Security and Intelligence Studies

Treason, Terrorism, and Betrayal: Why Individuals Cross the Line
William Costanza

Aldrich James, Timothy McVeigh. Kim Philby. Julius and Ethel Rosenberg. Edward Snowden. These are just a few of the people well known for willfully jeopardizing US national security. What    More >

Counterintelligence at Its Core: Assessing and Preventing Foreign Espionage
Kevin P. Riehle

What is the core purpose of counterintelligence? What does it involve? To answer these questions, Kevin Riehle explains in detail how counterintelligence analysis supports the mission of    More >

Female Militants in South Asia: Fighters and Facilitators
Ayesha Ray

Though often portrayed as lacking agency, women in South Asia, in considerable numbers, participate actively in the insurgencies that plague the region—taking up arms alongside men or    More >

The Vietnam People’s Army: From People’s Warfare to Military Modernization?
Zachary Abuza

Can the Vietnamese military, which decades ago defeated the French, the Americans, and the Chinese, move away from its tradition of "people's war" to adapt to both the    More >

AI and Early Warning Systems: Technology Innovation for National Security
Robert Mandel

From the September 11 attacks to the coronavirus pandemic, recent deficiencies in early warning systems have been jolting, reflecting startling failures of intelligence and security    More >

China’s Strategy in the Gulf: Navigating Conflicts and Rivalries
Benjamin Houghton

China's foreign and security policy in the Gulf region has been characterized by the cultivation of strong positive relationships with all of the Gulf states, irrespective of their    More >

Lessons Learned from the War in Ukraine: Security Strategies for the Nordic-Baltic Five
Otto Tabuns and Olevs Nikers

In the context of Russia's war against Ukraine, the authors present crucial strategies for improving security in five NATO eastern flank states: Estonia, Finland, Latvia, Lithuania, and    More >

Tech Cold War: The Geopolitics of Technology
Ansgar Baums and Nicholas Butts

TikTok, Huawei, semiconductors, AI … Technology has become a field of fierce geopolitical competition, especially between the United States and China. What drives this particular    More >

Ending the Nuclear Arms Race: A Physicist’s Quest
Frank N. von Hippel

Frank N. von Hippel shares his remarkable journey as a key figure in the history of nuclear weapons and nuclear energy, illuminating the far-reaching consequences of nuclear accidents and    More >

Pivotal Poland: Europe's Rising Power
Janusz Bugajski

Russia's full-scale invasion of Ukraine precipitated a tectonic shift in European security dynamics, ending a relatively peaceful post–Cold War phase and moving the epicenter of    More >

Ethical Espionage: Ethics and the Intelligence Cycle
Jan Goldman

Can spying ever be ethical? What role do ethics play in intelligence missions shrouded in secrecy? Can the end justify the means? Jan Goldman confronts these thorny questions as he charts    More >

From Nuclear Weapons to Global Security: 75 Years of Research and Development at Sandia National Laboratories
Justin Quinn Olmstead and Leland Johnson

Sandia National Laboratories is one of the primary providers of the science, technology, and engineering capabilities needed to ensure both US and global security. Its mandate has moved far    More >

Hedging the China Threat: US-Taiwan Security Relations Since 1949
Shao-cheng Sun

The United States has never formally recognized Taiwan as a sovereign state, yet it has provided the country with security assistance since the establishment of the Republic of China (ROC)    More >

Warfare  in the Robotics Age
Ash Rossiter and Peter Layton

From artificial intelligence and autonomous vehicles to human augmentation … robots are increasingly being used by the military. For what operational purposes? How will this reshape    More >

Arms Control at a Crossroads: Renewal or Demise?
Jeffrey A. Larsen and Shane Smith, editors

Is there a role for traditional arms control in today’s increasingly complex security environment? What new concepts and mechanisms are needed to make it valuable as a tool for    More >

Page 1 to 91 2 3 ... 9 | >>