George Perkovich and Ariel E. Levite, “Understanding Cyber Conflict: 14 Analogies” (Georgetown UP, 2017)
Understanding Cyber Conflict: 14 Analogies (Georgetown University Press, 2017), edited by George Perkovich and Ariel E. Levite, uses analogies to conventional warfare and previous technological innovations to explain the complexities of cyber capabilities and threats. The essays examine cyber… Read More
Alexander Thurston, “Boko Haram: The History of an African Jihadist Movement” (Princeton UP, 2017)
Boko Haram is one of the most well known global terrorist organizations. They have killed thousands of people and displaced millions of West Africans. While widespread journalistic reporting on the group tries to keep up with their activities, few have… Read More
Mark S. Hamm and Ramon Spaaij, “The Age of Lone Wolf Terrorism” (Columbia UP, 2017)
The Age of Lone Wolf Terrorism (Columbia University Press, 2017), by Mark S. Hamm and Ramon Spaaij, identifies patterns among individuals that commit acts of terror outside of a group or network. Hamm and Spaaij follow these individuals, commonly… Read More
Matthew Bunn and Scott D. Sagan, “Insider Threats” (Cornell UP, 2017)
In Insider Threats (Cornell University Press, 2017), co-editors Matthew Bunn and Scott D. Sagan bring together a series of case studies and lessons learned spanning public and private sectors. Essays include discussions of the American anthrax attacks and… Read More
Looted Episode 3: Big Bronzes
This is the third in a series of podcasts from Zoe Kontes’ terrific “Looted.” There’s nothing like a full-bodied ancient Greek bronze nude to get the crowds to a museum. A visitor might even fall in love (speaking… Read More
Social media & sharing icons powered by UltimatelySocial