Articles

21 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

U.S. President Dwight D. Eisenhower and Secretary of State John Foster Dulles (from left) greet South Vietnamese President Ngo Dinh Diem at Washington National Airport

DoD/Department of the Air Force

Journal Article - Small Wars Journal

Bernard Fall as an Andrew Marshall Avant la Lettre (Part II)

| Dec. 09, 2019

SWJ interview with Nathaniel L. Moir, Ph.D., an Ernest May Postdoctoral Fellow in History and Policy at the Belfer Center for Science and International Affairs, Harvard Kennedy School. Dr. Moir is completing a book manuscript on Bernard Fall for publication.

March 8, 2012: Norwich University student Adam Marenna, of Belair, Md.  Deep in the bowels of a building on the campus of the nation's oldest private military academy, students from across the globe are being taught to fight the war of the future.

AP Photo/Toby Talbot

Journal Article - Quarterly Journal: International Security

The Meaning of the Cyber Revolution: Perils to Theory and Statecraft

| Fall 2013

While decisionmakers warn about the cyber threat constantly, there is little systematic analysis of the issue from an international security studies perspective. Cyberweapons are expanding the range of possible harm between the concepts of war and peace, and give rise to enormous defense complications and dangers to strategic stability. It is detrimental to the intellectual progress and policy relevance of the security studies field to continue to avoid the cyber revolution's central questions.

Security detail overseeing the secure transportation of highly enriched uranium to Russia in Poland, October 2010

USA.gov

Journal Article - Journal of Nuclear Materials Management

Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries

| June 17, 2013

Through structured interviews and a literature review, we assess which approaches to protection against insider thefts in the casino and pharmaceutical industries could be usefully applied to strengthen protections against insider theft in the nuclear industry, where insider thefts could have very high consequences.

Magazine Article - Nuclear Engineering International

China: The Next Few Years are Crucial for Nuclear Industry Growth

| June 1, 2013

After worldwide calls to action in the wake of the tsunami that devastated Fukushima Daiichi in March 2011, nuclear power plants have been shoring up their defenses for more than a year. Much has already been accomplished; many projects are only months away from realization. The end of 2013 marks the deadline for many countries’ medium-term actions. This article provides a country-by-country report which aims to give an overview of actions taken in most countries operating nuclear power plants.

(R-L) Soviet Commissar for Foreign Affairs Vyacheslav Molotov, General Secretary of the Communist Party Josef Stalin, & German Reich Foreign Minister Joachim von Ribbentrop signing the German-Soviet non-aggression pact in Moscow, Aug 23, 1939.

AP Photo

Journal Article - Quarterly Journal: International Security

Preventing Enemy Coalitions: How Wedge Strategies Shape Power Politics

| Spring 2011

States use wedge strategies to prevent hostile alliances from forming or to dis­perse those that have formed. These strategies can cause power alignments that are otherwise unlikely to occur, and thus have significant consequences for international politics. How do such strategies work and what conditions promote their success? The wedge strategies that are likely to have significant effects use selective accommodation—concessions, compensations, and other inducements—to detach and neutralize potential adversaries. These kinds of strategies play important roles in the statecraft of both defensive and offensive powers. Defenders use selective accommodation to balance against a primary threat by neutralizing lesser ones that might ally with it. Expansionists use se­lective accommodation to prevent or break up blocking coalitions, isolating opposing states by inducing potential balancers to buck-pass, bandwagon, or hide. Two cases—Great Britain’s defensive attempts to accommodate Italy in the late 1930s and Germany’s offensive efforts to accommodate the Soviet Union in 1939—help to demonstrate these arguments. By paying attention to these dynamics, international relations scholars can better understand how balancing works in specific cases, how it manifests more broadly in interna­tional politics, and why it sometimes fails in situations where it ought to work well.