menu

Topic:

Counter Terrorism and Defense

A Bitcoin For Your Thoughts

Bitcoin is a new digital currency. The Cyber age has vastly changed our day-to-day relationship with money, and Bitcoin is here to stay in some shape and form. But is it real money? The bottom line is simple: as people accept Bitcoin as a means of exchange for goods and services, then it’s a currency.

A New Year’s Hope for CFIUS

The Committee on Foreign Investment in the United States (CFIUS) is an increasingly robust regulator of foreign investments in U.S. businesses, policing these investments for possible harm to national security. But which investments? CFIUS reviews “covered transactions” that might adversely affect national security. If that’s unclear to you, you’re not alone – but you might be at risk.

NSA Intel Gathering and the Privacy v. Security Conflict

It seems like not a week goes by without yet another report on the NSA’s digital intelligence gathering activities. Understanding what the NSA is up to deserves a robust and nuanced public discussion. The agency’s activities raise challenging questions about just how much privacy Americans are willing to sacrifice in the name of security and counterterrorism.

Johnson Nominated for DHS Secretary – What Does That Tell Us?

The anticipated nomination of Jeh Johnson to become the fourth DHS Secretary is welcomed news almost any way you look at it. Johnson’s prodigious resume and professional history is being chronicled by the homeland security, defense and legal establishment writers. Most of those stories will focus on Johnson’s past experience at the Pentagon, but here are the five most pressing issues he ought to address in his confirmation hearing, as well as his tenure as Secretary (should that occur).

Foreign Buyers Beware – Dismissal of CFIUS Challenge

The United States might look less welcoming to foreign investment these days. The Committee on Foreign Investment in the United States (CFIUS) has ceased operations temporarily. Foreign investors seeking the “safe harbor” that CFIUS approval confers will have to wait until CFIUS resumes operations in order to close acquisitions of U.S. companies.

Cyber Space – A New Age, A New Way

As I kid, I loved Superman. Able to leap tall buildings in a single bound. Hiding his identity like a spy. But who was he? “It’s a bird? It’s a plane? No, it’s Superman.” The reason I bring up this dusty piece of nostalgia is my mind drifts toward it every time I hear someone […]

Is Al Qaeda in Yemen Becoming More Dangerous?

As the United States and other world powers weigh the risks and rewards of a strike against Syria, there are rising concerns that destabilizing the Assad regime could give extremists – particularly al Qaeda – an opening to gain strength and weapons. The embassy closures earlier this month threw a spotlight on al Qaeda in the Arabian Peninsula (AQAP), with some suggesting the terrorists in Yemen are more powerful than ever. So are they?

Entering the Era of Homegrown Violent Extremism

As the United States enters another chapter in the ongoing effort to protect U.S. citizens and assets, the phenomenon of homegrown terrorism is likely to take center stage, requiring a new approach and perspective toward homeland security. This is the subject of Homegrown Violent Extremism, a new book from counterterrorism expert and fellow Security Debrief contributor Erroll Southers.

Do We Have Options In Egypt?

Media coverage of the overthrow of the Muslim Brotherhood (MB) government in Egypt by the military has generally been lopsided and focused on the military’s various violations of human rights. Americans often believe that every conflict involves “good guys” and “bad guys.” I would argue that we have to stop looking for good guys where we are not likely to find any and instead focus on our interests, which are to support the army in its efforts to stabilize Egypt.

NATO Meeting to Address Alliance Cybersecurity and Defense

At the beginning of June, NATO held the first Alliance meeting of ministers dedicated exclusively to the subject of cyber defense. this comes at a time when countries are strapped for funds and citizens have little appetite for additional defense expenditures. In the months ahead, NATO will decide how to support members that are the target of cyber attack and request aid. As always, the real test resides in the manner and extent to which agreed-upon principles are operationalized.