Articles

52 Items

Magazine Article - Harvard Gazette

Britain muses: play bridge or solitaire?

    Author:
  • Christina Pazzanese
| June 17, 2016

On Thursday, voters in the U.K. will decide by a simple majority whether to remain in the E.U. during a national referendum known as “Brexit” (a portmanteau of the words British and exit). Over the last month, public opinion polling showed voters evenly split, with the “leave” campaign edging upslightly in recent days. Douglas Alexander is a senior fellow in The Future of Diplomacy Project.The Gazette spoke with Alexander about the upcoming referendum and the potential fallout for the U.K. and Europe.

Sub-Saharan migrants climb over a metallic fence that divides Morocco and the Spanish enclave of Melilla on Friday, March 28, 2014.

Santi Palacios/ AP

Journal Article - Quarterly Journal: International Security

Barriers to Entry: Who Builds Fortified Boundaries and Why

    Authors:
  • Ron E. Hassner
  • Jason Wittenberg
| Summer 2015

Contrary to conventional wisdom, states do not typically construct fortified boundaries in response to border disputes or to prevent terrorism. Instead, most build such boundaries for economic reasons, to keep out unwanted migrants from poorer states. Further, Muslim states are more likely to both build and be the targets of fortified boundaries.

US and Ukrainian soldiers stand guard during opening ceremony of the 'Fiarles Guardian - 2015', Ukrainian-US Peacekeeping and Security command and staff training, in western Ukraine, in Lviv region, Monday, April 20, 2015.

(AP Photo/Efrem Lukatsky)

Magazine Article - The National Interest

Russia and America: Stumbling to War

| May-June 2015

In the United States and Europe, many believe that the best way to prevent Russia’s resumption of its historic imperial mission is to assure the independence of Ukraine. They insist that the West must do whatever is required to stop the Kremlin from establishing direct or indirect control over that country. Otherwise, they foresee Russia reassembling the former Soviet empire and threatening all of Europe. Conversely, in Russia, many claim that while Russia is willing to recognize Ukraine’s sovereignty and territorial integrity (with the exception of Crimea), Moscow will demand no less than any other great power would on its border. Security on its western frontier requires a special relationship with Ukraine and a degree of deference expected in major powers’ spheres of influence. More specifically, Russia’s establishment sentiment holds that the country can never be secure if Ukraine joins NATO or becomes a part of a hostile Euro-Atlantic community. From their perspective, this makes Ukraine’s nonadversarial status a nonnegotiable demand for any Russia powerful enough to defend its national-security interests.

Gas centrifuges for uranium enrichment recovered en route to Libya in 2003.

U.S. Department of Energy

Journal Article - Quarterly Journal: International Security

The Nonproliferation Emperor Has No Clothes: The Gas Centrifuge, Supply-Side Controls, and the Future of Nuclear Proliferation

| Spring 2014

Policymakers have long focused on preventing nuclear weapons proliferation by controlling technology. Even developing countries, however, may now possess the technical ability to create nuclear weapons. The history of gas centrifuge development in twenty countries supports this perspective. To reduce the demand for nuclear weapons, policymakers will have look toward the cultural, normative, and political organization of the world.

U.S. Sailors assigned to Navy Cyber Defense Operations Command (NCDOC) man their stations at Joint Expeditionary Base Little Creek-Fort Story, Va., Aug. 4, 2010.

U.S. Navy Photo

Journal Article - Quarterly Journal: International Security

The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth

    Author:
  • Erik Gartzke
| Fall 2013

Cyberwar has been described as a revolution in military affairs capable of overturning the prevailing world order. By itself, however, cyberwar can achieve neither conquest nor, in most cases, coercion. Conflict over the internet is much more likely to serve as an adjunct to, rather than a substitute for, existing modes of terrestrial force, and to augment the advantages of status quo powers rather than threatening existing political hierarchies.

March 8, 2012: Norwich University student Adam Marenna, of Belair, Md.  Deep in the bowels of a building on the campus of the nation's oldest private military academy, students from across the globe are being taught to fight the war of the future.

AP Photo/Toby Talbot

Journal Article - Quarterly Journal: International Security

The Meaning of the Cyber Revolution: Perils to Theory and Statecraft

| Fall 2013

While decisionmakers warn about the cyber threat constantly, there is little systematic analysis of the issue from an international security studies perspective. Cyberweapons are expanding the range of possible harm between the concepts of war and peace, and give rise to enormous defense complications and dangers to strategic stability. It is detrimental to the intellectual progress and policy relevance of the security studies field to continue to avoid the cyber revolution's central questions.

June 5, 2008: Gotthard Lerch, right, watches the judges entering the courtroom in Stuttgart, Germany. He admitted to helping procure centrifuge parts for Libya, was convicted in 2008 on minor charges, and sentenced to time served in pretrial detention.

AP Photo

Magazine Article - TIME / time.com

Nuclear Proliferation: The Crime with No Punishment?

| September 16, 2011

"Nuclear proliferation is a crime that pays well. Those involved in the Khan network were made very wealthy for their efforts, and the inability of the international community to effectively punish them has resulted in a missed opportunity to provide a deterrent against future black-market salesmen."

(R-L) Soviet Commissar for Foreign Affairs Vyacheslav Molotov, General Secretary of the Communist Party Josef Stalin, & German Reich Foreign Minister Joachim von Ribbentrop signing the German-Soviet non-aggression pact in Moscow, Aug 23, 1939.

AP Photo

Journal Article - Quarterly Journal: International Security

Preventing Enemy Coalitions: How Wedge Strategies Shape Power Politics

| Spring 2011

States use wedge strategies to prevent hostile alliances from forming or to dis­perse those that have formed. These strategies can cause power alignments that are otherwise unlikely to occur, and thus have significant consequences for international politics. How do such strategies work and what conditions promote their success? The wedge strategies that are likely to have significant effects use selective accommodation—concessions, compensations, and other inducements—to detach and neutralize potential adversaries. These kinds of strategies play important roles in the statecraft of both defensive and offensive powers. Defenders use selective accommodation to balance against a primary threat by neutralizing lesser ones that might ally with it. Expansionists use se­lective accommodation to prevent or break up blocking coalitions, isolating opposing states by inducing potential balancers to buck-pass, bandwagon, or hide. Two cases—Great Britain’s defensive attempts to accommodate Italy in the late 1930s and Germany’s offensive efforts to accommodate the Soviet Union in 1939—help to demonstrate these arguments. By paying attention to these dynamics, international relations scholars can better understand how balancing works in specific cases, how it manifests more broadly in interna­tional politics, and why it sometimes fails in situations where it ought to work well.