In their essay "The End of Hypocrisy" (November/December 2013), Henry Farrell and Martha Finnemore argue that the biggest threat from leakers of classified information such as Chelsea Manning and Edward Snowden is that "they undermine Washington's ability to act hypocritically and get away with it."
On March 11, 2014, California Senator Dianne Feinstein gave this statement regarding Senate Intelligence Committee's oversight review of the Detention and Interrogation Program of the CIA. She gives a timeline of the overview's activities and describes how the members accessed CIA documents.
Author: Charles E. Berger National Interest Online
Charles Berger writes that the FBI has always been a national security agency that uses both its law enforcement and intelligence authorities as means to counter the most significant threats to the United States, despite claims to the contrary.
The annual worldwide threat briefings of the intelligence community began with Director of National Intelligence James Clapper's briefing to the U.S. Senate, during which he discussed the top threats facing the United States in 2014. In his article, Micah Zenko discusses the one thing that will remain shrouded from the American public—exactly who the United States is at war with.
Annually, the Director of National Intelligence testifies before the Senate Select Committee on Intelligence and before the House Permanent Select Committee on Intelligence to discuss the current and potential threats to United States' security and priorities for the Department of Defense budget. The assessment usually covers terrorism threats, cyber attacks, counterintelligence, proliferation, mass atrocities, regional and country-by-country threats, and other state and non state intelligence threats such as health threats, water security and transnational crime.
President Barack Obama delivered these remarks at the Department of Justice on January 17, 2014. He discussed changes to the National Security Agencies' operations regarding intelligence collection of American citizens' records.
"Perhaps Ahmadullah no longer feels that his life is at risk. Unlike al-Qaeda, the Taliban have emerged from the past decade remarkably unscathed. Many of the group's leaders have vanished into tribal areas along the Afghanistan-Pakistan border, and others live in urban areas—such as Quetta and Karachi—where U.S. drones could not reasonably operate. Still, if Ahmadullah who is no older than forty-seven, has any hope of playing a role in Afghanistan's future, he will have to emerge at some point from 'under the grave.'"
The President's Review Group on Intelligence and Communications Technologies released this report on December 18, 2013. The document details forty-six recommendations for protecting national security and foreign policy interests while continuing to value privacy, civil liberties, and the public's trust.
"[Keeping the phone metadata collection program] was the first in a series of decisions by Obama to institutionalize some of the most controversial national-security policies of the Bush Administration. Faced with a long list of policies to roll back…reining in the N.S.A.'s surveillance programs might have seemed like a low priority. As core members of Al Qaeda were killed, the danger shifted to terrorists who were less organized and more difficult to detect, making the use of the N.S.A.'s powerful surveillance tools even more seductive."
Micah Zenko reviews 'Covert Capital': U.S. Empire in the Suburbs of Northern Virginia, which he says "provides an original and entertaining narrative showing how Cold War planning and operations permanently changed the suburbs of Washington."
Julia Sweig reflects on Washington's inconsistent response to outrage from foreign leaders at revelations of NSA spying, and on the roots and the implications of the United States' Euro-centric diplomacy.
Recent media stories about National Security Agency surveillance address unauthorized disclosures of two different intelligence collection programs. These programs arise from provisions of the Foreign Intelligence Surveillance Act. However, they rely on separate authorities, collect different types of information, and raise different policy questions. As such, where possible, the information contained in this report distinguishes between the two."
"Recent media stories about National Security Agency surveillance address unauthorized disclosures of two different intelligence collection programs. These programs arise from provisions of the Foreign Intelligence Surveillance Act. However, they rely on separate authorities, collect different types of information, and raise different policy questions. As such, where possible, the information contained in this report distinguishes between the two."
The Council on Foreign Relations' David Rockefeller Studies Program—CFR's "think tank"—is home to more than seventy full-time, adjunct, and visiting scholars and practitioners (called "fellows"). Their expertise covers the world's major regions as well as the critical issues shaping today's global agenda. Download the printable CFR Experts Guide.
The authors argue that the United States has responded inadequately to the rise of Chinese power and recommend placing less strategic emphasis on the goal of integrating China into the international system and more on balancing China's rise.
Campbell evaluates the implications of the Boko Haram insurgency and recommends that the United States support Nigerian efforts to address the drivers of Boko Haram, such as poverty and corruption, and to foster stronger ties with Nigerian civil society.
Learn more about CFR’s mission and its work over the past year in the 2014 Annual Report. The Annual Report spotlights new initiatives, high-profile events, and authoritative scholarship from CFR experts, and includes a message from CFR President Richard N. Haass. Read and download »