President Obama gave a speech on April 15, 2013, after explosions went off near the finish line of the Boston Marathon. In a second speech on April 16, he said the case will be investigated as an "act of terrorism" and on April 19, he discussed the federal and local coordination in locating and taking into custody one of the suspects and in collecting intelligence.
Grounded in a realistic assessment of technology, Matthew C. Waxman and Kenneth Anderson outline a practical alternative with which to evaluate the use of autonomous weaponry that incorporates codes of conduct based on traditional legal and ethical principles governing weapons and warfare.
For many senior Pakistani spies, the man sitting in the jail cell represented solid proof of their suspicions that the C.I.A. had sent a vast secret army to Pakistan, men who sowed chaos and violence as part of the covert American war in the country. For the C.I.A., the eventual disclosure of [Raymond] Davis's role with the agency shed an unflattering light on a post–Sept. 11 reality: that the C.I.A. had farmed out some of its most sensitive jobs to outside contractors — many of them with neither the experience nor the temperament to work in the war zones of the Islamic world.
The diplomatic strength and economic power of the United States depend upon a functioning global order and a system of international trade based on uncontested access to the global commons—the world's shared land, sea , air, and space—for all. Command of the global commons is what makes the United States a super power.
In the past ten years, U.S. special operations forces have honed their counterterrorism manhunting ability with great operational success. They now are at a critical inflection point in their development where resources should be realigned to successfully employ the other of their two basic capabilities—working alongside indigenous forces to combat national and transnational threats.
Cyber weapons are different from conventional weapons in that their effects do not directly manifest themselves in the "real world." There are three broad categories of potential effects of cyberattacks: personal, economic, and physical.
Secretary of Defense Chuck Hagel delivered his first major policy speech as Pentagon chief at the National Defense University in Washington, D.C., April 3, 2013. The speech outlined potential departmental changes in acquisition, personnel, and organization, especially with the sequester, and addressed U.S. responses to North Korean threats.
In 2009 the NATO Cooperative Cyber Defence Center of Excellence (NATO CCD COE) asked a panel of international law experts to "apply standards of international law to a virtual battlefield." The panel released this report on March 28, 2013, as "an expression of opinions of a group of independent experts acting solely in their personal capacity."
While there was some early discussion on where to base the command (continental United States, Africa, or Germany), its current location in Germany has the existing infrastructure, transportation links, housing, schools, and health facilities to support its personnel, employees, and family members. Any future rebasing discussions will need to take into account a cost-benefit analysis—and in a time of fiscal uncertainty, the cost might be prohibitive.
The United Nations General Assembly adopted the Arms Trade Treaty (ATT) on April 2, 2013. The press release says the treaty makes it "harder for human rights abusers, criminals and arms traffickers to obtain weapons" and gives a brief history of the treaty from the 1990s.
The Council on Foreign Relations' David Rockefeller Studies Program—CFR's "think tank"—is home to more than seventy full-time, adjunct, and visiting scholars and practitioners (called "fellows"). Their expertise covers the world's major regions as well as the critical issues shaping today's global agenda. Download the printable CFR Experts Guide.