Articles

124 Items

North Korean leader Kim Jong Un, second from right, inspects the preparation of the launch of a Hwasong-14 ICBM in North Korea on July 4, 2017.

AP Photo

Journal Article - Quarterly Journal: International Security

Defending the United States: Revisiting National Missile Defense against North Korea

| Winter 2021/22

The costly Ground-based Midcourse Defense system remains unproven and unreliable in deterring North Korea’s threat to use intercontinental ballistic missiles. An airborne boost-phase intercept system may offer an alternative defense against North Korea without threatening Russian or Chinese deterrents.

FORT GORDON NELSON HALL, Augusta, Georgia, June 10, 2014 – The U.S. Army’s ‘Cyber Center of Excellence’, Fort Gordon in Augusta, Georgia, hosted a multi-service ‘NetWar’ to show, and build, cyber Warrior capabilities Tuesday, June 10.

Georgia Army National Guard photo by Staff Sgt. Tracy J. Smith

Journal Article - Quarterly Journal: International Security

The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations

    Author:
  • Lennart Maschmeyer
| Fall 2021

Although cyber conflict has existed for thirty years, the strategic utility of cyber operations remains unclear. The subversive trilemma explains why cyber operations tend to fall short of their promise in both warfare and low-intensity competition.

Workers shovel waste from a wheat farm into a prototype for a biomass machine

AP/Andy Wong

Journal Article - Proceedings of the National Academy of Sciences of the United States of America

Gasification of Coal and Biomass: A Net Carbon-Negative Power Source for Environment-Friendly Electricity Generation in China

    Authors:
  • Xi Lu
  • Liang Cao
  • Haikun Wang
  • Jia Xing
  • Shuxiao Wang
  • Siyi Cai
  • Bo Shen
  • Qing Yang
  • Chris P. Nielsen
  • Michael B. McElroy
| 2019

Deploying coal-bioenergy gasification systems with carbon capture and storage (CBECCS) provides a promising opportunity for China to realize its carbon mitigation and air pollution abatement goals simultaneously. The authors conducted a comprehensive assessment of CBECCS technology for China, with a focus on plant and fuel configurations (e.g., biomass ratios) and economics, as well as CO2 and greenhouse gas emissions and cobenefits for air quality.

rendering of Carbon Engineering’s air capture design

Courtesy of Carbon Engineering

Journal Article - Joule

A Process for Capturing CO2 from the Atmosphere

    Authors:
  • Geoffrey Holmes
  • David St. Angelo
  • Kenton Heidel
| 2018

The authors describe a process for capturing CO2 from the atmosphere in an industrial plant. The design captures ∼1 Mt-CO2/year in a continuous process using an aqueous KOH sorbent coupled to a calcium caustic recovery loop. They describe the design rationale, summarize performance of the major unit operations, and provide a capital cost breakdown developed with an independent consulting engineering firm. They report results from a pilot plant that provides data on performance of the major unit operations.

A worker is silhouetted against a computer display showing a live visualization of the online phishing and fraudulent phone calls across China during the 4th China Internet Security Conference in Beijing. Aug. 16, 2016 (Ng Han Guan/Associated Press, File). Keywords: China, cyberattack

Ng Han Guan/Associated Press, File

Newspaper Article - The Wall Street Journal

Review: An Uneasy Unpeace

| Jan. 21, 2018

In the cyber arena, the same technologies that are creating unprecedented benefits for billions are also democratizing destruction. Graham Allison reviews ‘The Virtual Weapon and International Order’ by Lucas Kello.

What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment

AP

Journal Article - Quarterly Journal: International Security

What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment

    Author:
  • Rebecca Slayton
| Winter 2016/17

Does cyberspace favor the offense, as many analysts and policymakers claim? Three factors undermine any cyber offensive advantage, as demonstrated in a cost-benefit analysis of the Stuxnet operation against Iran. First, any measurement of the offense-defense balance must consider a cyber operation’s value as well as its cost to both sides. Second, organizational capabilities play a significant role in determining the balance. Third, offensive advantages decline when attackers target physical infrastructure rather than information networks.

Magazine Article - Harvard Gazette

Britain muses: play bridge or solitaire?

    Author:
  • Christina Pazzanese
| June 17, 2016

On Thursday, voters in the U.K. will decide by a simple majority whether to remain in the E.U. during a national referendum known as “Brexit” (a portmanteau of the words British and exit). Over the last month, public opinion polling showed voters evenly split, with the “leave” campaign edging upslightly in recent days. Douglas Alexander is a senior fellow in The Future of Diplomacy Project.The Gazette spoke with Alexander about the upcoming referendum and the potential fallout for the U.K. and Europe.