Skip to Main Content
Have library access? Log in through your library

New America

Research Reports in JSTOR from New America
43 Research Reports in JSTOR Date
The 80 Percent Solution: The Strategic Defeat of bin Laden’s al-Qaeda and Implications for South Asian Security 2012
AFTER MOSUL: Enlarging the Context of the Syria-Iraq Conflict(s) 2017
ALL JIHAD IS LOCAL: What ISIS’ Files Tell Us About Its Fighters 2016
Apprenticeship and the Future of Nursing: An Equity-Based Strategy to Address the Bachelor’s Degree Gap 2019
The Battle for Afghanistan: Negotiations with the Taliban: History and Prospects for the Future 2011
The Battle for Afghanistan: Militancy and Conflict in Kandahar 2010
The Battle for Pakistan: Militancy and Conflict in Balochistan 2011
Between Al Qaeda and the Syrian Regime: A Path Out of the Current Crisis 2013
A BRIEF HISTORY OF LAW ENFORCEMENT HACKING IN THE UNITED STATES 2016
BUGS IN THE SYSTEM: A Primer on the Software Vulnerability Ecosystem and its Policy Implications 2016
CHANGES IN PAKISTAN’S COUNTER-TERRORISM LEGAL REGIME: CHALLENGES, PROSPECTS, AND RECOMMENDATIONS 2015
Compilation of Existing Cybersecurity and Information Security Related Definitions 2014
Countering Domestic Radicalization: Lessons for Intelligence Collection and Community Outreach 2011
Countering the New Orthodoxy: Reinterpreting Counterinsurgency in Iraq 2011
CYBERSECURITY AND ASIA 2015
CYBERSECURITY AS AN ENGINE FOR GROWTH 2017
CYBERSECURITY, SIMPLICITY, AND COMPLEXITY: The Graphic Guide to Making System More Secure Without Making Them Worse 2016
THE DECLINING HALF-LIFE OF SECRETS: And the Future of Signals and Intelligence 2015
DECRYPTING CYBERSECURITY’S GENDER GAP 2015
Do NSA's Bulk Surveillance Programs Stop Terrorists? 2014
THE DRONE PLAYBOOK: An Essay on the Obama Legacy and Policy Recommendations for the Next President 2016
Ecological Cooperation in South Asia:: The Way Forward 2013
Guantanamo:: Who Really ‘Returned to the Battlefield’? 2011
HOW TO FIX REMEDIATION AT SCALE 2016
ISIS IN THE WEST: The Western Militant Flow to Syria and Iraq 2016
JIHADIST TERRORISM 15 YEARS AFTER 9/11: A Threat Assessment 2016
JIHADIST TERRORISM 16 YEARS AFTER 9/11: A Threat Assessment 2017
Lashkar-e-Taiba: Past Operations and Future Prospects 2011
The Lesson of the Surge:: Defeating ISIS Requires a New Sunni Awakening 2014
Managing the Danger from Pakistan’s Nuclear Stockpile 2010
The Militant Pipeline: Between the Afghanistan-Pakistan Border Region and the West 2010
Moving Toward Transition: A Survey of Opinion Leaders in Southern Afghanistan As the United States Begins its Drawdown 2011
A New Deal:: A Plan for Sustainable Afghan Stability 2010
Pakistan and the United States: At a Strategic Crossroads 2011
PATCON: The FBI’s Secret War Against the ‘Patriot’ Movement, and How Infiltration Tactics Relate to Radicalizing Influences 2012
Professor Cy Burr’s Graphic Guide to:: INTERNATIONAL CYBER NORMS 2016
Redefining the Islamic State: The Fall and Rise of Al-Qaeda in Iraq 2011
Russian Roulette: Corruption, Revenue, and the post-Soviet Precedent for State Failure Afghanistan 2012
Shared Environmental Concerns between India and Pakistan 2014
SMART CYBER-LEGISLATION: What Congress Can Do to Foster America’s Cybersecurity 2015
TO PAY RANSOM OR NOT TO PAY RANSOM?: An Examination of Western Hostage Policies 2017
TOWARD A SAFE AND SECURE INTERNET OF THINGS 2016
WAR AND TWEETS: Terrorism in America in the Digital Age 2016