Journal Articles

The Use and Limits of U.S. Intelligence (PDF)

November 01, 2002

After spending nearly $30 billion annually on intelligence gathering efforts, why did the intelligence community (IC) fail to predict the September 11 terrorist attacks? How could they have prevented the attacks? How can the United States improve its ability to ensure that an event like this will not happen again?

Create a House Select Committee on Homeland Security and Terrorism (PDF)

February 01, 2002

As smoke rose in to the sky over New York, Pennsylvania, and Virginia on 11 September 2001, members of Congress pledged to work together and support the President’s strategy to counter the terrorists’ attack. Today, Congress has succeeded in making homeland security a national priority, but it has failed to effectively coordinate its actions.

Cyber-Attack: The National Protection Plan and Its Privacy Implications (PDF)

November 01, 2000

The information technology revolution has given us an unrivaled, perhaps unsurpassable, lead over the rest of the world in virtually every facet of modern life. Unfortunately there is a “dark side” to this revolution.

Cyber Threats: Ten Issues to Consider (PDF)

September 01, 2000

While few adversaries would attempt to confront the United States in a conventional war on the traditional battlefield, its adversaries recognize that terrorism and other asymmetric forms of conflict, such as cyber attacks, are more effective methods of striking the United States where it is most vulnerable.

And the Winner is...The Albanian Mafia (PDF)

September 01, 1999

With the signing of peace treaties and the deployment of NATO peacekeeping forces in Kosovo, the time has come to crown a victor. While NATO may have achieved its objectives in the “war”—forcing Serbia to agree to remove its troops, allowing the Kosovars back into their homes, and establishing a peacekeeping force—the real winner is the Albanian mafia.

Responding to New Terrorist Threats (PDF)

July 01, 1998

The face of terrorism is changing and so are its methods. A new breed of terrorists is seeking out and using weapons of greater lethality that can affect scores of victims over large areas. For conspirators hoping, or at least willing, to inflict mass casualties, nuclear, chemical, and biological weapons are the tools of choice in their arsenal.

Information Warfare and Strategic Terrorism (PDF)

February 01, 1997

A dedicated adversary can procure and employ capabilities that present a grave threat to U.S. national security, specifically: a synergistic attack that capitalizes on IW strategies to multiply the effects of traditional terrorist tactics.

Between War and Peace: Deterrence and Leverage (PDF)

January 01, 1997

Today's threat dynamics center around decidedly irrational actors--particularly rogue states and hostile non-state groups, who for reasons of ethnic, nationalist, tribal, economic, or religious hatred bear enmity toward the U.S. These patterns of hatred result in novel forms of conflict.

Meet Our Staff

Read about our Staff and other pieces they’ve authored.

Meet Our Senior Fellows

Read about our Senior Fellows and other pieces they’ve authored.