provides insights into the use of intelligence operatives for arms procurement, the role of intelligence agencies in monitoring the illicit arms trade, and the challenges in collection, analysis and acting on the intelligence surrounding arms trafficking.

Police vehicle checkpoint in China

(AP Photo/Andy Wong)

Journal Article - Quarterly Journal: International Security

Counterterrorism and Preventive Repression: China’s Changing Strategy in Xinjiang

    Authors:
  • Sheena Chestnut Greitens
  • Myunghee Lee
  • Emir Yazici
| Winter 2019/20

The Chinese Communist Party changed its internal security strategy in Xinjiang in early 2017 because of Beijing’s changing perception of Uyghur involvement in transnational Islamic militancy abroad, which heightened perceived domestic vulnerability to terrorism.

U.S. President Dwight D. Eisenhower and Secretary of State John Foster Dulles (from left) greet South Vietnamese President Ngo Dinh Diem at Washington National Airport

DoD/Department of the Air Force

Journal Article - Small Wars Journal

Bernard Fall as an Andrew Marshall Avant la Lettre (Part II)

| Dec. 09, 2019

SWJ interview with Nathaniel L. Moir, Ph.D., an Ernest May Postdoctoral Fellow in History and Policy at the Belfer Center for Science and International Affairs, Harvard Kennedy School. Dr. Moir is completing a book manuscript on Bernard Fall for publication.

A worker is silhouetted against a computer display showing a live visualization of the online phishing and fraudulent phone calls across China during the 4th China Internet Security Conference in Beijing. Aug. 16, 2016 (Ng Han Guan/Associated Press, File). Keywords: China, cyberattack

Ng Han Guan/Associated Press, File

Newspaper Article - The Wall Street Journal

Review: An Uneasy Unpeace

| Jan. 21, 2018

In the cyber arena, the same technologies that are creating unprecedented benefits for billions are also democratizing destruction. Graham Allison reviews ‘The Virtual Weapon and International Order’ by Lucas Kello.

Skulls at site of executions ordered by Pakistan military officials, Bangladesh, December 13, 1971.

AP

Journal Article - Quarterly Journal: International Security

Bargaining Away Justice: India, Pakistan, and the International Politics of Impunity for the Bangladesh Genocide

    Author:
  • Gary Bass
| Fall 2016

During the 1971 Bangladesh war for independence from Pakistan, the Pakistan army carried out a genocide that killed hundreds of thousands of Bengalis in what was then East Pakistan. The perpetrators never faced trial. Archival documents reveal how India and Bangladesh sacrificed the opportunity for war crimes trials to gain Pakistan’s agreement on key security goals—the Simla peace agreement and recognition of Bangladesh’s independence. The legacy of this decision continues to blight Bangladesh’s politics.

Refining crude oil in Al Mansura, east of Al Raqqah, northern Syria, May 8, 2013.

Rex Features via AP Images

Journal Article - Quarterly Journal: International Security

Fueling the Fire: Pathways from Oil to War

    Author:
  • Jeff D. Colgan
| Fall 2013

While the threat of "resource wars" over possession of oil reserves is often exaggerated, between one-quarter and one-half of interstate wars since 1973 have been connected to one or more of eight distinct oil-related causal mechanisms. Understanding these mechanisms can help policymakers design grand strategy and allocate military resources.

Security detail overseeing the secure transportation of highly enriched uranium to Russia in Poland, October 2010

USA.gov

Journal Article - Journal of Nuclear Materials Management

Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries

| June 17, 2013

Through structured interviews and a literature review, we assess which approaches to protection against insider thefts in the casino and pharmaceutical industries could be usefully applied to strengthen protections against insider theft in the nuclear industry, where insider thefts could have very high consequences.