Bad Guys Aren’t Stupid - They’ll Exploit TSA Cuts

March 14, 2017 | Mackenzie Weinger
Photo: iStock.com/martince2

The Trump administration is reportedly eyeing cuts to the Transportation Security Administration and other Department of Homeland Security agencies in an attempt to pay for President Donald Trump’s proposed wall along the U.S.-Mexican border. A draft plan by the Office of Management and Budget (OMB) would slash TSA’s funding about 11 percent to $4.5 billion, according to The Washington Post.

A recent Reuters report said DHS has estimated the Trump’s wall — a series of fences and walls — will cost up to $21.6 billion. The OMB budget proposal would hike the overall DHS budget 6.4 percent to $43.8 billion, with Trump’s wall receiving $2.9 billion, $1.9 billion going to “immigration detention beds” and Immigration and Customs Enforcement expenses, and $285 million designated to hire more Border Patrol agents and ICE staffers as TSA, the Coast Guard, and FEMA face significant cuts, the Post reports.

The Cipher Brief’s Mackenzie Weinger spoke with former TSA Deputy Administrator John Halinski to discuss how the potential budget cuts at the Agency would impact counterterrorism efforts, and what it could mean for national security.

The Cipher Brief: According to reports, the proposal would cut TSA's budget about 11 percent. What could an 11 percent budget cut to TSA mean for national security?

John Halinski: From what I’ve seen of the DHS, I don’t want to say they’re robbing Peter to pay Paul — but they are, really. A lot of the cuts are coming to pay for immigration control, which I understand, and there’s a threat vector that bad guys use across the border. The problem is the aviation sector. It’s a very cyclic sector when it comes to threat. After 9/11, what happened was you had a huge impact to the aviation security world, the U.S. created TSA, they put into place the Aviation and Transportation Security Act, and then things calmed down for a bit, for about three or four years.

The problem is the bad guys are fixated on the aviation sector because they know, one, it can instill terror — because people, naturally, have a fear of falling out of the sky — but two, you also have lots of people in locations jammed together with less than what you would call fortress-type security. The airports certainly aren’t a fortress, they’re commercial venues, as are the airlines. So what you saw was they tightened up the ability for the threat to get on the airplane with knives and guns and things like that. The bad guys in 2006 to 2010 shifted, and their whole thought process was, “Ok, we can’t get on with guns and knives, but what we can get on with is explosives.” Whether that’s a nonmetallic explosive in an underwear bomb or an explosive in a printer, they shifted. And what happened is you suddenly saw a huge increase in the budget for the aviation sector — TSA was given a billion dollars to spend on the body scanner and to tighten up rules for the cargo and things like that.

So you mitigate the first threat, you mitigate the second threat, but unfortunately, the threat is very industrious. They’re not stupid. They change their tactics based on the vulnerability of what they perceive. The vulnerabilities now, after another three- or four- or five-year cycle, are the use of the insider threat and then attacks against the airport itself. They’ve changed again.

Here’s my fear: If you don’t keep a steady medium, if you slash budgets with the idea we can do it better or we can do it smarter, and you don’t take into account the shifting threat, then you’re going to run into problems. What will happen is there will be an event, and they’ll turn around and they’ll beef up the budget.

TCB: What do you make of the reports of the administration's approach seeming to weigh major cuts to TSA in order to try to fund Trump's border wall?

JH: I look at what they’re doing with CBP and ICE — and they have a really tough job — and where in the past they’ve instilled a lot of money in the aviation sector, they’re instilling it now in CBP and ICE. Here’s the problem with that: You’re beefing up one area of DHS and reducing it in another, and the bad guys aren’t stupid. They look where the holes are, they look where the vulnerabilities are, and they attack those. The better approach is a more measured approach without drastic cuts in any of the DHS agencies. All it’s going to take is one major incident with FEMA, a Hurricane Sandy or something like that, or a plane blowing out of the sky.

TCB: According to the reported proposed cuts, a number of programs are up for potential elimination — the "armed pilot" program to prep pilots for an attempted takeover of their plane, Visible Intermodal Prevention and Response (VIPR) teams that deploy at transportation hubs, the Behavior Detection Officers (BDO) program and grants for local law enforcement to patrol in and around airports. How would you assess these possible cuts?

JH: They’re talking about cutting manpower, which is the easiest thing to do. The air marshal program, the Federal Flight Deck Officer Program, and the behavior detection officers. I’m a big fan of behavior detection. There are a large number of critics of TSA, and they always bring up the question, particularly with the BDO program, “How many terrorists have you caught?” And you can’t demonstrate the metrics.

