Featured Articles


Featured Article: Digital Age Superiority



Featured Article: Digital Age Superiority
Featured article: Digital Age Superiority …or the Digital Dark Age Collapse by William B. Scott Cyber may be one of the most consequential national security challenges in a generation, and it will not grow easier with time. Our adversaries now believe that the reward for attacking the United States in… Read More

Featured Article: Sovereignty-in-Being



Featured Article: Sovereignty-in-Being
Featured article: “Sovereignty-in-Being”: A Dangerous New Model for Territorial Expansion in the 21st Century by Russell Handy, Michael J. Forsyth and Joseph Kunkel The basis by which nation-states “declare” sovereignty is being challenged in ways our current generation has not experienced. Non-state entities have historically ignored the concept of borders… Read More

Featured Article: The Business of War



Featured Article: The Business of War
Featured article: The Business of War: Private Military and Security Companies in Armed Conflict by Kenneth A. Segelhorst In war-torn countries around the world, thousands of rough men stand ready to do violence on behalf of those unable or unwilling. They are equipped with the most advanced military technology available:… Read More

Featured Article: The Pursuit of Justice



Featured Article: The Pursuit of Justice
Featured article: The Pursuit of Justice: Assistance Needed to Tackle the International Criminal Court’s Prevention Component by Jason Elbert Don’t be a bystander, don’t let it happen again.” Henry Greenbaum, a Polish survivor of the Auschwitz Concentration Camp, gave these parting words of prevention to a small group of students… Read More

Featured Article: An Ambassador’s Perspective



Featured Article: An Ambassador’s Perspective
Featured article: Interagency Cooperation: An Ambassador’s Perspective by Thomas J. Miller In 2011, it is difficult to think of any event or issue that is any longer confined to the domain, authority, and purview of a single agency in the U.S. government. This is a far cry from the State… Read More

Featured Article: Attacking the Nexus of Emerging Threats



Featured Article: Attacking the Nexus of Emerging Threats
Featured article: Pacific Command: Attacking the Nexus of Emerging Threats by Jan Schwarzenberg With conflicts winding down in Southwest Asia and the accompanying retraction of U.S. forces overseas, the U.S. may once again direct its attention globally. While troops engaged in open combat in Iraq and Afghanistan, commitments elsewhere in… Read More

Featured Article: Security Operations for Transformational Diplomats



Featured Article: Security Operations for Transformational Diplomats
Featured article: After Benghazi: Security Operations for Transformational Diplomats by Marques A. Bruce The State Department’s Bureau of Diplomatic Security has evolved significantly since it was established following the 1983 bombing of the U.S. Embassy in Lebanon. Likewise, the establishment of the High Threat Programs Directorate (HTP) following the September… Read More

Featured Article: There is No Silver Bullet and Other Lessons from Colombia



Featured Article: There is No Silver Bullet and Other Lessons from Colombia
Featured article: There is No Silver Bullet and Other Lessons from Colombia by Stuart Lippe Colombia has always had large, ungovernable areas where the authority of the central government was often tenuous or non-existent. Colombians seemed to prefer to focus on their home regions, leaving the vast hinterlands to fend… Read More

Featured Article: Improving Interagency Coordination in Africa



Featured Article: Improving Interagency Coordination in Africa
Featured article: Improving Interagency Coordination in Africa by Robert Bennett United States Army Africa (USARAF) executes over 400 activities annually valued at $2 million. These activities augment activities sponsored by other U.S. government, private charitable foundations, churches, and regional African organizations. The stated goals for these activities are complementary, but… Read More