02
Trump’s Missile Defense: Challenges for Europe
The Trump administration’s missile defense plans would undermine key NATO policies. A better approach would be to combine missile defense efforts with arms control initiatives.
Why China Has Not Caught Up Yet: Military-Technological Superiority and the Limits of Imitation, Reverse Engineering, and Cyber Espionage

This new journal article by Andrea Gilli and Mauro Gilli argues that an increase in the complexity of military technology has made the imitation and replication of state-of-the-art weapon systems harder—so much so as to offset the diffusing effects of globalization and advances in communications. As a result, China will not easily imitate the United States' advanced weapon systems and thus erode its military-technological superiority.
From Madness to Wisdom: Intelligence and the Digital Crowd

This new journal article by Mark Daniel Jäger and Myriam Dunn Cavelty sheds light on the complexity and sensitivity of crowd-based intelligence in security governance. While the 'crowd’, as a special manifestation of ‘the public’, presents new challenges it also enables new forms of intelligence practices. The article traces how crowds in their various forms relate to how security agents approach them in their intelligence practices.
More Continuity than Change in the Congo

Understanding the latest election results in the Democratic Republic of the Congo (DRC) requires an unprejudiced analysis of the political system. Political power in the DRC is negotiated through complex networks that mix formal and informal notions of statehood. Actors’ relations to each other can quickly shift between symbiosis and conflict, which fosters violence, corruption and underdevelopmen
Diffusion of Technology: Myths and Realities

According to a growing consensus, globalization and advances in communication are promoting the diffusion of defense-industrial capabilities, thus eroding the established position of Western countries. The empirical evidence, however, suggests that even with newly available opportunities, including cyber espionage, the most advanced weapon systems remain very difficult to copy and replicate