Articles

22 Items

U.S. President Dwight D. Eisenhower and Secretary of State John Foster Dulles (from left) greet South Vietnamese President Ngo Dinh Diem at Washington National Airport

DoD/Department of the Air Force

Journal Article - Small Wars Journal

Bernard Fall as an Andrew Marshall Avant la Lettre (Part II)

| Dec. 09, 2019

SWJ interview with Nathaniel L. Moir, Ph.D., an Ernest May Postdoctoral Fellow in History and Policy at the Belfer Center for Science and International Affairs, Harvard Kennedy School. Dr. Moir is completing a book manuscript on Bernard Fall for publication.

Journal Article - Quarterly Journal: International Security

Correspondence: Military-Technological Imitation and Rising Powers

| Fall 2019

Michael C. Horowitz and Shahryar Pasandideh respond to Andrea Gilli and Mauro Gilli’s winter 2018/19 article, “Why China Has Not Caught Up Yet: Military-Technological Superiority and the Limits of Imitation, Reverse Engineering, and Cyber Espionage.”

Chinese stealth fighter in the air

(China Military Online)

Journal Article - Quarterly Journal: International Security

Why China Has Not Caught Up Yet: Military-Technological Superiority, Systems Integration, and the Challenges of Imitation, Reverse Engineering, and Cyber-Espionage

| Winter 2018/19

The extraordinary complexity of today’s advanced weapons systems has significantly reduced the ability of states to imitate other states’ military technology. Consequently, U.S. rivals such as China will continue to struggle to develop indigenous capabilities that can match those of the United States.

Chinese President Xi Jinping is displayed on a big screen in Beijing as Chinese battle tanks roll by during a Sept. 3, 2015 parade commemorating the 70th anniversary of Japan's surrender during World War II.

(AP Photo)

Magazine Article - The Atlantic

The Thucydides Trap: Are the U.S. and China Headed for War?

| September 24, 2015

The defining question about global order for this generation is whether China and the United States can escape Thucydides’s Trap. The Greek historian’s metaphor reminds us of the attendant dangers when a rising power rivals a ruling power—as Athens challenged Sparta in ancient Greece, or as Germany did Britain a century ago. Most such contests have ended badly, often for both nations, a team of mine at the Harvard Belfer Center for Science and International Affairs has concluded after analyzing the historical record. In 12 of 16 cases over the past 500 years, the result was war. When the parties avoided war, it required huge, painful adjustments in attitudes and actions on the part not just of the challenger but also the challenged.

In this photo taken Feb. 9, 2014, clouds loom over Sinopec oil refinery in Qingdao in China's Shandong province.

AP

Journal Article - Quarterly Journal: International Security

Is There an Oil Weapon? Security Implications of Changes in the Structure of the International Oil Market

    Authors:
  • Llewelyn Hughes
  • Austin Long
| Winter 2014/15

States have long worried that their dependence on oil gives producers a means of coercion. The oil market, however, is far larger and more integrated than it used to be. The potential for coercion differs across a series of distinct market segments. In this varied market, the United States remains the dominant force.

Cyclers drive past a branch of Sinopec in Haikou city, south Chinas Hainan province, December 1, 2012.

AP File Photo/ Chen Kang

Journal Article - Quarterly Journal: International Security

How Oil Influences U.S. National Security

| Fall 2013

U.S. scholars and policymakers commonly worry that a lack of "energy security" hurts U.S. national security, yet few have analyzed the links between states' energy requirements and the probability of military conflict. An investigation of these links identifies threats to U.S. national security flowing from other countries' consumption of oil, rather than just U.S. consumption. Furthermore, while many of the security threats associated with Persian Gulf oil have decreased, new oil-driven dangers are emerging in Northeast Asia.

Security detail overseeing the secure transportation of highly enriched uranium to Russia in Poland, October 2010

USA.gov

Journal Article - Journal of Nuclear Materials Management

Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries

| June 17, 2013

Through structured interviews and a literature review, we assess which approaches to protection against insider thefts in the casino and pharmaceutical industries could be usefully applied to strengthen protections against insider theft in the nuclear industry, where insider thefts could have very high consequences.

A  visitor walks past signs for energy conservation during the 2010 China International Industry Fair in Shanghai, China, 9 November 2010.

AP Photo

Journal Article - Energy

A Network-based Modeling Framework for Stakeholder Analysis of China's Energy Conservation Campaign

    Authors:
  • Wen Feng
  • Zheng Li
  • Edward F. Crawley
  • Weidou Ni
| August 2011

This paper proposes a network-based modeling framework to facilitate the development of stakeholder analysis of China's energy conservation campaign. Given the proposed framework, an illustrative case study is provided to elaborate how to integrate a set of techniques to further develop a quantitative model, as well as to demonstrate the practicability of the proposed framework. The results derived from the case study shows that the proposed framework and the model can be used as analytical tools to improve the government's policymaking process in term of providing a systematic perspective of stakeholder interrelations.

(R-L) Soviet Commissar for Foreign Affairs Vyacheslav Molotov, General Secretary of the Communist Party Josef Stalin, & German Reich Foreign Minister Joachim von Ribbentrop signing the German-Soviet non-aggression pact in Moscow, Aug 23, 1939.

AP Photo

Journal Article - Quarterly Journal: International Security

Preventing Enemy Coalitions: How Wedge Strategies Shape Power Politics

| Spring 2011

States use wedge strategies to prevent hostile alliances from forming or to dis­perse those that have formed. These strategies can cause power alignments that are otherwise unlikely to occur, and thus have significant consequences for international politics. How do such strategies work and what conditions promote their success? The wedge strategies that are likely to have significant effects use selective accommodation—concessions, compensations, and other inducements—to detach and neutralize potential adversaries. These kinds of strategies play important roles in the statecraft of both defensive and offensive powers. Defenders use selective accommodation to balance against a primary threat by neutralizing lesser ones that might ally with it. Expansionists use se­lective accommodation to prevent or break up blocking coalitions, isolating opposing states by inducing potential balancers to buck-pass, bandwagon, or hide. Two cases—Great Britain’s defensive attempts to accommodate Italy in the late 1930s and Germany’s offensive efforts to accommodate the Soviet Union in 1939—help to demonstrate these arguments. By paying attention to these dynamics, international relations scholars can better understand how balancing works in specific cases, how it manifests more broadly in interna­tional politics, and why it sometimes fails in situations where it ought to work well.

Journal Article - Quarterly Journal: International Security

The Security Curve and the Structure of International Politics: A Neorealist Synthesis

    Author:
  • Davide Fiammenghi
| Spring 2011

Realist scholars have long debated the question of how much power states need to feel secure. Offensive realists claim that states should constantly seek to increase their power. Defensive realists argue that accumulating too much power can be self-defeating. Proponents of hegemonic stability theory contend that the accumulation of capabilities in one state can exert a stabilizing effect on the system. The three schools describe different points along the power con­tinuum. When a state is weak, accumulating power increases its security. This is approximately the situation described by offensive realists. A state that con­tinues to accumulate capabilities will eventually triggers a balancing reaction that puts its security at risk. This scenario accords with defensive realist as­sumptions. Finally, when the state becomes too powerful to balance, its oppo­nents bandwagon with it, and the state’s security begins to increase again. This is the situation described by hegemonic stability theory. These three stages delineate a modified parabolic relationship between power and secu­rity. As a state moves along the power continuum, its security increases up to a point, then decreases, and finally increases again. This modified parabolic re­lationship allows scholars to synthesize previous realist theories into a single framework.