The Growing Problem of Extra-AUMF Threats
Nine years after it was enacted in response to the September 11 attacks, the Authorization to Use Military Force (AUMF) remains the primary basis for detaining and targeting terrorists who threaten the...
View ArticleThe Regulatory Provisions of the Cybersecurity Act of 2012
When I was younger, I didn’t like to eat my peas. So I always put them off for last, but eventually, I’d realize that it was something I had to do and … just do it. I feel a little like that in...
View ArticleUpcoming Brookings Events
I want to highlight these upcoming events at Brookings of potential interest to our readers in the D.C. area: Is there a Widening Sunni-Shia Schism? February 22, 2013, 2:00 PM – 3:30 PM EST,...
View ArticleA Moment of Zen from Yesterday’s Hearing
The thing kind of speaks for itself: Rep. Louie Gohmert: Thank you Mr. Chairman, and this is an exceedingly important topic. We do appreciate your being here today. Obviously the Justice Department...
View ArticleCarrie Cordero Compiles Alarm-Sounding Sequestration Comments
Carrie Cordero, Georgetown’s Director of National Security Studies and a former Justice Department official, writes in with the following useful compilation of administration warnings about the effects...
View Article