Popular articles

PIR Center consultant Oleg Demidov describes the role of the Verisign corporation in the DNS root zone management, comments on the process U.S. Department of Trade’s withdrawal from direct contractual relationship with the technical management of the root zone, and looks at the potential impact of c...

Origins of the notion

It should be underlined that the concept of “strategic stability” was born in the late 1980s in the context of START-I negotiations to serve as a foundation of deep strategic arms reductions. In this role, it was designed to replace an amorphous and subjective notion of “equal...

 

On July 16, 2018, President Putin and President Trump finally held their first summit in Helsinki. The summit did not yield specific agreements in arms control domain, which means the current problems will have to be addressed by next U.S.-Russia summit. Now there are only two major arms control ...

All articles

Poll



 

Presentation on the international seminar "Disruptive Technologies, Strategic Vulnerability, and the Future of Detterence": Clandestine Capabilities and Deterrence in World Politics

Brendan Green, Austin Long
  • What are clandestine capabilities?
  • What are the challenges of clandestine capabilities for deterrence?
  • What strategies can states adopt regarding clandestine capabilities?
  • A preliminary case study: U.S. strategic anti-submarine warfare

Presentation on the international seminar "Disruptive Technologies, Strategic Vulnerability, and the Future of Detterence": Clandestine Capabilities and Deterrence in World Politics (full text) 


Imprint:

Comments

 
 
loading