Featured Articles


Featured Article: Interagency Approaches to Prevent the Reoccurrence of Conflict in Sierra Leone



Featured Article: Interagency Approaches to Prevent the Reoccurrence of Conflict in Sierra Leone
Featured article: Interagency Approaches to Prevent the Reoccurrence of Conflict in Sierra Leone by Phillip J. Schenks, Mary C. Avriette and Jonathan M. Holliday Countries which experience one civil war are more likely to experience another. Recurrent civil wars impair economic investment and divert government funds from governance to security.… Read More

Featured Article: Blockchain Information-Sharing and Radical Inclusion



Featured Article: Blockchain Information-Sharing and Radical Inclusion
Featured article: Lifting the Interagency Fog of Information: Blockchain Information-Sharing and Radical Inclusion by James Torrence The fog of information can drive out knowledge. –Daniel J. Boorstin In “Radical Inclusion,” General Martin Dempsey and Ori Brafman offer current and aspiring leaders extraordinary insights into getting the best possible information for… Read More

Featured Article: Lessons for Cyber Policymakers



Featured Article: Lessons for Cyber Policymakers
Featured article: Lessons for Cyber Policymakers by James Torrence Critical infrastructure keeps our food fresh, our houses warm, our trade flowing, and our citizens productive and safe. The vulnerability of U.S. critical infrastructure to cyber, physical, and electromagnetic attacks means that adversaries could disrupt military command and control, banking and… Read More

Featured Article: Employing Maritime Security Response Teams…



Featured Article: Employing Maritime Security Response Teams…
Featured article: Employing Maritime Security Response Teams as the Nation’s Maritime Crisis Response Force by Christjan C. Gaudio The U.S. Coast Guard is recognized worldwide for our ability to perform diverse maritime missions over vast geographic areas. Our value to the Nation resides in our enduring commitment to protect those… Read More

Featured Article: Japan’s Security Strategy…



Featured Article: Japan’s Security Strategy…
Featured article: Japan’s Security Strategy and Its Impact on U.S. National Security Interests by Sung K. Hyong and David A. Anderson Japan’s broadening security strategy reveals the unease with which it views the evolving security order in the Indo-Pacific. Several grave threats to regional stability continue to define the region’s… Read More

Featured Article: Strategic Turning Points and the CIA/DoD Relationship



Featured Article: Strategic Turning Points and the CIA/DoD Relationship
Featured article: Adapting to Change: Strategic Turning Points and the CIA/DoD Relationship by David Oakley In January 2012, the Department of Defense (DoD) published “Sustaining U.S. Global Leadership: Priorities for the 21st Century,” outlining U.S. national security priorities for the coming decade. Although the document maintains counterterrorism as a strategic… Read More

Featured Article: Cyberdefense



Featured Article: Cyberdefense
Featured article: Cyberdefense: Is Outsourcing the Answer? by Kellen Ashford Speaking at an event for the American Enterprise Institute in 2012, retired General Keith Alexander, the former head of U.S. Cyber Command and Director of the National Security Agency, suggested that “cyber crime is the greatest transfer of wealth in… Read More

Featured Article: Civil-Military Balance in Complex Operations



Featured Article: Civil-Military Balance in Complex Operations
Featured article: Civil-Military Balance in Complex Operations  by Kurt E. Müller Interventions in the affairs of a one state by another may be benign, belligerent, political or military. In addition, these interventions may supplement host-nation authority in delivering assistance. Regardless of character and purpose, there is a long-standing preference for … Read More