Defense/Homeland Security

Foreign Affairs Article

The Evolution of Irregular War

Author: Max Boot

Pundits tend to treat terrorism and guerrilla tactics as something new, but nothing could be further from the truth. Although the agendas have changed over the years -- from tribalism, to liberalism and nationalism, to socialism, to jihadist extremism -- guerrilla and terrorist warfare has been ubiquitous throughout history and consistently deadly.

See more in Afghanistan, Wars and Warfare

Ask CFR Experts

What should the red lines be for the Iranian nuclear program?

People love to talk about "red lines" for all sorts of challenges, and the Iranian nuclear program is no exception. The United States can, in principle, threaten stronger sanctions if Iran crosses certain red lines. It can threaten military action if Iran crosses others. But it's not clear that setting red lines—particularly in public, where failing to follow through on threats can be costly—is a productive course.

Read full answer

See more in Iran, Defense Strategy

Audio

Update on the CFR-Sponsored Independent Task Force Report on U.S. Immigration Policy

Speakers: Edward Alden, Richard D. Land, and Eliseo Medina
Presider: Edward Schumacher-Matos

As the 113th U.S. Congress considers an overhaul of the country's immigration system, Task Force members Richard Land, Eliseo Medina, and project director Edward Alden discuss U.S. policy options and political prospects for comprehensive change.

See more in United States, Homeland Security, U.S. Strategy and Politics

Video

Update on the CFR-Sponsored Independent Task Force Report on U.S. Immigration Policy

Speakers: Edward Alden, Richard D. Land, and Eliseo Medina
Presider: Edward Schumacher-Matos

As the 113th U.S. Congress considers an overhaul of the country's immigration system, Task Force members Richard Land, Eliseo Medina, and project director Edward Alden discuss U.S. policy options and political prospects for comprehensive change.

See more in United States, Homeland Security, U.S. Strategy and Politics

Essential Documents

Senate Testimonies of Secretary of Defense Panetta and Joint Chief of Staff General Dempsey on the Attack of U.S. Facilities in Benghazi, February 2013

Author: General Martin E. Dempsey, USA

Secretary of Defense Leon Panetta and Joint Chief of Staff General Martin E. Dempsey testified before the Senate Foreign Relations Committee on February 7, 2013, about the September attacks on the U.S. Embassy in Benghazi, Libya and the response of the Defense Department. Panetta's and Dempsey's prepared remarks and video of the hearing are available on the Committee's website.

See more in Libya, Preparedness, Terrorist Attacks

Article

The Warrior King

Author: Micah Zenko
Foreign Policy

Micah Zenko says, "Most analysts and journalists have focused on President Obama's expanded scope, intensity, and institutionalization of targeted killings against suspected terrorists and militants. However, perhaps the enduring legacy of the Obama administration will be its sustained, rigorous effort to shape and define-down the idea of war."

See more in United States, Wars and Warfare, Presidency

Must Read

CRS: The American Taxpayer Relief Act of 2012: Modifications to the Budget Enforcement Procedures in the Budget Control Act

Author: Bill Heniff Jr.

The BCA established an automatic process to reduce spending, partially entailing a sequester of budgetary resources, if Congress did not pass and the President did not sign, by January 15, 2012, legislation reducing the deficit by $1.2 trillion over the FY2012-FY2021 period. No such legislation was enacted by the deadline. Therefore, the automatic spending reduction process was triggered.

See more in United States, Defense Policy and Budget

Article

The People's Republic of Hacking

Author: Adam Segal
Foreign Policy

Adam Segal says the recent Chinese cyberattacks on Bloomberg and the New York Times highlights both the willingness of Beijing to shape the narrative about China, as well as the vulnerability the top leadership feels about how they are portrayed.

See more in China, Cybersecurity