The need for the military to make greater investments in technology is difficult if not impossible to separate from the risks posed by an increasing military reliance on this technology. Striking a balance between the two won't be easy.
Feb 4, 2019 The National Interest
The U.S. government must choose where to apply limited resources to defend soft targets. But it could expand its information-sharing efforts with other governments and local law enforcement. Broad intelligence sharing and more training could help identify potential attackers before they can execute their plans.
Jul 5, 2017 The National Interest
As the Islamic State in Iraq and Syria suffers defeats on the battlefield, it is expanding its cyber presence to continue to encourage attacks abroad. The more the group relies on cyberspace, the more likely it will expose important segments of its organization to detection and disruption.
May 30, 2017 The National Interest
Today's terrorist networks will multiply far beyond the wars in Iraq and Syria. When one conflict ends, these fighters often join another. It is critical they be denied safe haven and the ability to train and network in ungoverned territories.
Mar 14, 2017 The National Interest
ISIS is a worthy candidate for eradication, but failing to also target its franchises, al-Qaida splinters, and other non-aligned groups in the Middle East, Africa, and South Asia could allow other threats to metastasize.
Feb 9, 2017 Defense One
Most parties have been on the losing side of the war in Syria. Meanwhile, Lebanese terrorist militia Hezbollah has cemented its status as a regional power player. The group has gained fighting experience and benefited from a growing alliance with the Assad regime, Iran, and Russia.
Jan 30, 2017 The National Interest
The United States should continue to pursue international cooperation in cyberspace, improve its ability to identify and expose the sources of attacks, and improve its oversight of the development and adoption of cyber-related technologies.
Dec 22, 2016 Defense One
Whether or not Jabhat Fateh al-Sham's new name means a genuine break from its parent organization al Qaeda, the mere rebranding could prolong Syria's civil war. The worst-case scenario is that the group could embed itself within the rebel opposition in Syria the way Hezbollah did in Lebanon.
Aug 25, 2016 Reuters
Because the U.S. cannot afford to prioritize and defend against every possible threat, it must accept risk with each decision. And the more adaptive the adversary, the more likely it will confound readiness investments made previously to confront it.
Aug 10, 2016 Defense News
Would counterterrorism forces be better served by containing terrorist groups instead of attempting to destroy them? Dismantling and destroying the Islamic State and similar organizations is a worthy strategic goal, but policymakers must also be prepared to limit the effectiveness of splinter groups as they emerge in the aftermath.
Jul 12, 2016 The Washington Post Monkey Cage Blog
Focusing on one type of threat or the other — whether state or non-state in its general nature — is becoming a less tenable option as the United States considers how to assess and improve its military readiness.
Jul 12, 2016 Defense One
ISIL has been forced out of 56 places it once controlled, including five major cities. Taking its territory and diminishing its brand is required to reduce the group's operational capacity for carrying out or influencing local or distant attacks.
Jul 8, 2016 The National Interest
The Islamic State's loss of territory, money, and recruits would seem to demonstrate significant progress by the U.S.-led coalition. But if there is one accepted truism in the battle against the group, it is that its leaders intend to fight to the death to establish an Islamic caliphate.
May 23, 2016 Reuters
Megacities are urban areas that seep into one another and have more than 10 million inhabitants. To counter violent non-state actors operating in megacities in the future, the U.S. military will have to be able to piece together a comprehensive and actionable intelligence picture, and under enormously challenging circumstances.
Apr 6, 2016 Reuters, The Great Debate blog
Some notorious cyberattacks have been carried out by computer-savvy teens. They don't all have criminal intentions, they just have a particular aptitude for writing code and operating in cyberspace. The U.S. military should consider embracing and cultivating this pool of talent.
Mar 10, 2016 U.S. News & World Report