Defense and Security

Foreign Affairs Article

Chinese Computer Games

Author: Adam Segal

In March 2011, the U.S. computer security company RSA announced that hackers had gained access to security tokens it produces that let millions of government and private-sector employees, including those of defense contractors such as Lockheed Martin, connect remotely to their office computers.

See more in China; Cybersecurity

Foreign Affairs Article

Time to Attack Iran

Author: Matthew Kroenig

Opponents of military action against Iran assume a U.S. military strike would be far more dangerous than simply letting Tehran build a bomb. Not so, argues this former Pentagon defense planner. With a carefully designed strike, Washington could mitigate the costs—or at least bring them down to a bearable level—and spare the region and the world from an unacceptable threat.

See more in Iran; Defense Strategy

Foreign Affairs Article

Groundhog War

Author: Bing West

Two documentaries on the Afghan war, Restrepo and Armadillo, show how a combination of overwhelming military resources and aggressive counterinsurgency ultimately leads to frustration on the battlefield.

See more in Wars and Warfare; Afghanistan

Foreign Affairs Article

Groundhog War

Author: Bing West

Two documentaries on the Afghan war, Restrepo and Armadillo, show how a combination of overwhelming military resources and aggressive counterinsurgency ultimately leads to frustration on the battlefield.

See more in Wars and Warfare; Afghanistan