Featured Articles


Featured Article: Covert Action and Unintended Consequences



Featured Article: Covert Action and Unintended Consequences
Featured article: Covert Action and Unintended Consequences by John G. Breen In the middle of the CIA’s 1954 covert overthrow of the democratically-elected government of Guatemala, with waning rebel force momentum and facing calls to increase support to the insurgents with unmarked surplus WWII bombers, President Eisenhower turned to his… Read More

Featured Article: …Synchronization of Civil Information Management



Featured Article: …Synchronization of Civil Information Management
Featured article: A Call for Synchronization of Civil Information Management by Michael L. Jones Special operation forces (SOF) and interagency partners face unique challenges when conducting civil information management (CIM) within the joint interagency, intergovernmental, and multinational (JIIM) environments. Information management requires a streamlined technologic system that reduces redundant technological… Read More

Featured Article: Interagency Leadership



Featured Article: Interagency Leadership
Featured article: Interagency Leadership by Duane M. Blackburn After they have proven themselves within their own organizations and find themselves working on a priority topic, federal employees will likely lead an interagency team. Unfortunately, the behaviors and mindset that have made them and their team members successful within their agency… Read More

Featured Article: A Clear Deterrence Strategy Required for Cyber



Featured Article: A Clear Deterrence Strategy Required for Cyber
Featured article: A Clear Deterrence Strategy Required for Cyber by Terrence S. Allen With the press of a button, a nation goes to war. Much of that nation’s livelihood will be destroyed with this button press. In the U.S. there is always an operator ready to hit their button, ensuring… Read More

Featured Article: Fostering Interagency Collaboration…



Featured Article: Fostering Interagency Collaboration…
Featured article: Fostering Interagency Collaboration for Upstream Counterproliferation by Matthew D. Rautio The proliferation of emerging and disruptive technologies, such as additive manufacturing and gene editing, is changing the way we think about national security. Such trends in science and technology inevitably increase the likelihood of hostile nations or non-state… Read More

Featured Article: Critical Infrastructure Protection



Featured Article: Critical Infrastructure Protection
Featured article: Critical Infrastructure Protection by Patricia Ladnier Both the Department of Homeland Security (DHS) and the Department of Defense (DoD) work to secure and defend the U.S., including protecting and securing key resources and critical infrastructure (referred to collectively as critical infrastructure). The Constitution and federal statutory law establish… Read More

Featured Article: Understanding Nations…



Featured Article: Understanding Nations…
Featured article: Understanding Nations: New Ideas to Analyze Foreign States by Tom Pike, Nick Long and Perry Alexander How humans understand the world drives the actions they take. This truth has literally changed the course of history. Galileo put the sun in the center of the solar system and altered… Read More