Articles

26 Items

U.S. President Dwight D. Eisenhower and Secretary of State John Foster Dulles (from left) greet South Vietnamese President Ngo Dinh Diem at Washington National Airport

DoD/Department of the Air Force

Journal Article - Small Wars Journal

Bernard Fall as an Andrew Marshall Avant la Lettre (Part II)

| Dec. 09, 2019

SWJ interview with Nathaniel L. Moir, Ph.D., an Ernest May Postdoctoral Fellow in History and Policy at the Belfer Center for Science and International Affairs, Harvard Kennedy School. Dr. Moir is completing a book manuscript on Bernard Fall for publication.

U.S. Sailors assigned to Navy Cyber Defense Operations Command (NCDOC) man their stations at Joint Expeditionary Base Little Creek-Fort Story, Va., Aug. 4, 2010.

U.S. Navy Photo

Journal Article - Quarterly Journal: International Security

The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth

    Author:
  • Erik Gartzke
| Fall 2013

Cyberwar has been described as a revolution in military affairs capable of overturning the prevailing world order. By itself, however, cyberwar can achieve neither conquest nor, in most cases, coercion. Conflict over the internet is much more likely to serve as an adjunct to, rather than a substitute for, existing modes of terrestrial force, and to augment the advantages of status quo powers rather than threatening existing political hierarchies.

March 8, 2012: Norwich University student Adam Marenna, of Belair, Md.  Deep in the bowels of a building on the campus of the nation's oldest private military academy, students from across the globe are being taught to fight the war of the future.

AP Photo/Toby Talbot

Journal Article - Quarterly Journal: International Security

The Meaning of the Cyber Revolution: Perils to Theory and Statecraft

| Fall 2013

While decisionmakers warn about the cyber threat constantly, there is little systematic analysis of the issue from an international security studies perspective. Cyberweapons are expanding the range of possible harm between the concepts of war and peace, and give rise to enormous defense complications and dangers to strategic stability. It is detrimental to the intellectual progress and policy relevance of the security studies field to continue to avoid the cyber revolution's central questions.

Security detail overseeing the secure transportation of highly enriched uranium to Russia in Poland, October 2010

USA.gov

Journal Article - Journal of Nuclear Materials Management

Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries

| June 17, 2013

Through structured interviews and a literature review, we assess which approaches to protection against insider thefts in the casino and pharmaceutical industries could be usefully applied to strengthen protections against insider theft in the nuclear industry, where insider thefts could have very high consequences.

Four nuclear policy veterans — Joseph S. Nye Jr. (from left), Ashton B. Carter, Albert Carnesale, and Graham Allison — gathered at the Harvard Kennedy School for a seminar on the current challenges in avoiding nuclear war.

Photo by Sharon Wilke

Magazine Article - Harvard University Office of News and Public Affairs Harvard Gazette

Nuclear Threats, Then and Now

| May 19, 2011

In 1985, researchers at the Harvard Kennedy School published a book called “Hawks, Doves, and Owls,” and gave it an ambitious subtitle: “An Agenda for Avoiding Nuclear War.” Those scholars gathered again at the School on Monday (May 16) for a seminar on the current challenges in avoiding nuclear war — and to marvel at just how drastically the nuclear threat has morphed in the two decades since the Cold War ended and the Soviet Union collapsed.

(R-L) Soviet Commissar for Foreign Affairs Vyacheslav Molotov, General Secretary of the Communist Party Josef Stalin, & German Reich Foreign Minister Joachim von Ribbentrop signing the German-Soviet non-aggression pact in Moscow, Aug 23, 1939.

AP Photo

Journal Article - Quarterly Journal: International Security

Preventing Enemy Coalitions: How Wedge Strategies Shape Power Politics

| Spring 2011

States use wedge strategies to prevent hostile alliances from forming or to dis­perse those that have formed. These strategies can cause power alignments that are otherwise unlikely to occur, and thus have significant consequences for international politics. How do such strategies work and what conditions promote their success? The wedge strategies that are likely to have significant effects use selective accommodation—concessions, compensations, and other inducements—to detach and neutralize potential adversaries. These kinds of strategies play important roles in the statecraft of both defensive and offensive powers. Defenders use selective accommodation to balance against a primary threat by neutralizing lesser ones that might ally with it. Expansionists use se­lective accommodation to prevent or break up blocking coalitions, isolating opposing states by inducing potential balancers to buck-pass, bandwagon, or hide. Two cases—Great Britain’s defensive attempts to accommodate Italy in the late 1930s and Germany’s offensive efforts to accommodate the Soviet Union in 1939—help to demonstrate these arguments. By paying attention to these dynamics, international relations scholars can better understand how balancing works in specific cases, how it manifests more broadly in interna­tional politics, and why it sometimes fails in situations where it ought to work well.

Indian special police officers exit the landmark Taj Hotel in Mumbai, India, Nov. 29, 2008. Indian commandos killed the last remaining gunmen holed up at the hotel, ending a 60-hour rampage through the city by suspected Islamic militants.

AP Photo

Journal Article - CTC Sentinel

Improving India's Counterterrorism Policy after Mumbai

| April 2009

"All of these pathologies were evident in the failure to prevent or appropriately respond to the Mumbai attacks. There was in fact significant intelligence suggesting a seaborne terrorist attack was likely, and even that prominent sites such as the Taj Hotel would be targeted. This information, however, was ignored by several key bureaucratic actors—including the Coast Guard and the Maharashtra state director-general of police—because it was deemed unactionable. Others, such as the Maharashtra Anti-Terrorism Squad, at least attempted some kind of preparation. The differences in readiness highlight the extent of fragmentation among the security apparatus. Even when Mumbai police tried to take preventive action, they lacked the manpower to sustain increased security at the hotels. Once the attack occurred, the security forces did not have sufficient night-vision equipment, heavy weaponry, or information about the attack sites, leading to a long response time and the emergence of a disastrous siege...."

Journal Article - Quarterly Journal: International Security

The Window of Vulnerability That Wasn’t: Soviet Military Buildup in the 1970s—A Research Note

    Author:
  • Pavel Podvig
| Summer 2008

The Soviet strategic modernization program of the 1970s was one of the most consequential developments of the Cold War. Deployment of new intercontinental ballistic missiles and the dramatic increase in the number of strategic warheads in the Soviet arsenal created a sense of vulnerability in the United States that was, to a large degree, responsible for the U.S. military buildup of the late 1970s and early 1980s and the escalation of Cold War tensions during that period. U.S. assessments concluded that the Soviet Union was seeking to achieve a capability to fight and win a nuclear war. Estimates of missile accu¬racy and silo hardness provided by the U.S. intelligence community led many in the United States to conclude that the Soviet Union was building a strategic missile force capable of destroying most U.S. missiles in a counterforce strike and of surviving a subsequent nuclear exchange. Soviet archival documents that have recently become available demonstrate that this conclusion was wrong. The U.S. estimates substantially overestimated the accuracy of the Soviet Union's missiles and the degree of silo reinforcement. As the data demonstrate, the Soviet missile force did not have the capability to launch a successful first strike. Moreover, the data strongly suggest that the Soviet Union never attempted to acquire a first-strike capability, concentrating instead on strategies based on retaliation.