38 North
Action on Armed
Violence
Afghanistan
Analysts Network
Air University
Press
American
Enterprise Institute
Amnesty
International
Army Combined
Arms Center
o Old Generation
Warfare: The Evolution—Not Revolution—of the Russian Way of Warfare
o Unconventional
Art and Modern War
o Defining a New
Security Architecture for Europe that Brings Russia in from the Cold
o Understanding
Today’s Enemy: The Grand Strategists of Modern Jihad
o The Particular
Circumstances of Time and Place: Why the Occupation of Japan Succeeded and the
Occupation of Iraq Failed
o The AFRICOM
Queen
o To Respond or
Not to Respond: Addressing Adversarial Propaganda
o A Rigorous
Education for an Uncertain Future
o Precedent and
Rationale for an Army Fixed-Wing Ground Attack Aircraft
o Social Factors
and the Human Domain
o Force Agility
through Crowdsourced Development of Tactics
o Army ROTC at
One Hundred
o U.S. Cyber
Force: One War Away
o Advantages of
Assigning Forces
o Disciples: The
World War Missions of the CIA Directors Who Fought for Wild Bill Donovan
Asan Institute
for Policy Studies
Asian
Development Bank
Atlantic
Council
Australian
Strategic Policy Institute (ASPI)
Baker Institute
for Public Policy
Barcelona
Centre for International Affairs
Begin-Sadat
Center for Strategic Studies
Belfer Center
for Science and International Affairs
Brookings
·
The Geography, Incidence, and Underreporting of Gun Violence: New Evidence using Shot Spotter data
Bruegel
Bureau of
Justice Statistics (BJS)
Center for a
New American Security (CNAS)
Center for
Climate and Energy Solutions (C2ES)
Center for
Global Development
Center for
Infrastructure Protection & Homeland Security
o Four Key
Imperatives to Building Effective Transportation Infrastructure Resilience
o MWCOG and
InfraGardNCR Key to Government Engagement with Private Sector Critical
Infrastructure Stakeholders
o Regional
Networks for Operational Intelligence & Agility: Focusing on Day-to-Day
Operations and Advancing Strategic Resilience
o Challenges for
Implementing Resilience during Normal Time: a Human Engineering Approach
o Thoughts on
Resilience: What Happens When WMATA Shuts Down?
Center for
Immigration Studies (CIS)
Center for
Security Studies (CSS)
Center for
Strategic and International Studies (CSIS)
·
Issues &
Insights, Vol. 16 - No. 8 - The Japanese-European Security Relationship During the Second Abe Administration
Center for
Terrorism and Security Studies
o 'Gonna Get
Myself Connected': The Role of Facilitation in Foreign Fighter Mobilizations
o Why Has The
Islamic State Changed its Strategy and Mounted the Paris-Brussels Attacks?
o Analysing the
Processes of Lone-Actor Terrorism: Research Findings
o Analysing
Personal Characteristics of Lone-Actor Terrorists: Research Findings and
Recommendations
o Evaluating CVE:
Understanding the Recent Changes to the United Kingdom's Implementation of
Prevent
o In Conversation
with Mubin Shaikh: From Salafi Jihadist to Undercover Agent inside the
"Toronto 18" Terrorist Group
o Bibliography:
Terrorism Research Literature
o Op-Ed:
Competing Perspectives on Countering ISIS
Centers for
Disease Control and Prevention (CDC)
·
Primer for Understanding the Principles and Practices of Disaster Surveillance in the United States
Centre for
International Governance Innovation (CIGI)
Centre for
Security Governance (CSG)
Chatham House
College of
Europe
·
Something Worth Fighting for: The Evolution of Lobbying Coalitions in the Emissions Trading System
Congress.
House. Foreign Affairs Committee
Congress.
House. Homeland Security Committee
·
Transferring Guantanamo Bay Detainees to the Homeland: Implications for States and Local Communities
Congress.
House. Oversight & Government Reform Committee
Congress. Senate.
Armed Services Committee
Congress.
Senate. Foreign Relations Committee
Congress.
Senate. Homeland Security & Governmental Affairs Committee
Congress.
