North America

Op-Ed

Why No One Is Buying the Air Force’s Argument To Ditch the A-10

Author: Janine Davidson
Defense One

Janine Davidson evaluates the heated, often emotional discussion surrounding the Air Force's decision to retire the A-10 Warthog. She argues that the A-10 debate speaks to larger issues surrounding the future of close air support, and that—while there are good arguments to divest from the A-10—the Air Force has so far done a poor job communicating them.

See more in United States; Defense Technology

Primary Sources

United States of America v. Members of China's People's Liberation Army

The U.S. Department of Justice announced the indictment of five Chinese military hackers on May 19, 2014. Wang Dong, Sun Kailiang, Wen Xinyu, Huang Zhenyu, and Gu Chunhui were charged with computer hacking, economic espionage and other offenses directed at Americans in the nuclear power, metals, and solar products industries.

See more in United States; China; Cybersecurity; Intellectual Property

Policy Innovation Memorandum No. 45 Authors: Edward Alden and Rebecca Strauss

Each year, U.S. state and local governments waste tens of billions of taxpayer dollars competing to lure or retain business investment, with little impact on business behavior. Edward Alden and Rebecca Strauss lay out incremental steps for curbing the subsidy war, beginning with greater disclosure and cost-benefit analyses, and building up to a multistate agreement that creates strong disincentives for continuing subsidies.

See more in United States; Economics

Research Links

Cybersecurity Policy

How can the United States protect cyberspace "control system of our country," without restricting the open "flow of information on the Internet"? What should countries consider when developing international cybersecurity standards and protocol? What should their citizens know to protect their information and their rights? Cybersecurity Policy Research Links provide news, background information, legislation, analysis, and international efforts to protect government and the public's information.

See more in United States; Cybersecurity; Internet Policy

Op-Ed

How to End State Subsidies

Authors: Edward Alden and Rebecca Strauss
The New York Times

Each year, state and local governments in the United States spend more than $80 billion, or roughly 7 percent of their total budgets, on tax breaks and subsidies to attract investments from auto companies, movie producers, aircraft makers and other industries. Edward Alden and Rebecca Strauss explore the possiblity of ending such compensation.

See more in United States; Tax Policy

Primary Sources

Global Change Research Act

The Global Change Research Act was mandated by Congress in 1990 to develop and coordinate "a comprehensive and integrated United States research program which will assist the Nation and the world to understand, assess, predict, and respond to human-induced and natural processes of global change." Every four years, the National Climate Assessment (also called Climate Change Impacts in the United States) reports scientific consensus on how climate change affects the United States, produced by experts from U.S. government science agencies and from several major universities and research institutes.

See more in United States; Climate Change

Op-Ed

Space Jam

Author: Micah Zenko
ForeignPolicy.com

Micah Zenko considers the prosaic, though important, matter of how U.S. civilian and military officials think about national security space issues.

See more in United States; Space