Articles

40 Items

North Korea celebrates Victory Day in 2013

Stefan Krasowski

Journal Article - Intelligence and National Security

Countering a Technological Berlin Tunnel: North Korean Operatives, Helicopters, and Intelligence in the Cold War Illicit Arms Trade, 1981-1986

| Apr. 04, 2022

This article considers the relationship between intelligence and the arms trade by examining North Korea’s procurement of 86 Hughes helicopters in the 1980s. Using recently declassified documents, the article contextualises the case using US intelligence assessments of North Korea’s procurement, and considers the role of the DPRK’s diplomats in Berlin, and the Western powers’ response. This history provides insights into the use of intelligence operatives for arms procurement, the role of intelligence agencies in monitoring the illicit arms trade, and the challenges in collection, analysis and acting on the intelligence surrounding arms trafficking.

Police vehicle checkpoint in China

(AP Photo/Andy Wong)

Journal Article - Quarterly Journal: International Security

Counterterrorism and Preventive Repression: China’s Changing Strategy in Xinjiang

    Authors:
  • Sheena Chestnut Greitens
  • Myunghee Lee
  • Emir Yazici
| Winter 2019/20

The Chinese Communist Party changed its internal security strategy in Xinjiang in early 2017 because of Beijing’s changing perception of Uyghur involvement in transnational Islamic militancy abroad, which heightened perceived domestic vulnerability to terrorism.

U.S. President Dwight D. Eisenhower and Secretary of State John Foster Dulles (from left) greet South Vietnamese President Ngo Dinh Diem at Washington National Airport

DoD/Department of the Air Force

Journal Article - Small Wars Journal

Bernard Fall as an Andrew Marshall Avant la Lettre (Part II)

| Dec. 09, 2019

SWJ interview with Nathaniel L. Moir, Ph.D., an Ernest May Postdoctoral Fellow in History and Policy at the Belfer Center for Science and International Affairs, Harvard Kennedy School. Dr. Moir is completing a book manuscript on Bernard Fall for publication.

Journal Article - Quarterly Journal: International Security

Correspondence: Military-Technological Imitation and Rising Powers

| Fall 2019

Michael C. Horowitz and Shahryar Pasandideh respond to Andrea Gilli and Mauro Gilli’s winter 2018/19 article, “Why China Has Not Caught Up Yet: Military-Technological Superiority and the Limits of Imitation, Reverse Engineering, and Cyber Espionage.”

Chinese stealth fighter in the air

(China Military Online)

Journal Article - Quarterly Journal: International Security

Why China Has Not Caught Up Yet: Military-Technological Superiority, Systems Integration, and the Challenges of Imitation, Reverse Engineering, and Cyber-Espionage

| Winter 2018/19

The extraordinary complexity of today’s advanced weapons systems has significantly reduced the ability of states to imitate other states’ military technology. Consequently, U.S. rivals such as China will continue to struggle to develop indigenous capabilities that can match those of the United States.

Skulls at site of executions ordered by Pakistan military officials, Bangladesh, December 13, 1971.

AP

Journal Article - Quarterly Journal: International Security

Bargaining Away Justice: India, Pakistan, and the International Politics of Impunity for the Bangladesh Genocide

    Author:
  • Gary Bass
| Fall 2016

During the 1971 Bangladesh war for independence from Pakistan, the Pakistan army carried out a genocide that killed hundreds of thousands of Bengalis in what was then East Pakistan. The perpetrators never faced trial. Archival documents reveal how India and Bangladesh sacrificed the opportunity for war crimes trials to gain Pakistan’s agreement on key security goals—the Simla peace agreement and recognition of Bangladesh’s independence. The legacy of this decision continues to blight Bangladesh’s politics.

Refining crude oil in Al Mansura, east of Al Raqqah, northern Syria, May 8, 2013.

Rex Features via AP Images

Journal Article - Quarterly Journal: International Security

Fueling the Fire: Pathways from Oil to War

    Author:
  • Jeff D. Colgan
| Fall 2013

While the threat of "resource wars" over possession of oil reserves is often exaggerated, between one-quarter and one-half of interstate wars since 1973 have been connected to one or more of eight distinct oil-related causal mechanisms. Understanding these mechanisms can help policymakers design grand strategy and allocate military resources.