Common measurements of the likelihood of success of military or national security endeavors tend to be quantitative factors such as budget size, number of personnel, level of technological advancement, or functionality of equipment. However, sociological facto... More »
Existing policy research cites domestic and systemic factors as primary explanations for political underdevelopment, ignoring the potential impact of international relations and foreign interference. As a result, many foreign policy strategies fail to address ... More »
Clichés such as “good research reflects reality” notwithstanding, academics often find that they must sacrifice pragmatic concerns in favor of analytical convenience when conducting research. As a result, many studies attempt to mimic real-world situations usi... More »
Following the September 11 terrorist attacks, the US government passed the USA Patriot Act in October 2001, in what members of Congress and the Bush administration said was an effort to strengthen national security. However, opponents criticized the law for in... More »
Cloud computing enables convenient access to a networks, servers, storage, applications, and services. In a cloud computing framework, shared resources can be rapidly provided on demand from individuals and organizations with minimal management or service prov... More »
On February 16, 2016, Tim Cook, the CEO of Apple, issued a letter to customers in which he declared his opposition to a federal court order requiring the company to help the FBI “unlock” an iPhone used by one of the two gunmen in the San Bernardino, California... More »
Halldór Thorgeirsson, Director for Strategy at the UN Climate Change Secretariat, shares his insights into international political negotiations, the implications of the Paris climate agreement, and why it is so important to empower cities, private companies, a... More »
The review of 55 scientific articles shows that deviations from moderate climate and precipitation patterns systematically increase the risk of violence and conflict, both on an interpersonal level (assaults, murder, rape) and an intergroup level (political co... More »
Computer scientists investigate Unmanned Aerial Vehicle vulnerability to third-party hacking, showing that commercial drone use is likely to be heavily regulated. More »
Political strategist and former New York City Deputy Mayor Howard Wolfson discusses how terrorism, technology, and crime have impacted views on privacy and security. More »
In a recent strategy document, the U.S. Department of Defense explains how it will organize its capabilities to meet tomorrow’s uncertain security challenges, despite constrained resources. More »