Defense/Homeland Security

Essential Documents

Senate Testimonies of Secretary of Defense Panetta and Joint Chief of Staff General Dempsey on the Attack of U.S. Facilities in Benghazi, February 2013

Author: General Martin E. Dempsey, USA

Secretary of Defense Leon Panetta and Joint Chief of Staff General Martin E. Dempsey testified before the Senate Foreign Relations Committee on February 7, 2013, about the September attacks on the U.S. Embassy in Benghazi, Libya and the response of the Defense Department. Panetta's and Dempsey's prepared remarks and video of the hearing are available on the Committee's website.

See more in Libya, Preparedness, Terrorist Attacks

Article

The Warrior King

Author: Micah Zenko
Foreign Policy

Micah Zenko says, "Most analysts and journalists have focused on President Obama's expanded scope, intensity, and institutionalization of targeted killings against suspected terrorists and militants. However, perhaps the enduring legacy of the Obama administration will be its sustained, rigorous effort to shape and define-down the idea of war."

See more in United States, Wars and Warfare, Presidency

Must Read

CRS: The American Taxpayer Relief Act of 2012: Modifications to the Budget Enforcement Procedures in the Budget Control Act

Author: Bill Heniff Jr.

The BCA established an automatic process to reduce spending, partially entailing a sequester of budgetary resources, if Congress did not pass and the President did not sign, by January 15, 2012, legislation reducing the deficit by $1.2 trillion over the FY2012-FY2021 period. No such legislation was enacted by the deadline. Therefore, the automatic spending reduction process was triggered.

See more in United States, Defense Policy and Budget

Article

The People's Republic of Hacking

Author: Adam Segal
Foreign Policy

Adam Segal says the recent Chinese cyberattacks on Bloomberg and the New York Times highlights both the willingness of Beijing to shape the narrative about China, as well as the vulnerability the top leadership feels about how they are portrayed.

See more in China, Cybersecurity