Articles

229 Items

teaser image

Newspaper Article - Harvard Gazette

Russia’s Remaining Weapons Are Horrific and Confounding

| Mar. 23, 2022

Along with concerns over the possible deployment of tactical nuclear weapons, the Biden administration is now warning that the Russian military may launch a chemical weapons attack in Ukraine. Russia has used chemical weapons during past conflicts, notably in Chechnya and Syria, in violation of international law. Russian officials denied Biden’s accusation during a U.N. Security Council meeting Tuesday.

OPCW Pays Tribute to All Victims of Chemical Warfare at Day of Remembrance

Wikimedia CC/OPCW

Journal Article - Journal of Conflict Resolution

The Two Faces of Opposition to Chemical Weapons: Sincere Versus Insincere Norm-Holders

| 2021

The authors' findings advance a specific debate on the strength of weapons taboos, while their conceptualization of insincere norm-holders and methodological application have broader implications for how scholars might think about and measure norms in international politics.

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

Ambassador Nicholas Burns

Ekathimerini

Newspaper Article - Ekathimerini

Turkey Must Stop its Aggressiveness towards Greece, Says Burns

| Dec. 03, 2020

Turkish President Recep Tayyip Erdogan has gone too far with his challenging of Greece's sovereignty and territorial waters, former US Ambassador to Greece Nicholas Burns told the online 31st annual Greek Economic Summit of the American-Hellenic Chamber of Commerce on Wednesday.

Granddaughter of President Dwight Eisenhower Mary Jean Eisenhower (front row 4th from L), the great-grandson of President Eisenhower Merrill Eisenhower Atwater (5th) and Japan's Prime Minister Shinzo Abe (5th) and others pose for photo ahead of the reception to mark 60th anniversary of Japan-U.S. Security Treaty at Iikura Guest House in Tokyo on Jan. 19, 2020. (The Yomiuri Shimbun)

AP Photo/Pool for Yomiuri

Journal Article - Quarterly Journal: International Security

Network Connections and the Emergence of the Hub-and-Spokes Alliance System in East Asia

    Author:
  • Yasuhiro Izumikawa
| Fall 2020

A social exchange network approach reveals how three U.S. allies—Japan, South Korea, and Taiwan—contributed to the emergence and shape of the hub-and-spokes alliance system in East Asia. This finding enables scholars and policymakers to devise appropriate policy responses as the system changes.

In this photo provided by the Department of Defense, President Franklin D. Roosevelt sits in a jeep at Yalta with British Prime Minister Winston Churchill and V.M. Molotov, Feb. 1945.

AP Photo/Department of Defense

Journal Article - Quarterly Journal: International Security

Partnership or Predation? How Rising States Contend with Declining Great Powers

| Summer 2020

When and why do rising states prey upon or support declining powers? A state’s choice of policy toward a declining power depends on two factors: whether that power is useful against challengers to the rising state, and the declining state’s military strength.

teaser image

Magazine Article

Inside China's controversial mission to reinvent the internet

| Mar. 27, 2020

On a cool day late last September, half a dozen Chinese engineers walked into a conference room in the heart of Geneva's UN district with a radical idea. They had one hour to persuade delegates from more than 40 countries of their vision: an alternative form of the internet, to replace the technological architecture that has underpinned the web for half a century. 

Whereas today's internet is owned by everyone and no one, they were in the process of building something very different - a new infrastructure that could put power back in the hands of nation states, instead of individuals.

A magnified image of the Cornoavirus

U.S. Department of State

Newspaper Article - Le Monde

« La Crise du Coronavirus Ébranle Aussi L’idée de Démocratie et de Liberté »

| Mar. 26, 2020

The COVID-19 pandemic has shaken our economic and political institutions. Less detectably, the crisis also rattles our ideals of democracy and individual freedom. Public health imperatives have collided with democratic principles as fundamental as the freedom to come and go. We have every reason to believe that the exigencies of the moment will also come into conflict with privacy.

Chernobyl welcome sign

Wikimedia CC/Jorge Franganillo

Journal Article - Futures

Accumulating Evidence Using Crowdsourcing and Machine Learning: A Living Bibliography about Existential Risk and Global Catastrophic Risk

    Authors:
  • Gorm E. Shackelford
  • Luke Kemp
  • Catherine Rhodes
  • Lalitha Sundaram
  • Seán S. ÓhÉigeartaigh
  • Simon Beard
  • Haydn Belfield
  • Shahar Avin
  • Dag Sørebø
  • Elliot M. Jones
  • John B. Hume
  • David Price
  • David Pyle
  • Daniel Hurt
  • Theodore Stone
  • Harry Watkins
  • Lydia Collas
  • Bryony C. Cade
  • Thomas Frederick Johnson
  • Zachary Freitas-Groff
  • David Denkenberger
  • Michael Levot
  • William J. Sutherland
| February 2020

The study of existential risk — the risk of human extinction or the collapse of human civilization — has only recently emerged as an integrated field of research, and yet an overwhelming volume of relevant research has already been published. To provide an evidence base for policy and risk analysis, this research should be systematically reviewed. In a systematic review, one of many time-consuming tasks is to read the titles and abstracts of research publications, to see if they meet the inclusion criteria. The authors show how this task can be shared between multiple people (using crowdsourcing) and partially automated (using machine learning), as methods of handling an overwhelming volume of research.