Articles & Multimedia
Showing 861-880 of 3094 Publications
-
National Security Human Capital Program
Ignoring the National Guard is dangerousThe reliance on the National Guard to fulfill wartime personnel demands marks a transition from a strategic reserve to an operational reserve, in which the Guard meets similar...
By Nathalie Grogan
-
To Compete With Beijing, the Quad Must Remain Pro-Asia, Not Anti-China
The Quad must navigate the resulting complex set of regional attitudes toward the China-U.S. rivalry...
By Zachary Durkee
-
Why America Can’t Build Allied Armies
The United States’ partners are often uninterested in building militaries that can fight....
By Rachel Tecott Metz
-
Technology & National Security
The Right Way to Structure Cyber DiplomacyThe State Department is once again confronting the challenge of how to organize itself to cope with new international challenges — not those of wartime, but ones created by ra...
By Laura Bate & Natalie Thompson
-
Washington and Seoul Seek to Diversify the South Korea-US Alliance Through Cyber
The Biden-Moon summit signaled that Pyongyang will not continue to dominate all political aspects of the South Korea-U.S. alliance....
By Jason Bartlett
-
Robert D. Kaplan on why America can recover from failures like Afghanistan and Iraq
There they were in the flesh: wizened veterans of the Spanish-American War from 1898 marching a few feet away from me at the Memorial Day parade on Eastern Parkway in Brooklyn...
By Robert D. Kaplan
-
From Forever Wars to Great-Power Wars: Lessons Learned from Operation Inherent Resolve
It is important that the Pentagon does not relegate the lessons learned from its recent operational experience in the Middle East to the trash bin....
By Stacie Pettyjohn & Becca Wasser
-
Take Time to Judge Taliban’s Actions, Not Words
The United States and its like-minded partners must condition diplomatic recognition on the Taliban meeting human rights and counterterrorism standards....
By Lisa Curtis
-
Transatlantic Security / Technology & National Security
Sharper: The Future of European LeadershipWhen President Biden declared that "America is back," many European partners breathed a sigh of relief that the future may bring a much-desired era of stability—and predictabi...
By Carisa Nietsche, Nicholas Lokker & Anna Pederson
-
From Desert Storm to Inherent Resolve: The Evolution of Airpower
On June 27, U.S. fighter jets struck weapons storage facilities used by Iranian proxy groups Kataib Hizballah and Kataib Sayyid al-Shuhada in retaliation for launching drone a...
By Becca Wasser & Stacie Pettyjohn
-
From Ethnic Nationalism to Social Media: How North Korea Leverages Its Soft Power Abroad
North Korea continues to find creative ways to soften its negative image abroad through propaganda...
By Jason Bartlett
-
Mind the Gap: How China's Civilian Shipping Could Enable a Taiwan Invasion
The Chinese military now seems to be regularly practicing the execution of amphibious assaults with civilian shipping integrated into the operations...
By Tom Shugart
-
Indo-Pacific Security / National Security Human Capital Program
US waited too long to withdraw from AfghanistanThere was no good way for the United States to exit the failed war in Afghanistan....
By Paul Scharre
-
Defense / Indo-Pacific Security
The Taliban has seized more cities, despite U.S. efforts to build a strong Afghan military. What happened?U.S. security assistance fails when U.S. influence fails....
By Rachel Tecott Metz
-
Defense / National Security Human Capital Program
Sharper: The BudgetThe defense budget and its $715 million price tag accounts for much of the U.S. government's discretionary spending every year, but where will (and should) this money go in th...
By Anna Pederson
-
Indo-Pacific Security / Technology & National Security
Commercial satellites — not U.S. intelligence — revealed China’s missile programThe proliferation of commercial satellites has upended this near-monopoly on government intelligence gathering....
By Erik Lin-Greenberg & Theo Milonopoulos
-
Technology & National Security
Cuba Needs a Free InternetThe online tug of war between dictator and dissident is nothing new. But the nature of that war is changing, and tomorrow’s digital battles will feature greater decentralizati...
By Richard Fontaine & Kara Frederick
-
Technology & National Security
A Plan to Secure America's Supply ChainsSupply chain vulnerabilities are a central component of the global technology competition....
By Martijn Rasser & Megan Lamberth
-
Around the Table with Shaan Shaikh
Around the Table is a three-question interview series from the Make Room email newsletter. Each edition features a conversation with a peer in the national security community ...
By Shaan Shaikh
-
Indo-Pacific Security / Energy, Economics & Security / Technology & National Security
Hotels and Free Wi-Fi Are Sitting Ducks for North Korean CybercriminalsThe dangerous combination of weak or nonexistent cybersecurity protocols, relaxed travelers and employees, and increased e-commerce and digital financial activity provide an i...
By Jason Bartlett