Defense and Security

Research Links

Cybersecurity Policy

How can the United States protect cyberspace "control system of our country," without restricting the open "flow of information on the Internet"? What should countries consider when developing international cybersecurity standards and protocol? What should their citizens know to protect their information and their rights? Cybersecurity Policy Research Links provide news, background information, legislation, analysis, and international efforts to protect government and the public's information.

See more in United States; Cybersecurity; Internet Policy

Foreign Affairs Article

Why Drones Work

Author: Daniel Byman

The Obama administration relies on drones for one simple reason: they work. Drone strikes have devastated al Qaeda at little financial cost, at no risk to U.S. forces, and with fewer civilian casualties than many alternative methods would have caused.

See more in Somalia; Pakistan; Yemen; Drones

Primary Sources

Code of Conduct Concerning the Repression of Piracy, Armed Robbery Against Ships, and Illicit Maritime Activity in West and Central Africa

Economic Community of Central African States (ECCAS), Economic Community of West African States (ECOWAS), and the Gulf of Guinea Commission (GGC) created a code of conduct, modeled after the Djibouti Code of Conduct, to increase regional cooperation in combatting piracy. The code of conduct was signed on June 25, 2013, after a conference on maritime safety and security in Yaounde, Cameroon and is also known as the Yaounde Declaration.

See more in Africa (sub-Saharan); Regional Security; Piracy

Foreign Affairs Article

Why Drones Fail

Author: Audrey Kurth Cronin

Drones are not helping to defeat al Qaeda and may be creating sworn enemies out of a sea of local insurgents. Embracing them as the centerpiece of U.S. counterterrorism would be a mistake.

See more in Global; Drones