International Security Publications

Weapons Are Not the Answer to Ukraine’s Military Woes

Oct 09, 2014
Ukraine’s military, recently defeated in its Anti-Terrorist Operation against separatists in the east, must address massive materiel, training, and leadership deficiencies. Having suffered years of budgetary and administrative neglect, its armed forces and defense industrial complex cannot hope to fight Russia in their current state. U.S. security assistance to Ukraine should focus in the short term on supplies to sustain its troops over the winter and in the medium term on support for comprehensive military reform, but providing American weapons would engender a proxy war with Russia without really improving Ukraine’s combat capability. more

The Breach: Ukraine's Territorial Integrity and the Budapest Memorandum

Sep 30, 2014
Mariana Budjeryn investigates the security assurances made by the United States and Russia to Ukraine after the fall of the Soviet Union. These assurances, inscribed in the so-called “Budapest Memorandum” were designed to encourage Ukraine to ratify START I—otherwise known as the Lisbon Protocol—and return their entire nuclear arsenal to Russia for dismantling. more

Track-Two Diplomacy toward an Israeli-Palestinian Solution, 1978–2014 by Yair Hirschfeld

Track-Two Diplomacy toward an Israeli-Palestinian Solution, 1978–2014

Feb 12, 2014
Track-Two Diplomacy toward an Israeli-Palestinian Solution, 1978–2014 is an important insider account of a crucial set of negotiations aimed at settling a seemingly endless conflict. more

The Sino-Russian Challenge to the World Order: National Identities, Bilateral Relations, and East versus West in the 2010s by Gilbert Rozman

The Sino-Russian Challenge to the World Order: National Identities, Bilateral Relations, and East versus West in the 2010s

Jan 28, 2014
The Sino-Russian Challenge to the World Order argues that China and Russia’s national identities are much closer to each other than usually thought, and are growing even closer. The closeness of their identities comes neither from their prerevolutionary pasts nor from today’s practical politics, but rather from habits carried over from their communist periods. more

Jihadist Violence: The Indian Threat

Dec 30, 2013
A new study by Prof. Stephen Tankel on militancy in India. Prof. Tankel's main focus is a loosely organized indigenous Islamist militant network known as the Indian Mujahideen. more

In Search of Arctic Energy

Dec 10, 2013
A report by the Eurasia Group for the Wilson Center's Canada Institute. As climate change renders the Arctic increasingly accessible, there has been a substantial uptick in industry interest in the region; it is believed an estimated $100 billion could be invested in the Arctic over the next decade.The Arctic contains vast oil and natural gas reserves - the U.S. Geological Survey estimates the Arctic could contain 1,670 trillion cubic feet (tcf) of natural gas and 90 billion barrels of oil, or 30 percent of the world’s undiscovered gas and 13 percent of oil. Energy companies are certain to be at the forefront of Arctic development and investment. more

Harvesting Peace: Food Security, Conflict, and Cooperation

Sep 10, 2013
This report explores the complex linkages between conflict and food security, drawing insights from scholarly work to help inform more effective programming for practitioners. Food insecurity both results from and contributes to repeated rounds of armed conflict in many places. Conflict can reduce the amount of food available, disrupt people’s access to food, limits families’ access to food preparation facilities and health care, and increase uncertainty about satisfying future needs for food and nutrition. Likewise, food insecurity may help to sustain conflict or reverse post-conflict recovery efforts. more

Connecting Grassroots to Government for Disaster Management: Workshop Summary

Sep 06, 2013
The growing use of social media and other mass collaboration technologies is opening up new opportunities in disaster management efforts, but is also creating new challenges for policymakers looking to incorporate these tools into existing frameworks. The Commons Lab, part of the Science & Technology Innovation Program, hosted a September 2012 workshop bringing together emergency responders, crisis mappers, researchers, and software programmers to discuss issues surrounding the adoption of these new technologies. This report discusses the key findings, policy suggestions, and success stories that emerged during the workshop. more

Backdraft: The Conflict Potential of Climate Change Adaptation and Mitigation

May 14, 2013
Amid the growing number of reports warning that climate change threatens security, one potentially dangerous – but counterintuitive – dimension has been largely ignored. Could efforts to reduce our carbon footprint and lower our vulnerability to climate change inadvertently exacerbate existing conflicts? more

Towards Trustworthy Social Media and Crowdsourcing

Apr 29, 2013
Individuals and organizations using social media and crowdsourcing need two key sets of information: a systematic assessment of the vulnerabilities in these technologies and a comprehensive set of best practices describing how to address these vulnerabilities. This report identifies certain vulnerabilities and provides a guideline to develop best practices necessary to address a growing number of incidents ranging from innocent mistakes to targeted attacks that have claimed lives and cost millions of dollars. more

Pages

Dialogue

The Future of Higher Education

Mar 26, 2014Apr 02, 2014

Jeff Abernathy and Richard Morrill discuss how colleges and universities are dealing with rapidly rising costs and how the United States can still compete for students in a globalized environment.