Articles

150 Items

A set of NanoRacks CubeSats is photographed by an Expedition 38 crew member after the deployment by the Small Satellite Orbital Deployer (SSOD).

NASA

Journal Article - Quarterly Journal: International Security

Small Satellites, Big Data: Uncovering the Invisible in Maritime Security

    Authors:
  • Saadia Pekkanen
  • Setsuko Aoki
  • John Mittleman
| Fall 2022

The world’s oceans have always provided ships with room to hide. New technology is changing that. Small satellites now collect terabytes of global data daily. Computational analytics can mine that data as humans cannot. Increasingly, this information expands the ability to identify and track ships and their activities, including those affecting national and international security. 

Tel Aviv Coastline seen from Jaffa

Wikimedia Commons/ Kallerna

Journal Article - Elsevier Inc.

The ecological tradeoffs of desalination in land-constrained countries seeking to mitigate climate change

| Feb. 18, 2022

The global demand for desalinated water is increasing at a remarkable rate. In a future with increasing demand for water and low-carbon electricity, an interesting ecological dilemma emerges. In a decarbonized world, providing desalinated water for domestic use and aquatic ecological restoration could increasingly come at the expense of open space lost to renewables such as solar photovoltaics (PV) and wind turbines. In this article we examine the environmental tradeoffs of providing freshwater from desalination under a solar photovoltaic-based decarbonization strategy, using Israel as an example.

teaser image

Journal Article

Lines, Flows and Transnational Crime: Toward a Revised Approach to Countering the Underworld of Globalization

| Dec. 16, 2019

In this article, we develop a new framework for combating transnational criminal activity. We argue that global illicit flows, perpetrated by organized crime, in the interstices of lawful trade and travel, embody a critical and debilitating non-state security threat in today’s world, one that the Westphalian international system of sovereign states remains ill-equipped to confront. Accordingly, we seek to generate a wider discussion in the field regarding a revised approach to this threat that is situated within a global framework of collaborative law enforcement which incorporates, in appropriate fashion, certain military and counter-terrorist strategies.

The propositions we advance in support of a revised approach to countering transnational crime and its globalized web-enabled criminals include: (a) terrorism is one species of transnational crime; (b) the criminal justice model of arrest, prosecution, conviction and incarceration is a partial and insufficient response to transnational crime; (c) national security and law enforcement functions should be viewed analytically as a “public security” continuum rather than disciplines separated by bright lines; (d) countering transnational criminal organizations effectively may require development of a hybrid law enforcement/military capacity and new strategic and tactical doctrines, including safeguards against abuse, to govern its deployment; (e) joint border management within nations and between them, coordinated with the private sector, is required and inter-agency cooperation and multilateral institutions must be strengthened in accordance with new international norms and (f) North America, a region construed as extending from Colombia to the Arctic and from Bermuda to Hawaii, could develop in the future, together with the European Union, as an initial site for a model pilot of the new approach.

FBI agents leaving a raid.

AP Photo/Julio Cortez

Journal Article - Contemporary Security Policy

Going it Alone: The Causes and Consequences of U.S. Extraterritorial Counterproliferation Enforcement

| Mar. 25, 2019

In 2004, the United Nations Security Council adopted resolution 1540, which acknowledged the non-state acquisition of weapons of mass destruction as a security threat and called on member states to implement “appropriate effective” domestic trade controls. The United States, however, has both promoted the multilateral implementation of strategic trade controls but has also increasingly resorted to extraterritorial enforcement of its counterproliferation rules. How can a multilateral, norms-based international regime like 1540 contend with extraterritorial enforcement based on national interests? We argue that increased U.S. extraterritorial counterproliferation policies are a consequence of the inconsistent implementation of resolution 1540, adaptive and resilient proliferation networks, and a history of expanding legal interpretations of jurisdiction. We find that while U.S. extraterritorial enforcement can effectively disrupt networks hiding in overseas jurisdictions, doing so creates disincentives for states to implement 1540 obligations and undermines broader nonproliferation objectives.

petri dishes

AP/Federica Narancio

Journal Article - European Review

Human Heredity Now and in the Future

| February 2019

The distinctive human characteristic of curiosity, once liberated from belief in supernatural causes of natural phenomena, has led with increasing speed to the brink of a world in which humanity will increasingly direct its own genetic endowment, raising the question of what we most value in being human and how to keep faith with it.

a new barrier is built along the Texas-Mexico border near downtown El Paso

AP/Eric Gay

Newspaper Article - The Huffington Post

Border Security Expert Tells 'Mansplaining' Rep. Dan Crenshaw Why A Wall Won't Work

    Author:
  • David Moye
| Feb. 05, 2019

Juliette Kayyem suggested that freshman Texas GOP Representative Dan Crenshaw support his argument on border security with facts — "not with mocking a woman."  This article covers the Twitter exchange.

Chinese stealth fighter in the air

(China Military Online)

Journal Article - Quarterly Journal: International Security

Why China Has Not Caught Up Yet: Military-Technological Superiority, Systems Integration, and the Challenges of Imitation, Reverse Engineering, and Cyber-Espionage

| Winter 2018/19

The extraordinary complexity of today’s advanced weapons systems has significantly reduced the ability of states to imitate other states’ military technology. Consequently, U.S. rivals such as China will continue to struggle to develop indigenous capabilities that can match those of the United States.

Photo of Mark Zuckerberg preparing to resume testimony about user data on Facebook.

(AP Photo/Jacquelyn Martin)

Magazine Article - Belfer Center for Science and International Affairs, Harvard Kennedy School

America Needs to Align Technology with a Public Purpose

| Nov. 25, 2018

The arc of innovative progress has reached an inflection point, writes Ash Carter in The Atlantic. "Recent technological change that has brought immeasurable improvements to billions around the globe now threatens to overwhelm us. Making this disruption positive for all is the chief challenge of our time. We ourselves—not only market forces—should bend the arc of change toward human good. To do so, we must reinvigorate an ethos of public purpose that has become dangerously decoupled from many of today’s leading tech endeavors."

People at Seoul Train Station watch a a local news program reporting about a North Korean missile launch. Aug. 30, 2017 (Lee Jin-man/Associated Press).

Lee Jin-man/Associated Press

Journal Article - The RUSI Journal

North Korea’s Missile Programme and Supply-Side Controls: Lessons for Countering Illicit Procurement

| Oct. 17, 2018

Despite one of the most extensive sanctions regimes in history, including an embargo on missile technologies, North Korea has taken huge steps forward in its ballistic missile programme. Daniel Salisbury explores the limitations of, and challenges of implementing, supply-side approaches to missile nonproliferation. Considering North Korea’s recent progress and efforts to evade sanctions, the article highlights the continuing need to strengthen efforts to counter illicit trade in missile-related technologies.