Articles

27 Items

A protester holds up a placard outside the U.S. Consulate in Hong Kong, Wednesday, June 26, 2019.

AP Photo/Kin Cheung

Journal Article - Quarterly Journal: International Security

Nowhere to Hide? Global Policing and the Politics of Extradition

    Author:
  • Daniel Krcmaric
| Fall 2022

U.S. power extends beyond the military and economic spheres to include policing. The United States has used its global policing power to capture terrorists, warlords, and drug kingpins. But extradition is not simply a bureaucratic tool. States’ geopolitical interests shape their willingness to cooperate with others in extraditing fugitives. 

Soldiers conducting a Mobile Training Team deployment in Liberia.

U.S. Army

Journal Article - Quarterly Journal: International Security

Soldiers' Dilemma: Foreign Military Training and Liberal Norm Conflict

| Spring 2022

When the U.S. military trains other states’ forces, it tries to impart liberal norms such as respect for human rights. But when liberal norms clash, these soldiers prioritize loyalty to their unit, the military, and shared goals.

Black Americans register to vote in the July 4 Georgia Democratic Primary in Atlanta, Ga., on May 3, 1944. Registrations are increasing in Atlanta as black schools are giving instructions to students in ballot casting procedure.

AP Photo

Journal Article - Quarterly Journal: International Security

White Supremacy, Terrorism, and the Failure of Reconstruction in the United States

| Summer 2021

White Southerners opposed to Reconstruction used violence to undermine Black political power and force uncommitted white Southerners to their side. Although structural factors made it harder for the U.S. government to suppress this violence, a series of policy failures prompted Reconstruction’s failure and generations of injustice.

U.S. President Dwight D. Eisenhower and Secretary of State John Foster Dulles (from left) greet South Vietnamese President Ngo Dinh Diem at Washington National Airport

DoD/Department of the Air Force

Journal Article - Small Wars Journal

Bernard Fall as an Andrew Marshall Avant la Lettre (Part II)

| Dec. 09, 2019

SWJ interview with Nathaniel L. Moir, Ph.D., an Ernest May Postdoctoral Fellow in History and Policy at the Belfer Center for Science and International Affairs, Harvard Kennedy School. Dr. Moir is completing a book manuscript on Bernard Fall for publication.

A worker is silhouetted against a computer display showing a live visualization of the online phishing and fraudulent phone calls across China during the 4th China Internet Security Conference in Beijing. Aug. 16, 2016 (Ng Han Guan/Associated Press, File). Keywords: China, cyberattack

Ng Han Guan/Associated Press, File

Newspaper Article - The Wall Street Journal

Review: An Uneasy Unpeace

| Jan. 21, 2018

In the cyber arena, the same technologies that are creating unprecedented benefits for billions are also democratizing destruction. Graham Allison reviews ‘The Virtual Weapon and International Order’ by Lucas Kello.

Security detail overseeing the secure transportation of highly enriched uranium to Russia in Poland, October 2010

USA.gov

Journal Article - Journal of Nuclear Materials Management

Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries

| June 17, 2013

Through structured interviews and a literature review, we assess which approaches to protection against insider thefts in the casino and pharmaceutical industries could be usefully applied to strengthen protections against insider theft in the nuclear industry, where insider thefts could have very high consequences.

June 5, 2008: Gotthard Lerch, right, watches the judges entering the courtroom in Stuttgart, Germany. He admitted to helping procure centrifuge parts for Libya, was convicted in 2008 on minor charges, and sentenced to time served in pretrial detention.

AP Photo

Magazine Article - TIME / time.com

Nuclear Proliferation: The Crime with No Punishment?

| September 16, 2011

"Nuclear proliferation is a crime that pays well. Those involved in the Khan network were made very wealthy for their efforts, and the inability of the international community to effectively punish them has resulted in a missed opportunity to provide a deterrent against future black-market salesmen."

Four nuclear policy veterans — Joseph S. Nye Jr. (from left), Ashton B. Carter, Albert Carnesale, and Graham Allison — gathered at the Harvard Kennedy School for a seminar on the current challenges in avoiding nuclear war.

Photo by Sharon Wilke

Magazine Article - Harvard University Office of News and Public Affairs Harvard Gazette

Nuclear Threats, Then and Now

| May 19, 2011

In 1985, researchers at the Harvard Kennedy School published a book called “Hawks, Doves, and Owls,” and gave it an ambitious subtitle: “An Agenda for Avoiding Nuclear War.” Those scholars gathered again at the School on Monday (May 16) for a seminar on the current challenges in avoiding nuclear war — and to marvel at just how drastically the nuclear threat has morphed in the two decades since the Cold War ended and the Soviet Union collapsed.

(R-L) Soviet Commissar for Foreign Affairs Vyacheslav Molotov, General Secretary of the Communist Party Josef Stalin, & German Reich Foreign Minister Joachim von Ribbentrop signing the German-Soviet non-aggression pact in Moscow, Aug 23, 1939.

AP Photo

Journal Article - Quarterly Journal: International Security

Preventing Enemy Coalitions: How Wedge Strategies Shape Power Politics

| Spring 2011

States use wedge strategies to prevent hostile alliances from forming or to dis­perse those that have formed. These strategies can cause power alignments that are otherwise unlikely to occur, and thus have significant consequences for international politics. How do such strategies work and what conditions promote their success? The wedge strategies that are likely to have significant effects use selective accommodation—concessions, compensations, and other inducements—to detach and neutralize potential adversaries. These kinds of strategies play important roles in the statecraft of both defensive and offensive powers. Defenders use selective accommodation to balance against a primary threat by neutralizing lesser ones that might ally with it. Expansionists use se­lective accommodation to prevent or break up blocking coalitions, isolating opposing states by inducing potential balancers to buck-pass, bandwagon, or hide. Two cases—Great Britain’s defensive attempts to accommodate Italy in the late 1930s and Germany’s offensive efforts to accommodate the Soviet Union in 1939—help to demonstrate these arguments. By paying attention to these dynamics, international relations scholars can better understand how balancing works in specific cases, how it manifests more broadly in interna­tional politics, and why it sometimes fails in situations where it ought to work well.

Indian special police officers exit the landmark Taj Hotel in Mumbai, India, Nov. 29, 2008. Indian commandos killed the last remaining gunmen holed up at the hotel, ending a 60-hour rampage through the city by suspected Islamic militants.

AP Photo

Journal Article - CTC Sentinel

Improving India's Counterterrorism Policy after Mumbai

| April 2009

"All of these pathologies were evident in the failure to prevent or appropriately respond to the Mumbai attacks. There was in fact significant intelligence suggesting a seaborne terrorist attack was likely, and even that prominent sites such as the Taj Hotel would be targeted. This information, however, was ignored by several key bureaucratic actors—including the Coast Guard and the Maharashtra state director-general of police—because it was deemed unactionable. Others, such as the Maharashtra Anti-Terrorism Squad, at least attempted some kind of preparation. The differences in readiness highlight the extent of fragmentation among the security apparatus. Even when Mumbai police tried to take preventive action, they lacked the manpower to sustain increased security at the hotels. Once the attack occurred, the security forces did not have sufficient night-vision equipment, heavy weaponry, or information about the attack sites, leading to a long response time and the emergence of a disastrous siege...."