Articles

92 Items

North Korean leader Kim Jong Un, second from right, inspects the preparation of the launch of a Hwasong-14 ICBM in North Korea on July 4, 2017.

AP Photo

Journal Article - Quarterly Journal: International Security

Defending the United States: Revisiting National Missile Defense against North Korea

| Winter 2021/22

The costly Ground-based Midcourse Defense system remains unproven and unreliable in deterring North Korea’s threat to use intercontinental ballistic missiles. An airborne boost-phase intercept system may offer an alternative defense against North Korea without threatening Russian or Chinese deterrents.

FORT GORDON NELSON HALL, Augusta, Georgia, June 10, 2014 – The U.S. Army’s ‘Cyber Center of Excellence’, Fort Gordon in Augusta, Georgia, hosted a multi-service ‘NetWar’ to show, and build, cyber Warrior capabilities Tuesday, June 10.

Georgia Army National Guard photo by Staff Sgt. Tracy J. Smith

Journal Article - Quarterly Journal: International Security

The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations

    Author:
  • Lennart Maschmeyer
| Fall 2021

Although cyber conflict has existed for thirty years, the strategic utility of cyber operations remains unclear. The subversive trilemma explains why cyber operations tend to fall short of their promise in both warfare and low-intensity competition.

A worker is silhouetted against a computer display showing a live visualization of the online phishing and fraudulent phone calls across China during the 4th China Internet Security Conference in Beijing. Aug. 16, 2016 (Ng Han Guan/Associated Press, File). Keywords: China, cyberattack

Ng Han Guan/Associated Press, File

Newspaper Article - The Wall Street Journal

Review: An Uneasy Unpeace

| Jan. 21, 2018

In the cyber arena, the same technologies that are creating unprecedented benefits for billions are also democratizing destruction. Graham Allison reviews ‘The Virtual Weapon and International Order’ by Lucas Kello.

What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment

AP

Journal Article - Quarterly Journal: International Security

What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment

    Author:
  • Rebecca Slayton
| Winter 2016/17

Does cyberspace favor the offense, as many analysts and policymakers claim? Three factors undermine any cyber offensive advantage, as demonstrated in a cost-benefit analysis of the Stuxnet operation against Iran. First, any measurement of the offense-defense balance must consider a cyber operation’s value as well as its cost to both sides. Second, organizational capabilities play a significant role in determining the balance. Third, offensive advantages decline when attackers target physical infrastructure rather than information networks.

Magazine Article - Harvard Gazette

Britain muses: play bridge or solitaire?

    Author:
  • Christina Pazzanese
| June 17, 2016

On Thursday, voters in the U.K. will decide by a simple majority whether to remain in the E.U. during a national referendum known as “Brexit” (a portmanteau of the words British and exit). Over the last month, public opinion polling showed voters evenly split, with the “leave” campaign edging upslightly in recent days. Douglas Alexander is a senior fellow in The Future of Diplomacy Project.The Gazette spoke with Alexander about the upcoming referendum and the potential fallout for the U.K. and Europe.

Sub-Saharan migrants climb over a metallic fence that divides Morocco and the Spanish enclave of Melilla on Friday, March 28, 2014.

Santi Palacios/ AP

Journal Article - Quarterly Journal: International Security

Barriers to Entry: Who Builds Fortified Boundaries and Why

    Authors:
  • Ron E. Hassner
  • Jason Wittenberg
| Summer 2015

Contrary to conventional wisdom, states do not typically construct fortified boundaries in response to border disputes or to prevent terrorism. Instead, most build such boundaries for economic reasons, to keep out unwanted migrants from poorer states. Further, Muslim states are more likely to both build and be the targets of fortified boundaries.

US and Ukrainian soldiers stand guard during opening ceremony of the 'Fiarles Guardian - 2015', Ukrainian-US Peacekeeping and Security command and staff training, in western Ukraine, in Lviv region, Monday, April 20, 2015.

(AP Photo/Efrem Lukatsky)

Magazine Article - The National Interest

Russia and America: Stumbling to War

| May-June 2015

In the United States and Europe, many believe that the best way to prevent Russia’s resumption of its historic imperial mission is to assure the independence of Ukraine. They insist that the West must do whatever is required to stop the Kremlin from establishing direct or indirect control over that country. Otherwise, they foresee Russia reassembling the former Soviet empire and threatening all of Europe. Conversely, in Russia, many claim that while Russia is willing to recognize Ukraine’s sovereignty and territorial integrity (with the exception of Crimea), Moscow will demand no less than any other great power would on its border. Security on its western frontier requires a special relationship with Ukraine and a degree of deference expected in major powers’ spheres of influence. More specifically, Russia’s establishment sentiment holds that the country can never be secure if Ukraine joins NATO or becomes a part of a hostile Euro-Atlantic community. From their perspective, this makes Ukraine’s nonadversarial status a nonnegotiable demand for any Russia powerful enough to defend its national-security interests.