Articles

32 Items

A security guard stands near a sculpture of the Chinese Communist Party flag at the Museum of the Communist Party of China on May 26, 2022, in Beijing.

AP Photo/Ng Han Guan

Journal Article - Quarterly Journal: International Security

Strategic Substitution: China’s Search for Coercive Leverage in the Information Age

    Author:
  • Fiona Cunningham
| Summer 2022

After the mistaken U.S. bombing of the Chinese Embassy in Belgrade in 1999, China turned to information-age weapons to create a risk of escalation to nuclear war with the United States. This shift helps compensate for its conventional military inferiority.

Journal Article - Small Wars Journal

Twilight Zone Conflicts: Employing Gray Tactics in Cyber Operations

| October 27, 2016

"...[A]ctors that employ gray tactics in cyber operations need not be successful in actually infiltrating a system to further their revisionist ambitions. Rather, the sheer ramifications from the cyber action itself, has the power to disturb a nation's psyche and challenge the geopolitical status quo."

Chinese President Xi Jinping is displayed on a big screen in Beijing as Chinese battle tanks roll by during a Sept. 3, 2015 parade commemorating the 70th anniversary of Japan's surrender during World War II.

(AP Photo)

Magazine Article - The Atlantic

The Thucydides Trap: Are the U.S. and China Headed for War?

| September 24, 2015

The defining question about global order for this generation is whether China and the United States can escape Thucydides’s Trap. The Greek historian’s metaphor reminds us of the attendant dangers when a rising power rivals a ruling power—as Athens challenged Sparta in ancient Greece, or as Germany did Britain a century ago. Most such contests have ended badly, often for both nations, a team of mine at the Harvard Belfer Center for Science and International Affairs has concluded after analyzing the historical record. In 12 of 16 cases over the past 500 years, the result was war. When the parties avoided war, it required huge, painful adjustments in attitudes and actions on the part not just of the challenger but also the challenged.

U.S. Secretary of Energy Ernest Moniz (left) and Secretary of State John Kerry (center) meeting in Vienna to discuss the Iran nuclear agreement.

Carlos Barria/Agence France-Presse

Newspaper Article - The New York Times

Crucial Questions Remain as Iran Nuclear Talks Approach Deadline

| June 28, 2015

Iran’s top nuclear negotiator was heading back to Tehran on Sunday to consult with his nation’s leadership, as negotiators remained divided over how to limit and monitor Tehran’s nuclear program and even on how to interpret the preliminary agreement they reached two months ago.

U.S. Sailors assigned to Navy Cyber Defense Operations Command (NCDOC) man their stations at Joint Expeditionary Base Little Creek-Fort Story, Va., Aug. 4, 2010.

U.S. Navy Photo

Journal Article - Quarterly Journal: International Security

The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth

    Author:
  • Erik Gartzke
| Fall 2013

Cyberwar has been described as a revolution in military affairs capable of overturning the prevailing world order. By itself, however, cyberwar can achieve neither conquest nor, in most cases, coercion. Conflict over the internet is much more likely to serve as an adjunct to, rather than a substitute for, existing modes of terrestrial force, and to augment the advantages of status quo powers rather than threatening existing political hierarchies.

March 8, 2012: Norwich University student Adam Marenna, of Belair, Md.  Deep in the bowels of a building on the campus of the nation's oldest private military academy, students from across the globe are being taught to fight the war of the future.

AP Photo/Toby Talbot

Journal Article - Quarterly Journal: International Security

The Meaning of the Cyber Revolution: Perils to Theory and Statecraft

| Fall 2013

While decisionmakers warn about the cyber threat constantly, there is little systematic analysis of the issue from an international security studies perspective. Cyberweapons are expanding the range of possible harm between the concepts of war and peace, and give rise to enormous defense complications and dangers to strategic stability. It is detrimental to the intellectual progress and policy relevance of the security studies field to continue to avoid the cyber revolution's central questions.

Magazine Article - Reuters Magazine

Running Al Qaeda

| June 2012

"Getting second-rung leadership right is important for any enterprise, and for al Qaeda that meant assuring the brand and building network capacity for terror. Bin Laden was careful about deciding who would be anointed with two powerful gifts—his blessing of leadership, and formal affiliation of groups to al Qaeda central (a term he heard used by the media and, amazingly, appropriated)."

Journal Article - INTELLIGENCER

Cyber Security: An Economic and National Security Crisis

| Fall 2008

"It is no longer sufficient for the U.S. government to discover cyber intrusions in its networks, clean up the damage, and take legal or political steps to deter further intrusions. The U.S. must take action to protect the critical components upon which our economy, government, and national security are based from potential exploitation, disruption or destruction."

Journal Article - Survival

Recovering American Leadership

| February-March 2008

"Leaders are those who help groups create and achieve shared goals. Traditionally, the leaders in international politics have been the most powerful states. However, while hard military power counts for more in the context of international politics than it does in democratic domestic politics, even in international relations conquest, or pure coercion, is not leadership, but mere dictation. Disproportionate power, sometimes called 'hegemony', has been associated with leadership, but appeals to values and ideology also matter, even for a hegemon...."