menu

Topic:

International

Chinese Cyber Attacks Are Looting U.S. Private Sector

One issue that receives too little public attention is the blatant use of hackers by China to steal U.S. intellectual property, defense technology, and other data critical to national security and competitiveness. China is one of America’s biggest competitors, and they (hackers, Chinese corporations and the Chinese government) clearly have no problem penetrating U.S. public and private sector networks to leapfrog over the years of hard work and innovation. Are we not outraged?

Presidential Elections in Egypt and the "Arab Spring"

When looking at the developments of the last year and a half in the Middle East, it seems quite clear that the media was too quick to coin the term “Arab Spring” to describe the popular unrest and overthrow of regimes in significant parts of the Arab World. It would be more appropriate to refer to what is happening in the region as the “Islamist Spring” because it is creating unprecedented opportunities for Islamist political movements to finally grasp the reins of power, such as with the elections in Egypt. All of this, of course, has implications for the region and the United States.

Twitter, Terrorists and Turmoil

A recent Twitter exchange between the Taliban and the U.S. military shows how social media is evolving and how its current stage of development involves the use of Twitter to wage war on an ideological level. Over the past several years, social networking sites have become a catalyst for users to achieve political objectives. The U.S. Government and its security forces need to be constantly aware of how the enemy’s use of social media is evolving and proactively plan for ways to win the social networking battle.

The Dangers of Talking Too Much

People talk. That’s a fact. Whether at the water cooler, the fence post or on Facebook, people talk about almost anything and everything. Eventually though we all reach a point where what we really should do is just shut up. We’ve long crossed that point when it comes to intelligence and national security operations in this country. Lately there have been a truly disturbing number of very public examples that bring these conditions to light.

Protect Sources and Methods – The Threats from Intel Leaks

Like many Americans, I am concerned about the major intelligence leaks that have taken place over the past weeks and months. It i disturbing to see this kind of activity, particularly in time of war. The unmasking of Dr. Skakil Afridi, who helped bring Bin Laden down in Pakistan, and the significant reporting of the intricacies of cyber attacks against Iran’s nuclear program, makes me cringe.

Finding the Balance: U.S. Security Interests and the Arab Awakening

The Arab uprisings created significant opportunities to counter radical Islamist propaganda and leverage financial tools against violently repressive regimes. Yet, they have also strained the intelligence community’s resources, forcing agencies to shift personnel and reprioritize their collection and analysis efforts. The Washington Institute’s new compendium, “Finding the Balance: U.S. Security Interests and the Arab Awakening,” delves into these issues in depth.

Visa and National Security Seriously Impinged by Tourism Bill

Earlier this month, I testified before the House Judiciary Subcommittee on Immigration Policy and Enforcement on “The Welcoming Business Travelers and Tourists to America Act of 2011.” My testimony makes clear that while tourism is a valid goal, it cannot be done in an atmosphere where immigration law is not being enforced domestically, visa processing becomes a rubber stamping process, and the countries targeted have some of the highest overstay populations in the United States.

Leveling the Playing Field – Accelerating Counter-Terror Tech Procurement

While the United States successfully thwarted another attempted bombing of a domestic inbound aircraft by al Qaeda in the Arabian Peninsula, the disrupted plot should tell Americans two important things: our intelligence and security agencies are doing excellent work, and continued vigilance is the price of security. We need every available tool to combat and protect against terrorists, and this means speeding up the rate at which America procures and implements counter-terrorism technology.

The Iranian Security Threat in the Western Hemisphere: Learning from Past Experience

Director of National Intelligence James Clapper Jr. has noted some Iranian officials are now more willing to conduct an attack in the United States. Iran’s aggressive posture toward the United States, which suggests a heightened intent to target the homeland, is made all the more acute given Iran’s massive diplomatic presence in the Western Hemisphere.

The Unfortunate Evolution of Terrorists’ Bombs

The CIA’s recent success in interrupting an al Qaeda-inspired plot to destroy an airplane bound for the United States with a non-metallic bomb is an important victory for American security. It is also a harsh reminder that while many of America’s terrorist enemies are dead, jailed or on the run, others remain committed to turning the aviation system against us. What does that mean for America’s ongoing aviation security efforts?