Senate. Judiciary Committee
Congressional
Budget Office (CBO)
Department of
Defense (DOD)
Department of
Defense Inspector General (DODIG)
·
DODIG-2016-078 Biological Safety and
Security: Evaluation of DoD Biological Safety and Security Implementation
Department of
the Air Force
·
AF Policy Directive 17-2 - Cyberspace
Operations
E-International
Relations
EastWest
Institute
Economist
Intelligence Unit (EIU)
Economic
Research Forum (ERF)
Elliot School
of International Affairs - Central Asia Program
Energy
Information Administration (EIA)
Environmental
Protection Agency (EPA)
EU Institute
for Security Studies
EU
Non-Proliferation Consortium
European
Parliament Think Tank
European Policy
Centre
European
Strategic Intelligence and Security Center (ESISC)
European
Studies Unit (ESU)
o Points of
Deception: Exploring How Proliferators Evade Controls to Obtain Dual-use Goods
o Proliferation
Financing: The Potential Impact of the Nuclear Agreement with Iran on
International Controls
o ICT
Surveillance Systems: Trade Policy and the Application of Human Security
Concerns
o Mass
Surveillance Technology: Trading Trojan Horses?
o Dual-Use
Technology in Southeast Asia: Nonproliferation Challenges for the Next Decade
o Singapore’s
Journey Towards its Implementation of Strategic Trade Controls
o Implementation
and Enforcement of Strategic Trade Controls in Malaysia
o The Strategic
Trade Management Regime in the Philippines
o Indonesia’s
Approach to Strategic Trade Controls: The Perspective of a Developing and
Archipelagic Country
Forcepoint
Foreign Policy
Research Institute (FPRI)
French
Institute of International Relations (Institut Français des Relations
Internationales)
Geneva Centre
for Security Policy (GCSP)
Geneva
International Centre for Humanitarian Demining (GICHD)
German Council
on Foreign Relations
German
Development Institute
German Marshall
Fund of the United States
Government
Accountability Office (GAO)
·
Critical Infrastructure Protection: Federal
Agencies Have Taken Actions to Address Electromagnetic Risks, but Opportunities
Exist to Further Assess Risks and Strengthen Collaboration. GAO-16-243
·
Defense Health Care: DOD Is Meeting Most
Mental Health Care Access Standards, but It Needs a Standard for Follow-up
Appointments. GAO-16-416
·
F-35 Joint Strike Fighter: Development of New
Capabilities Requires Continued Oversight. GAO-16-634T [Testimony]
·
Government Efficiency and Effectiveness:
Opportunities to Reduce Fragmentation, Overlap, and Duplication and Achieve
Other Financial Benefits. GAO-16-580T [Testimony]
·
Missile Defense: Ballistic Missile Defense
System Testing Delays Affect Delivery of Capabilities. GAO-16-339R
·
Public Safety Officers' Benefits Program:
Improvements Made but Information on Performance Goals Still Needed.
GAO-16-617T [Testimony]
·
Vehicle Cybersecurity: DOT and Industry Have
Efforts Under Way, but DOT Needs to Define Its Role in Responding to a
Real-world Attack. GAO-16-350
·
Veterans Justice Outreach Program: VA Could
Improve Management by Establishing Performance Measures and Fully Assessing
Risks. GAO-16-393
Heritage
Foundation
Households in
Conflict Network
Hudson
Institute
Human Rights
Watch
Institute for
Defence Studies & Analyses (IDSA)
Institute for
Defense Analyses (IDA)
o The Islamic
State in Algeria: Limited Success—For Now
o Social Media in
Africa: A Gathering Force
Institute for
National Security and Counterterrorism (INSCT)
o Trends &
Predictions in Foreign Intelligence Surveillance: The FAA & Beyond
o Spying &
Fighting in Cyberspace: What is Which?
Institute for
Science and International Security
Institute for
Security & Development Policy
Institute for
Social Policy and Understanding (ISPU)
Institute for
the Study of War
Institute of
South Asian Studies (ISAS)
International
Centre for Counter-Terrorism (ICCT)
International
Monetary Fund (IMF)
Jamestown
Foundation
o Jahba East
Africa: Islamic State Alters the Dynamic of Somalia’s Conflict
o Iraq’s Shia
Militias: Helping or Hindering the Fight Against Islamic State?
o How Islamic
State Gained Ground in India Using Indigenous Militant Networks
o Germany: Do
Terrorists Want to Target Europe’s Nuclear Facilities?
