Articles

155 Items

The Ohio-class ballistic missile submarine USS Pennsylvania transits the Hood Canal in Washington.

U.S. Navy photo by Mass Communication Specialist 1st Class Amanda R. Gray

Journal Article - Quarterly Journal: International Security

Escalation through Entanglement: How the Vulnerability of Command-and-Control Systems Raises the Risks of an Inadvertent Nuclear War

    Author:
  • James Acton
| Summer 2018

The risks of nuclear escalation are greater than ever given the possibility of misinterpreted cyber espionage and military strikes against early warning systems. 

Journal Article - International Journal of Military History and Historiography

Review of The Army and Democracy: Military Politics in Pakistan by Aqil Shah

| 2017

"This book serves as an invaluable resource for scholars, analysts and policymakers seeking to understand the precise nature of military influence in Pakistan's political development, and evaluate its prospects for deepening democratisation. The volume traces the origins, perpetuation, and consequences of military dominance in the evolution of Pakistan's national politics and institutions."

teaser image

Journal Article - Georgetown Journal of International Affairs

Campaign Planning with Cyber Operations

| Dec. 28, 2017

The military not only plans for operations, it also plans to plan. Yet there is no current plan or process in place to integrate cyber initiatives into campaign planning. The US government must determine how to integrate offensive and defensive cybercapabilities into campaign planning in order to leverage these capabilities and pair them with the military’s broad array of tools.

Japan Maritime Self-Defense Force escort ship Kurama, Sagami Bay, south of Tokyo, Japan, October 18, 2015.

AP Photo/Shizuo Kambayashi

Journal Article - International Security

The Emerging Military Balance in East Asia: How China’s Neighbors Can Check Chinese Naval Expansion

| Fall 2017

China’s maritime neighbors can prevent China from dominating East Asia militarily, allowing the United States to avoid the costs and risks of expanding its forces in the region. These states have developed antiaccess/area-denial capabilities that can deny China command of its near seas. The United States should support these capabilities while taking steps to enhance crisis stability.

teaser image

Journal Article - Journal of Cybersecurity

Rules of Engagement for Cyberspace Operations: A View From the USA

| March 2017

As cyber weapons are incorporated into US military planning, policy makers and field commanders will increasingly confront a core issue: How to formulate the rules of engagement (ROEs) for US forces with regard to military operations that may use such weapons. Michael Sulmeyer, Herbert Lin, and C. Robert Kehler address ROEs from the perspective of US military operators. 

A Royal Air Force Reaper RPAS (Remotely Piloted Air System) at Kandahar Airfield in Afghanistan.

Sergeant Ross Tilly (RAF)

Journal Article - Quarterly Journal: International Security

Separating Fact from Fiction in the Debate over Drone Proliferation

Claims that drones will soon remake warfare or international politics are unwarranted. Although almost a dozen states now possess armed drones, and more are racing to acquire them, they will not play a decisive role in interstate conflicts. Drones will rarely be “winning weapons,” because they are vulnerable to air defenses. States will, however, continue to use drones against terrorists and domestic opponents.