What are the consequences of drone proliferation for international security? Despite extensive discussions in the policy world concerning drone strikes for counterterrorism purposes, myths about the capabilities and implications of current-generation drones often outstrip reality. Understanding the impact of drones requires separating fact from fiction by examining their effects in six different contexts—counterterrorism, interstate conflict, crisis onset and deterrence, coercive diplomacy, domestic control and repression, and use by nonstate actors for the purposes of terrorism.
"Ungoverned spaces" are often cited as key threats to national and international security and are increasingly targeted by the international community for external interventions—both armed and otherwise. This book examines exactly when and how these spaces contribute to global insecurity, and it incorporates the many spaces where state authority is contested—from tribal, sectarian, or clan-based governance in such places as Pakistani Waziristan, to areas ruled by persistent insurgencies, such as Colombia, to nonphysical spaces, such as the internet and global finance.
Aspirational Power examines Brazil as an emerging power. It explains Brazil’s present emphasis on using soft power through a historical analysis of Brazil’s three past attempts to achieve major power status. Though these efforts have fallen short, this book suggests that Brazil will continue to try to emerge, but that it will only succeed when its domestic institutions provide a solid and attractive foundation for the deployment of its soft power abroad.
In American Crossings, nine scholars consider the complicated modern history of borders in the Western Hemisphere, examining borders as geopolitical boundaries, key locations for internal security, spaces for international trade, and areas where national and community identities are defined.
Attribution of malicious cyber activities is a deep issue about which confusion and disquiet can be found in abundance. Attribution has many aspects—technical, political, legal, policy, and so on. A number of well-researched and executed papers cover one or more of these aspects, but integration of these aspects is usually left as an exercise for the analyst. This paper distinguishes between attribution of malicious cyber activity to a machine, to a specific human being pressing the keys that initiate that activity, and to a party that is deemed ultimately responsible for that activity.
Stanford expert Siegfried Hecker proposes a series of nuclear weapons and energy questions that journalists and citizens should consider asking the 2016 presidential candidates.
This book discusses issues in large-scale systems in the United States and around the world. The authors examine the challenges of education, energy, healthcare, national security, and urban resilience. The book covers challenges in education including America's use of educational funds, standardized testing, and the use of classroom technology. On the topic of energy, this book examines debates on climate, the current and future developments of the nuclear power industry, the benefits and cost decline of natural gases, and the promise of renewable energy.
Doomed to Cooperate tells the remarkable story of nuclear scientists from two former enemy nations, Russia and the United States, who reached across political, geographic, and cultural divides to confront, together, the new nuclear threats that resulted from the collapse of the Soviet Union.
In 2013, China president Xi Jinping launched a massive reclamation and construction campaign on seven reefs in the Spratly Islands in the South China Sea. Beijing insisted that its actions were responsible and in accord with international law, but foreign critics questioned Xi’s real intentions. Recently available internal documents by China’s leader reveal his views about war, the importance of oceans in protecting and rejuvenating the nation, and the motives underlying his actions in the South China Sea.
The United States’ strategic reorientation toward the Asia Pacific began not under the Barack Obama administration, but under the George W. Bush administration. As part of this reorientation, the Bush administration pursued a series of military, political, and economic policies aimed at engaging with and balancing against China, not containing it.
In the next decade and a half, China and India will become two of the world’s indispensable powers—whether they rise peacefully or not. During that time, Asia will surpass the combined strength of North America and Europe in economic might, population size, and military spending.
This is a 2016 French translation of Being Nuclear: Africans and the Global Uranium Trade (2012), translated by Charlotte Nordmann and part of the series "L'Univers Historique."
This book—the culmination of a truly collaborative international and highly interdisciplinary effort—brings together Japanese and American political scientists, nuclear engineers, historians, and physicists to examine the Fukushima accident from a new and broad perspective.
Every day, security engineers cope with a flow of cyber security incidents. While most incidents trigger routine reactions, others require orders of magnitude more effort to investigate and resolve. How security operation teams in organizations should tune their response to tame extreme events remains unclear. Analyzing the statistical properties of sixty thousand security events collected over six years at a large organization, we find that the distribution of costs induced by security incidents is in general highly skewed, following a power law tail distribution.
Despite significant interest in cybersecurity, data on cyber security incidents remains scarce. On April 16, 2015, the US Department of Energy released data on 1,131 cybersecurity incidents through a Freedom of Information Act Request. While only containing the date, location, and type of incident, several interesting insights can be kneaded from the data. In this paper, we analyze the DOE security incident data and perform a statistical analysis on the rate of incidents.
The Semipalatinsk Nuclear Test Site in Kazakhstan was conceived as an experimental landscape where science, technology, Soviet Cold War militarism, and human biology intersected. As of 2015, thousands of people continue to live in rural communities in the immediate vicinity of this polluted landscape. Lacking good economic options, many of them claim to be “mutants” adapted to radiation, while outsiders see them as genetically tainted. In such a setting, how do post-Soviet social, political, and economic transformations operate with radioactivity to co-constitute a “mutant” subjectivity?
Conditional cash transfer (CCT) programs are an increasingly popular tool for reducing poverty in conflict affected areas. Despite their growing popularity, there is limited evidence on how CCT programs affect conflictand theoretical predictions are ambiguous. We estimate the effect of conditional cash transfers on civil conflict in the Philippines by exploiting an experiment that randomly assigned eligibility for a CCT program at the village level.
My Journey at the Nuclear Brink is a continuation of William J. Perry's efforts to keep the world safe from a nuclear catastrophe. It tells the story of his coming of age in the nuclear era, his role in trying to shape and contain it, and how his thinking has changed about the threat these weapons pose.
The Soviet Union responded sceptically to Eisenhower’s ‘Atoms for Peace’ speech in December 1953 but eventually entered negotiations on the creation of the International Atomic Energy Agency. It believed the IAEA would provide opportunities for political influence and scientific collaboration. It did not want the peaceful uses of atomic energy around the world to be dominated by the United States. It pressed for close ties between the new agency and the United Nations and supported India and other developing countries in their opposition to safeguards.