Articles

25 Items

A protester holds up a placard outside the U.S. Consulate in Hong Kong, Wednesday, June 26, 2019.

AP Photo/Kin Cheung

Journal Article - Quarterly Journal: International Security

Nowhere to Hide? Global Policing and the Politics of Extradition

    Author:
  • Daniel Krcmaric
| Fall 2022

U.S. power extends beyond the military and economic spheres to include policing. The United States has used its global policing power to capture terrorists, warlords, and drug kingpins. But extradition is not simply a bureaucratic tool. States’ geopolitical interests shape their willingness to cooperate with others in extraditing fugitives. 

A set of NanoRacks CubeSats is photographed by an Expedition 38 crew member after the deployment by the Small Satellite Orbital Deployer (SSOD).

NASA

Journal Article - Quarterly Journal: International Security

Small Satellites, Big Data: Uncovering the Invisible in Maritime Security

    Authors:
  • Saadia Pekkanen
  • Setsuko Aoki
  • John Mittleman
| Fall 2022

The world’s oceans have always provided ships with room to hide. New technology is changing that. Small satellites now collect terabytes of global data daily. Computational analytics can mine that data as humans cannot. Increasingly, this information expands the ability to identify and track ships and their activities, including those affecting national and international security. 

Soldiers conducting a Mobile Training Team deployment in Liberia.

U.S. Army

Journal Article - Quarterly Journal: International Security

Soldiers' Dilemma: Foreign Military Training and Liberal Norm Conflict

| Spring 2022

When the U.S. military trains other states’ forces, it tries to impart liberal norms such as respect for human rights. But when liberal norms clash, these soldiers prioritize loyalty to their unit, the military, and shared goals.

FORT GORDON NELSON HALL, Augusta, Georgia, June 10, 2014 – The U.S. Army’s ‘Cyber Center of Excellence’, Fort Gordon in Augusta, Georgia, hosted a multi-service ‘NetWar’ to show, and build, cyber Warrior capabilities Tuesday, June 10.

Georgia Army National Guard photo by Staff Sgt. Tracy J. Smith

Journal Article - Quarterly Journal: International Security

The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations

    Author:
  • Lennart Maschmeyer
| Fall 2021

Although cyber conflict has existed for thirty years, the strategic utility of cyber operations remains unclear. The subversive trilemma explains why cyber operations tend to fall short of their promise in both warfare and low-intensity competition.

Ugandan police and other security forces chase people off the streets to avoid unrest after all public transport was banned for two weeks to halt the spread of the new coronavirus.

AP Photo/Ronald Kabuubi

Journal Article - Quarterly Journal: International Security

Opportunistic Repression: Civilian Targeting by the State in Response to COVID-19

    Authors:
  • Donald Grasse
  • Melissa Pavlik
  • Hilary Matfess
  • Travis B. Curtice
| Fall 2021

Opportunistic repression arises when states use crises to suppress the political opposition. An examination of the relationship between COVID-19 shutdown policies and state violence against civilians in Africa, including and a subnational case study of Uganda, tests this theory.

Black Americans register to vote in the July 4 Georgia Democratic Primary in Atlanta, Ga., on May 3, 1944. Registrations are increasing in Atlanta as black schools are giving instructions to students in ballot casting procedure.

AP Photo

Journal Article - Quarterly Journal: International Security

White Supremacy, Terrorism, and the Failure of Reconstruction in the United States

| Summer 2021

White Southerners opposed to Reconstruction used violence to undermine Black political power and force uncommitted white Southerners to their side. Although structural factors made it harder for the U.S. government to suppress this violence, a series of policy failures prompted Reconstruction’s failure and generations of injustice.

A worker is silhouetted against a computer display showing a live visualization of the online phishing and fraudulent phone calls across China during the 4th China Internet Security Conference in Beijing. Aug. 16, 2016 (Ng Han Guan/Associated Press, File). Keywords: China, cyberattack

Ng Han Guan/Associated Press, File

Newspaper Article - The Wall Street Journal

Review: An Uneasy Unpeace

| Jan. 21, 2018

In the cyber arena, the same technologies that are creating unprecedented benefits for billions are also democratizing destruction. Graham Allison reviews ‘The Virtual Weapon and International Order’ by Lucas Kello.

What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment

AP

Journal Article - Quarterly Journal: International Security

What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment

    Author:
  • Rebecca Slayton
| Winter 2016/17

Does cyberspace favor the offense, as many analysts and policymakers claim? Three factors undermine any cyber offensive advantage, as demonstrated in a cost-benefit analysis of the Stuxnet operation against Iran. First, any measurement of the offense-defense balance must consider a cyber operation’s value as well as its cost to both sides. Second, organizational capabilities play a significant role in determining the balance. Third, offensive advantages decline when attackers target physical infrastructure rather than information networks.

Anti-EULEX (European Union Rule of Law Initiative) Graffiti - Mitrovica (Serb Side) - Kosovo, October 26, 2013

Adam Jones, Ph.D. Photo

Journal Article - Nationalities Papers

Towards the Rule of Law in Kosovo: EULEX Should Go

| 2014

Following Kosovo's declaration of independence in February 2008, the European Union deployed a rule of law mission in Kosovo (EULEX). While EULEX and its supporters have argued that the mission has the potential to succeed, critics claim that the mission has failed to significantly improve Kosovo's rule of law institutions, to address the rule of law vacuum in the north of Kosovo, and to prosecute high-level organized crime and corruption.