-
Event Announcements (More details on the Events Calendar)
Monday, October 31st at 2pm: Michael E. O'Hanlon and Steven Pifer will discuss Nuclear Arms Control Choices for the Next Administration in an ev...
-
PDF version
A review of Jay Solomon's The Iran Wars: Spy Games, Bank Battles, and the Secret Deals That Reshaped the Middle East (Random House 2016).
***
-
Editor's Note: The United States cannot fight terrorism without allies, but these alliances bring with them new problems and at times make counterterrorism far more complicated, to put it gently. Clint W...
-
Benjamin Wittes outlined what FBI Director James Comey’s letter to Congress does and does not mean. He also shared the comments of former NSA and CIA director General Michael Hayden on Sean Hannity’s new...
-
This is a plug for a new cyber policy book out this month: Cyber Insecurity: Navigating the Perils of the Next Information Age, edited by Richard Harrison, Director of Operations and Defense Technology P...
-
PDF version
Review of David Priess's The President’s Book of Secrets: The Untold Story of Intelligence Briefings to America’s Presidents from Kennedy to Obama (PublicAffairs, 2016).
***
-
PDF version
A review of Mark Bradley's The World Reimagined: Americans and Human Rights in the Twentieth Century (Cambridge University Press, 2016).
***
-
Event Announcements (More details on the Events Calendar)
-
Benjamin Wittes argued for a non-partisan coalition of democratic forces to come together after the election to stand behind American democratic and legal institutions. He then outlined an agenda for how...
-
Lawfare is now accepting spring internship applications. For more details, check out the Brookings application announcement and apply here.
Overview:
-
Event Announcements (More details on the Events Calendar)
Monday, October 17 at 2pm: At the American Enterprise Institute, Roger F. Noriega will discuss Elusive Peace in Colombia with Juan Carlos Pinzon...
-
Editor's Note: Countering violent extremism (CVE) is a perfect sound bite, a magic wand to solve terrorism before it happens. Yet many programs initiated in the name of CVE are poorly designed, and some ...