Popular articles

PIR Center consultant Oleg Demidov describes the role of the Verisign corporation in the DNS root zone management, comments on the process U.S. Department of Trade’s withdrawal from direct contractual relationship with the technical management of the root zone, and looks at the potential impact of c...

Origins of the notion

It should be underlined that the concept of “strategic stability” was born in the late 1980s in the context of START-I negotiations to serve as a foundation of deep strategic arms reductions. In this role, it was designed to replace an amorphous and subjective notion of “equal...

In the aftermath of the Second Session of the Preparatory Committee for the 2020 Review Conference of the Parties to the Treaty on the Non-Proliferation of Nuclear Weapons (NPT), its Chair Ambassador Adam Bugajski of the Republic of Poland gave an exclusive interview to the Yaderny Kontrol bulletin ...

All articles

Poll



 

Presentation on the international seminar "Disruptive Technologies, Strategic Vulnerability, and the Future of Detterence": Clandestine Capabilities and Deterrence in World Politics

Brendan Green, Austin Long
  • What are clandestine capabilities?
  • What are the challenges of clandestine capabilities for deterrence?
  • What strategies can states adopt regarding clandestine capabilities?
  • A preliminary case study: U.S. strategic anti-submarine warfare

Presentation on the international seminar "Disruptive Technologies, Strategic Vulnerability, and the Future of Detterence": Clandestine Capabilities and Deterrence in World Politics (full text) 


Imprint:

Comments

 
 
loading