Lexington
Institute
Marine Corps
University Press
·
The Crisis of the African State: Globalization, Tribalism, and Jihadism in the Twenty–First Century
o Identity,
Attribution, and the Challenge of
Targeting in the Cyberdomain
o Russia’s
Ambiguous Warfare and Implications for the U.S. Marine Corps
o The Dragon’s
Pearls: China’s Road to Hegemony in the Indian Ocean
o Can Refugees Be
National Security Assets? Afghan American Contributions to U.S. National
Defense since 1978
o The
Intelligence Dilemma in History, Fact, and Fiction
Martens Centre
for European Studies
Migration
Policy Institute
Minority Rights
Group International
Mitchell
Institute
MITRE
National
Academies Press
National Bureau
of Asian Research
National
Defense College
National
Institute for Occupational Safety and Health (NIOSH)
National
Institute of Standards and Technology (NIST)
Norwegian
Institute of International Affairs
Norwegian
Peacebuilding Resource Centre
Oxfam
Oxford Research
Group
Pakistan
Institute of Legislative Development and Transparency
·
Dialogue Report : India–Pakistan Legislators
and Public Officials Dialogue on Sharing of Experiences on Governance and
Democracy
Peace Research
Institute
Peterson
Institute for International Economics (PIIE)
Pew Research
Center Global Attitudes & Trends
Political
Economy Research Institute (PERI)
RAND
·
RAPAPORT (Resilience Assessment Process and Portfolio Option Reporting Tool): Background and Method
Royal United
Services Institute (RUSI)
·
Lone-Actor Terrorism
Small Wars
Journal
Special
Inspector General for Afghanistan Reconstruction (SIGAR)
·
SIGAR 16-32 - Primary and Secondary Education
in Afghanistan: Comprehensive Assessments Needed to Determine the Progress and
Effectiveness of Over $759 Million in DOD, State, and USAID Programs
Stanley
Foundation
Stockholm
International Peace Research Institute (SIPRI)
Swedish Defence
University
Thomas M.
Cooley Law School
o Bridging the
Gap: Amending FISA to Allow Seamless Surveillance of Foreign Terrorists Who
Breach Our Nation’s Walls
o Cybersecurity
Firms—Cyber Mercenaries?
o Unilateral
Humanitarian Intervention and Reform of the United Nations Veto: A Pilot
Program Aimed Towards International Peace and Increased Security Worldwide
Transparency
International
US Coast Guard
(USCG)
o Safety
Management Facilitates Safe Vessel Operation: Vessel systems, crew, and
operations
o Safety
Management Systems to Prevent Pollution from Ships: Standard procedures protect the environment
o Dead Reckoning
by Safety Management?: Check your course
o Mitigating Risks
on the Outer Continental Shelf: Safety
and environmental management systems in action
o Creating an
Effective Safety and Environmental Management System for Offshore Oil and Gas
Operations: Adopting performance-based requirements into a hybrid regulatory
regime
o ISM Code and
Vessel Safety Management Systems:
Reading between the lines to optimize compliance
o Strengthening
Our Foundation: Fostering an even more
robust safety culture within the liquefied gas industry
o Making the
Safe, Safer: Implementing safety
management systems on domestic passenger vessels
o One
System: Connecting SMS requirements to
vessel operations
o The IMO
Mandatory Member State Audit Program:
Appraising the flag
o Nothing to
Fear: Objective auditors drive quality
throughout organizations
o Audits vs.
Inspections: What's the difference?
o A Tale of Two
Ships: Examining SMS similarities,
strengths, and weaknesses
o Suspension and
Revocation for Safety Management System Violations: Maintaining standards for competence and
conduct essential to safety at sea
o Putting People
at the Center: Integrating human factors
into safety management systems
o Deadly
Fun: Personal watercraft operating
dangers
United States
Institute of Peace (USIP)
Washington
Institute for Near East Policy
White House
William J.
Perry Center for Hemispheric Defense Studies
Wilson Center
·
Lessons of the Cold War in the Pacific: U.S.Maritime Strategy, Crisis Prevention, and Japan's Role
World Bank