New America

Research Reports in JSTOR from New America
41 Research Reports in JSTOR Date
The 80 Percent Solution: The Strategic Defeat of bin Laden’s al-Qaeda and Implications for South Asian Security 2012
AFTER MOSUL: Enlarging the Context of the Syria-Iraq Conflict(s) 2017
ALL JIHAD IS LOCAL: What ISIS’ Files Tell Us About Its Fighters 2016
The Battle for Afghanistan: Negotiations with the Taliban: History and Prospects for the Future 2011
The Battle for Afghanistan: Militancy and Conflict in Kandahar 2010
The Battle for Pakistan: Militancy and Conflict in Balochistan 2011
Between Al Qaeda and the Syrian Regime: A Path Out of the Current Crisis 2013
A BRIEF HISTORY OF LAW ENFORCEMENT HACKING IN THE UNITED STATES 2016
BUGS IN THE SYSTEM: A Primer on the Software Vulnerability Ecosystem and its Policy Implications 2016
CHANGES IN PAKISTAN’S COUNTER-TERRORISM LEGAL REGIME: CHALLENGES, PROSPECTS, AND RECOMMENDATIONS 2015
Compilation of Existing Cybersecurity and Information Security Related Definitions 2014
Countering Domestic Radicalization: Lessons for Intelligence Collection and Community Outreach 2011
Countering the New Orthodoxy: Reinterpreting Counterinsurgency in Iraq 2011
CYBERSECURITY AND ASIA 2015
CYBERSECURITY AS AN ENGINE FOR GROWTH 2017
CYBERSECURITY, SIMPLICITY, AND COMPLEXITY: The Graphic Guide to Making System More Secure Without Making Them Worse 2016
THE DECLINING HALF-LIFE OF SECRETS: And the Future of Signals and Intelligence 2015
DECRYPTING CYBERSECURITY’S GENDER GAP 2015
Do NSA's Bulk Surveillance Programs Stop Terrorists? 2014
THE DRONE PLAYBOOK: An Essay on the Obama Legacy and Policy Recommendations for the Next President 2016
Ecological Cooperation in South Asia:: The Way Forward 2013
Guantanamo:: Who Really ‘Returned to the Battlefield’? 2011
ISIS IN THE WEST: The Western Militant Flow to Syria and Iraq 2016
JIHADIST TERRORISM 15 YEARS AFTER 9/11: A Threat Assessment 2016
JIHADIST TERRORISM 16 YEARS AFTER 9/11: A Threat Assessment 2017
Lashkar-e-Taiba: Past Operations and Future Prospects 2011
The Lesson of the Surge:: Defeating ISIS Requires a New Sunni Awakening 2014
Managing the Danger from Pakistan’s Nuclear Stockpile 2010
The Militant Pipeline: Between the Afghanistan-Pakistan Border Region and the West 2010
Moving Toward Transition: A Survey of Opinion Leaders in Southern Afghanistan As the United States Begins its Drawdown 2011
A New Deal:: A Plan for Sustainable Afghan Stability 2010
Pakistan and the United States: At a Strategic Crossroads 2011
PATCON: The FBI’s Secret War Against the ‘Patriot’ Movement, and How Infiltration Tactics Relate to Radicalizing Influences 2012
Professor Cy Burr’s Graphic Guide to:: INTERNATIONAL CYBER NORMS 2016
Redefining the Islamic State: The Fall and Rise of Al-Qaeda in Iraq 2011
Russian Roulette: Corruption, Revenue, and the post-Soviet Precedent for State Failure Afghanistan 2012
Shared Environmental Concerns between India and Pakistan 2014
SMART CYBER-LEGISLATION: What Congress Can Do to Foster America’s Cybersecurity 2015
TO PAY RANSOM OR NOT TO PAY RANSOM?: An Examination of Western Hostage Policies 2017
TOWARD A SAFE AND SECURE INTERNET OF THINGS 2016
WAR AND TWEETS: Terrorism in America in the Digital Age 2016