Articles

119 Items

Close-up of two hands placed on the laptop keyboards with reflection on the screen.

AP Photo/Damian Dovarganes, File

Journal Article - Journal of International Relations and Sustainable Development

The New Frontier of Democratic Self-Defense

| Winter 2022

The United States nor its allies alone cannot counter adversarial and criminal cyber activity in the digital domain-–the reach, scale, stealth, and danger are simply too great for any one country to bear. As such, calls for international operational collaboration in cybersecurity and emerging technologies are increasing. Former U.S. State Department Cyber Diplomat Chris Painter noted in a December 2020 Foreign Policy article that there must be more leadership and partnership on global cyber cooperation. What follows represents a thinking-through of what this ought to entail.

A security guard stands near a sculpture of the Chinese Communist Party flag at the Museum of the Communist Party of China on May 26, 2022, in Beijing.

AP Photo/Ng Han Guan

Journal Article - Quarterly Journal: International Security

Strategic Substitution: China’s Search for Coercive Leverage in the Information Age

    Author:
  • Fiona Cunningham
| Summer 2022

After the mistaken U.S. bombing of the Chinese Embassy in Belgrade in 1999, China turned to information-age weapons to create a risk of escalation to nuclear war with the United States. This shift helps compensate for its conventional military inferiority.

Mads Brügger Receives Lux Film Prize in 2019

Wikimedia Commons/ European Parliament

Journal Article - Nonproliferation Review

Of Moles and Missiles: Anatomy of a North Korean Arms Deal?

| Apr. 08, 2022

In October 2020, a parade celebrating the 75th anniversary of the founding of the Korean Workers Party showcased a range of new weapons systems, including a new large intercontinental ballistic missile. The same weekend saw the release of a fascinating documentary film directed by provocative Danish filmmaker Mads Brügger, entitled The Mole: Undercover in North Korea. The film consists of footage—much of it filmed undercover—that was shot over a period of 10 years. It tells the story of a retired Danish chef’s infiltration of the Korean Friendship Association (KFA), an international organization that seeks to promote the ideology, history, and culture of the Democratic People’s Republic of Korea (DPRK) and defend the country from its critics. The story culminates in the exploration of plans for a series of sanctions-busting deals: constructing an underground arms factory on a Ugandan island, shipping oil to North Korea, and supplying arms to unspecified customers of Pyongyang through a private arms dealer. This review essay seeks to contextualize the film’s contents, consider the insights it offers into North Korea’s arms dealing, and examine a number of questions that arise.

U.S. Military Academy cadets watch data on computers

AP Photo

Journal Article - Quarterly Journal: International Security

Prediction and Judgment: Why Artificial Intelligence Increases the Importance of Humans in War

    Authors:
  • Avi Goldfarb
  • Jon R. Lindsay
| Winter 2021/22

Rather than rapid robotic wars and decisive shifts in military power, AI-enabled conflict will likely involve significant uncertainty, organizational friction, and chronic controversy. Greater military reliance on AI will therefore make the human element in war even more important, not less.

North Korean leader Kim Jong Un, second from right, inspects the preparation of the launch of a Hwasong-14 ICBM in North Korea on July 4, 2017.

AP Photo

Journal Article - Quarterly Journal: International Security

Defending the United States: Revisiting National Missile Defense against North Korea

| Winter 2021/22

The costly Ground-based Midcourse Defense system remains unproven and unreliable in deterring North Korea’s threat to use intercontinental ballistic missiles. An airborne boost-phase intercept system may offer an alternative defense against North Korea without threatening Russian or Chinese deterrents.

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

FORT GORDON NELSON HALL, Augusta, Georgia, June 10, 2014 – The U.S. Army’s ‘Cyber Center of Excellence’, Fort Gordon in Augusta, Georgia, hosted a multi-service ‘NetWar’ to show, and build, cyber Warrior capabilities Tuesday, June 10.

Georgia Army National Guard photo by Staff Sgt. Tracy J. Smith

Journal Article - Quarterly Journal: International Security

The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations

    Author:
  • Lennart Maschmeyer
| Fall 2021

Although cyber conflict has existed for thirty years, the strategic utility of cyber operations remains unclear. The subversive trilemma explains why cyber operations tend to fall short of their promise in both warfare and low-intensity competition.