-
Over the past decade, military drones, whether weaponized or merely equipped for surveillance, have been at the center of many heated arguments, whether about targeted killing, counterterrorism, the supp...
-
The next in our series of book soirees at the Hoover Institution's Washington Office will take place on July 13, when Ben interviews Steve Budiansky about his new book, Code Warriors: NSA's Codebreakers ...
-
Event Announcements (More details on the Events Calendar)
-
PDF version
A review of To the Secretary: Leaked Embassy Cables and America's Foreign Policy Disconnect by Mary Thompson-Jones (W.W. Norton 2016)
***
-
Editor's Note: For those of us focused on the Middle East, the bad news seems unending: war, terrorism, poor governance, and other problems plague the region and stump U.S. policymakers. But the United S...
-
Britain’s decision to leave the European Union on Thursday night stunned the political establishment throughout the West. Zoe Bedell wrote a post on the legal and regulatory implications of Brexit.
-
Although drone warfare to date has overwhelmingly been analyzed in the context of US operations against non-state actors - Al Qaeda or affiliated groups or, more recently, ISIS - much of the impact of dr...
-
According to a statement issued today by the Russian Foreign Ministry (thanks to the OUP International Law Blog for flagging it), during the upcoming June 25, 2016 state visit of the Russian president to...
-
Assistant Attorney General John Carlin, who runs the Justice Department's National Security Division, has a new paper out in the Harvard National Security Journal entitled "Detect, Disrupt, Deter: A Whol...
-
Event Announcements (More details on the Events Calendar)
-
Editor's Note: Discussion of the Orlando killings has focused on the role of the Islamic State and the self-radicalization of so-called "Lone Wolves." The killings, however, also are an act of unspeakab...
-
Fred Kaplan joined me this week at the Hoover Book Soiree for a terrific discussion of his new book, Dark Territory: The Secret History of Cyber War: