International Security & Defense

952 Items

In this Aug. 20, 2017 file photo, U.S. Army soldiers stands next to a guided-missile launcher, a few miles from the frontline, in the village of Abu Ghaddur, east of Tal Afar, Iraq. American troops have started to draw down from Iraq following Baghdad’s declaration of victory over the Islamic State group last year, according to western contractors at a U.S.-led coalition base in Iraq.

AP Photo/Balint Szlanko

Analysis & Opinions - Lawfare

Why Security Assistance Often Fails

    Author:
  • Rachel Tecott Metz
| Apr. 23, 2023

Around the world, the United States relies heavily on security assistance to gain influence and make its allies more formidable. When actual war breaks out, however, many long-time recipients of such assistance fight poorly or otherwise do not seem to have heeded the lessons that U.S. trainers tried to impart. The Naval War College’s Rachel Tecott Metz examines this track record, arguing that the United States relies too much on teaching and persuasion and should instead emphasize conditionality more. 

Report - Intelligence Project

Report: Marking the CIA’s 75th Anniversary: Reflections on the Past, Visions of the Future

Since its creation in 1947, the Central Intelligence Agency (CIA) has been at the heart of supporting United States foreign policy and national security decision-making. From the early days of the Cold War to Russia’s war against Ukraine, the CIA has been a critical instrument of foreign intelligence collection, analysis, and operations. However, the CIA is often misunderstood, as its own work and history, particularly its successes, are rarely seen by the public. To help unpack this storied history, and in honor of the agency’s 75th anniversary, on September 16, 2022, former directors, officers, scholars, students, and the public gathered to discuss the past, present, and future of the agency. 

A security guard stands near a sculpture of the Chinese Communist Party flag at the Museum of the Communist Party of China on May 26, 2022, in Beijing.

AP Photo/Ng Han Guan

Journal Article - Quarterly Journal: International Security

Strategic Substitution: China’s Search for Coercive Leverage in the Information Age

    Author:
  • Fiona Cunningham
| Summer 2022

After the mistaken U.S. bombing of the Chinese Embassy in Belgrade in 1999, China turned to information-age weapons to create a risk of escalation to nuclear war with the United States. This shift helps compensate for its conventional military inferiority.

Meeting of the President of Ukraine with the President of the European Commission and the High Representative of the EU for Foreign Affairs and Security Policy on April 8, 2022

Wikimedia Commons/ President of Ukraine Volodymyr Zelenskyy Official website

Magazine Article - Arms Control Today

Negative Security Assurances After Russia’s Invasion of Ukraine

| July 07, 2022

On February 24, the international community took a catastrophic blow. Already battered by two years of the COVID-19 pandemic and deteriorating interstate relations, it stood in horror as Russian forces unleashed an unprovoked war on a neighboring country. Russia’s decision to invade Ukraine and reject Ukraine’s very existence as a separate state is ominous and highly momentous for the future of the world order.

Hijacked airliner headed toward World Trade Towers on September 11, 2001

REUTERS/Sean Adair

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

Countering Terrorism With "Blue Sky" Thinking

| May 19, 2022

In the past, strategic surprise has often stemmed from a failure of imagination. Most intelligence failures are rooted in a lack of foresight or early warning of impending events. Blue sky thinking seeks to prevent these surprises by devoting more attention not just to known risks and likely scenarios, but also to low probability, high impact events. In an unprecedented step in forging ongoing global collaboration, 129 global experts gathered in Amman, Jordan, in December 2021. The conference was held under the auspices of Jordan’s Aqaba Process and facilitated by representatives from the Harvard Kennedy School Belfer Center’s Intelligence Project. Attendees included intelligence officers, diplomats, military officers, private sector practitioners, and academics representing 29 countries, 5 continents, and 68 government and private sector organizations. Through presentations and discussion under Chatham House Rules, the conference facilitated an open exchange of ideas on the possible next big threats from terrorism and on strategies for moving forward.

North Korean leader Kim Jong Un, second from right, inspects the preparation of the launch of a Hwasong-14 ICBM in North Korea on July 4, 2017.

AP Photo

Journal Article - Quarterly Journal: International Security

Defending the United States: Revisiting National Missile Defense against North Korea

| Winter 2021/22

The costly Ground-based Midcourse Defense system remains unproven and unreliable in deterring North Korea’s threat to use intercontinental ballistic missiles. An airborne boost-phase intercept system may offer an alternative defense against North Korea without threatening Russian or Chinese deterrents.

A boy plays with his toy soldiers inside a school that is being used as a shelter for people who fled the war, in Dnipro city, Ukraine, on Tuesday, April 12, 2022.

AP Photo/Petros Giannakouris

Analysis & Opinions - Offensive Cyber Working Group

Subversion over Offense: Why the Practice of Cyber Conflict Looks Nothing Like Its Theory and What This Means for Strategy and Scholarship

    Author:
  • Lennart Maschmeyer
| Jan. 19, 2022

Cyber attacks are both exciting and terrifying, but the ongoing obsession with ‘cyber warfare’ clouds analysis and hampers strategy development. Much commentary and analysis of cyber conflict continues to use the language of war, where actors use ‘offensive cyber operations’ to meet adversaries in ‘engagements’ striving for victory on the ‘battlefield’ in the ‘cyber domain’. This discourse persists despite a growing consensus that cyber operations are primarily relevant in conflict short of war.

A member of the Afghan security forces walks in the sprawling Bagram air base after the American military departed, in Parwan province north of Kabul, Afghanistan, Monday, July 5, 2021.

AP Photo/Rahmat Gul

Paper

Easier to Get into War Than to Get Out: The Case of Afghanistan

| August 2021

The U.S. should accept with humility its inability to fully eliminate terrorism. Specifically, U.S. policy must balance “ends, ways, and means;” establish clear and achievable objectives; adopt efficient, effective, and resource-sustainable strategies; ensure synchronization of diplomatic and military efforts; build alliances to share the burden of countering terrorism; and leverage cooperative mechanisms and regional partnerships to increase the capacity and willingness of regional states to defend their sovereignty and contribute to multinational coalitions against terrorism.  A balanced, integrated, and synchronized strategy encompassing defense, diplomacy, economic, and humanitarian assistance lines of effort should be cornerstone of a revamped foreign policy in the coming decades.

NATO’s new headquarters in Brussels, Belgium, January 14, 2018.

NATO Photo

Policy Brief - Project on Europe and the Transatlantic Relationship and the German Council on Foreign Relations

Transatlantic Action Plan: Security and Defense

| February 2021

Within NATO, and in U.S.–EU and NATO–EU relations, considerable effort will have to go into: rebuilding trust; strengthening democratic governance and shared values; aligning threat perceptions; breaking down barriers to collaboration; maximizing defense value for money; and tackling new and emerging challenges collectively. No problem can be solved successfully by the U.S. alone, by NATO alone, or just in the U.S.–EU context. The most effective approaches will combine the institutional strengths of both NATO and the EU and all 36 of their respective member states.

Policy Brief

An Intelligence Agenda for a New Administration

December 2020

America’s Intelligence Community (IC) faces a daunting array of traditional national security challenges. Terrorism remains a persistent global problem in form of Islamic extremism as well as far-right nationalism. Russia, China and other nation state threats have become a higher priority after a long period of neglect. Regional conflicts simmer and occasionally boil over, reminding us that our agencies must provide global coverage. And we are now engaged in perpetual cyber conflict, with ambient digital espionage and conflict raging across global networks.