Defense and Security

Primary Sources

National Security Law of the People's Republic of China

National People's Congress in China passed this law on July 1, 2015. It outlines the government's authority to respond to threats to China's assets and activities in its borders and territories, as well as in cyberspace, space, the deep sea, and polar regions. The law also establishes a national security leadership system for crisis management. On July 6, 2015, the National People's Congress released the text of its proposed Cybersecurity Law that provides additional guidance on technology security standards.

See more in China; Homeland Security; Organization of Government

Testimony

Evaluating Key Components of a Joint Comprehensive Plan of Action with Iran

Author: Ray Takeyh

In his testimony before the Senate Committee on Foreign Affairs, Ray Takeyh argues that before the impending nuclear agreement with Iran places Tehran inches away from the bomb, the United States should insist on additional parameters to assure that the deal will be an advantageous one for the international community.

See more in Iran; Weapons of Mass Destruction; Nonproliferation, Arms Control, and Disarmament

Book

Red Team

Author: Micah Zenko

In Red Team, CFR Senior Fellow Micah Zenko provides an in-depth investigation into the work of red teams, revealing the best practices, most common pitfalls, and most effective applications of these modern-day devil's advocates.

See more in Global; Defense and Security

Foreign Affairs Article

The Death and Life of the Two-State Solution

Authors: Grant Rumley and Amir Tibon

On March 17, Israeli Prime Minister Benjamin Netanyahu won reelection, thanks in part to a desperate last-minute pledge to his right-wing base that the Palestinians would never get a state so long as he was in power. After the election, he tried to walk his comments back, but Palestinian observers weren’t buying it. 

See more in Palestine; Wars and Warfare

Foreign Affairs Article

Hired Guns

Author: Allison Stranger

In 2008, the actress and activist Mia Farrow approached the private security company Blackwater and some human rights organizations with a proposition: Might it be possible to hire private military contractors to end the genocide in the Darfur region of Sudan?

See more in United States; Defense and Security

Foreign Affairs Article

Fear of Flying

Authors: Robert Matthews, Daniel L. Johnson, and Gretchen West

Better safe than sorry. Gretchen West (“Drone On,” May/ June 2015) argues that the growing U.S. drone industry “faces a major regulatory obstacle” in the form of the Federal Aviation Administration. She’s right that the agency needs to make some basic decisions about how to regulate drones—and soon, lest the United States surrender its technological edge.

See more in United States; Drones

Foreign Affairs Article

Europe's Shattered Dream of Order

Authors: Ivan Krastev and Mark Leonard

Until recently, most Europeans believed that their post–Cold War security order held universal appeal and could be a model for the rest of the world. This conviction was hardly surprising, since Europe has often played a central role in global affairs. For much of the last three centuries, European order was world order—a product of the interests, ambitions, and rivalries of the continent’s empires.

See more in Europe; Wars and Warfare

Foreign Affairs Article

The Torture Blame Game

Author: Robert Jervis

At the end of World War II, the United Kingdom built memorials to every military branch save one: the Royal Air Force’s Bomber Command. The group had skillfully carried out its mission, leveling German cities in raids that killed hundreds of thousands of civilians. But by 1945, the British public had developed second thoughts about the morality and efficacy of that mission.

See more in United States; Intelligence

Foreign Affairs Article

Who Lost Libya?

Authors: Derek H. Chollet and Ben Fishman

A close call. It is tempting to view the chaos in Libya today as yet one more demonstration of the futility of U.S.-led military interventions. That is precisely the case that Alan Kuperman makes in his article (“Obama’s Libya Debacle,” March/April 2015), which asserts that NATO’s 2011 intervention in Libya was “an abject failure” that set free Libya’s vast conventional weapons stockpiles, gave rise to extremist groups, and even exacerbated the conflict in Syria.

See more in Libya; NATO

Foreign Affairs Article

Warning Signs

Author: Paul B. Stares
Intelligence analysts have labored for years to identify the factors that make countries unstable. For those wanting to anticipate the next failed state, Nassim Nicholas Taleb and Gregory Treverton (“The Calm Before the Storm,” January/February 2015) offer a counterintuitive insight: “Disorderly regimes come out as safer bets than commonly thought—and seemingly placid states turn out to be ticking time bombs.”

See more in Middle East and North Africa; Intelligence

Other Report

Countering Islamic State Exploitation of the Internet

Author: David P. Fidler

The use of social media and other Internet-enabled communications by the self-proclaimed Islamic State is pushing the United States and other democracies to react to the abuse of liberal freedoms by illiberal forces. CFR Visiting Fellow David P. Fidler outlines ways to counter the Islamic State's online onslaught through policies anchored in free speech, transparency, and accountability. 

See more in Syria; Iraq; Cybersecurity; Internet Policy

Testimony

China's Future–and Our Own

Author: Jerome A. Cohen

In his testimony before the House Foreign Affairs Subcommittee on Asia and the Pacific, Jerome A. Cohen argues that China would benefit at home and abroad by demonstrating increasing respect rule of law, while the United States, by striving harder to set a good example, could do much to improve not only its own society but also its standing in China and the world.

See more in China; Defense Strategy; Economics