Bridging the Gap Between Academic Research and National Security

…https://gnet-research.org/2020/07/30/telegrams-anti-is-campaign-effectiveness-perspectives-and-policy-suggestions/, and GW Program on Extremism, https://extremism.gwu.edu/sites/g/files/zaxdzs2191/f/EncryptedExtremism.pdf, RESOLVE network at USIP, https://www.resolvenet.org/system/files/2019-09/RSVE_RVESeries_ResearchingJihadistPropaganda_CWinter_May2019.pdf 22 https://www.degruyter.com/document/doi/10.7312/krau19300-021/html 23 https://www.justsecurity.org/67605/no-place-to-hide-no-place-to-post-lessons-from-recent-efforts-at-de-platforming-isis/ 24 https://twitter.com/just_security/status/1270811076448354304?s=20 25 https://www.vox.com/mischiefs-of-faction/2019/3/6/18252793/why-republicans-hate-nsf 26 https://psmag.com/news/congress-nsf-political-science-budget-54283 27 https://politicalsciencenow.com/an-update-on-political-science-at-the-nsf/ 28 https://blogs.lse.ac.uk/impactofsocialsciences/2016/05/25/should-academics-be-expected-to-change-policy-six-reasons-why-it-is-unrealistic/ 29 https://www.insidehighered.com/news/2020/03/05/pentagons-social-science-research-program-chopping-block 30 https://www.defensenews.com/congress/2021/08/02/defense-top-line-will-probably-go-up-key-dems-see-gop-boost-as-path-to-a-deal/…

Privacy Policy

…to www.google.com/policies/privacy/‌partners/, and exercise the opt-out provided by Google by downloading the Google Analytics opt-out browser add-on, available at https://tools.google.com/dlpage/gaoptout. We also use Hotjar, which collects and analyzes information about…

What’s the Best Process? International Community Needs to Recommend Approaches to Implementation of Cyber Norms and Law

…For example, see: https://cyberlaw.ccdcoe.org/wiki/Main_Page. 6 https://www.universiteitleiden.nl/en/research/research-output/governance-and-global-affairs/revisiting-past-cyber-operations-in-light-of-new-cyber-norms-and-interpretations-of-international-law-inching-towards-lines-in-the-sand 7 See: https://front.un-arm.org/wp-content/uploads/2021/02/new-updated-norms-guidance-text-feb-11-clean.pdf and https://documents.unoda.org/wp-content/uploads/2021/12/Canadian-position-paper-2021-25-OEWG-final-Dec-6_Annex-Gender-Considerations.pdf 8 https://reachingcriticalwill.org/images/documents/Disarmament-fora/other/icts/oewg-II/statements/30March_ROK_law.pdf 9 https://reachingcriticalwill.org/images/documents/Disarmament-fora/other/icts/oewg-II/statements/30March_Japan_law.pdf  10 https://reachingcriticalwill.org/images/documents/Disarmament-fora/other/icts/oewg-II/statements/31March_CostaRica_CB.pdf 11 https://reachingcriticalwill.org/images/documents/Disarmament-fora/other/icts/oewg-II/statements/15Dec_Indonesia.pdf  12 https://www.stimson.org/project/cyber-security/ 13 For example, to support and complement other efforts,…

Preventing Atrocities Among Pastoral Communities Through Disarmament

…in the Great Lakes Region and the Horn of Africa,” n.d., https://www.sipri.org/sites/default/files/research/disarmament/dualuse/pdf-archive-att/pdfs/recsa-nairobi-protocol-for-the-prevention-control-and-reduction-of-small-arms-and-light-weapons-in-the-great-lakes-region-and-the-horn-of-africa.pdf. have been tested to control SALW proliferation, the most infamous being the “cooperate to disarm” (C2D) model.  The C2D model…