My answer to this is always, and I’ve said this on the Hill, is the job of TSA is not to capture terrorists. Their job is to ensure the security of the transportation system, which means mom and pop and the kids get on the plane at DCA and fly to Disney and come back, it’s not blown up out of the sky, and nobody’s injured. It’s a very hard metric to quantify and qualify the behavior detection program, the VIPR program, and a number of these things. The analogy I always use is the spider and the fly — a spider that spins a single strand is never going to catch the fly. The spider that has a very strong web, has multiple layers of security that are interactive and complement each other, they have more strength and they’re going to get what they want — the fly. In the case of TSA, multiple layers of security is not about catching the terrorist. It’s mitigating the threat to ensure that the security of the system is protected.

If you look at those programs, they’re easy to cut because they’re high-dollar programs and what they really involve are people. So what they’re talking about is cutting a ton of people from the system.

Once you start cutting that, you have basically, except for the cockpit door, reduced that last element of protection for people in the air. They’re talking about cutting the Federal Flight Deck Officer Program — TSA several years ago started a program where the air marshals trained a large number of pilots, who volunteer for the program, how to shoot, and basically those pilots on those flights carry a weapon in the cockpit, and that’s a last measure. If you cut the air marshals and then you’re cutting the program where pilots have the training and authority, there is no last ditch effort at the airplane except for a hardened cockpit door. I’m not sure they’re looking at it from a threat perspective. It’s plain numbers and budget.

The other program they’re talking about cutting that I’ve seen is the VIPR program. I personally find it to be a very good program for a number of reasons, particularly to mitigate the insider threat. The VIPR program is based on threat, and there’s no pattern to it.  The VIPRs are made up of, usually, local PD, federal air marshals, behavior detection officers, and sometimes bomb dogs. You see them sometimes at the metro stations, you see them at the airports walking around. When you’re talking about security, one of the most effective security measures you can do is visible deterrence. And visible deterrence that’s unpredictable mitigates the insider threat.

The targets that are out there now — when you look at Brussels, what scared me is they went in and they hit the metro, they hit the metro in Paris before, and in other places. If they don’t believe there is any kind of security at all in these areas, then you are increasing the threat vector against those targets. And to cut the VIPR program, “Okay, I’m going to cut all these guys out because they really don’t show their worth.” Their worth is they’re a deterrence. Deterrence is just as effective in the security world as screening or vetting or other measures.

The last program is very controversial. Some people have always found the behavior detection program offensive because they claim it’s profiling. It has cost a billion dollars, they’re in every airport. But it gives them the ability, using a scorecard, to look at factors to determine the risk for extra screening. That’s it. We’re talking about facial tics or somebody who is sweating profusely, or somebody who they go and ask a question to and who is not looking directly in the person’s eyes or their eyes are shifting. There are a number of behavioral traits that are categorized, and these individuals are trained, and there is a scorecard that’s used. But what is used in Miami may be a little bit different than what’s used in Alaska because of the anomalies of the culture. People don’t like it because it’s profiling, which they say is a dirty word, but in the security world, you get a sense of when something is not right or someone is doing something suspicious. And they work with CBP and ICE all the time and catch people carrying money and drugs, which isn’t in their charter. All of these things are very metrically difficult to quantify for appropriators.

This is my concern from a budgetary standpoint — if you focus on individual programs and decimate those individual programs and don’t look at the total security layered system, then what you’re doing is key layers in key areas will be gone from that system. That will reduce the overall capability of the system, number one. Number two, the bad guys are very smart. The threats to the aviation sector now are much, much greater than they’ve ever been because of the diversity of the vectors of threat against aviation, ranging from hijacking to attacking the airport to the insider threat. And you have the more technical ones that are just evolving now, drones around airports, cyberattacks against the aviation system, the use of lasers against pilots during landing and takeoff.

The threat vectors have increased, they’ve become much more diverse and innovative. I’m not saying that TSA couldn’t have its budget reduced, I’m a realist, but when you make the cuts, they should be based on threats, most importantly.

TCB: What would make you feel more confident that the budget was decided in the context of these threats, and are there any other recommendations you could give regarding TSA more broadly?

JH: One of the concerns I have with TSA is they’re a regulator, and they seem to be much more responsive to the people they regulate than the regulations themselves. They’re more worried about, say, I have an exceptionally long line at this airport today so I’m going to stop this program, or I’m going to institute a program that speeds up the trains going through the system, and holding off on taking new technology that reduces the human factor. What I would like to see from a budget standpoint is that when they’ve considered these cuts, they were based on thorough analysis of the threat vectors against the aviation system.

I’m really heartened to see [ret.] Gen. John Kelly at DHS — having been at SOUTHCOM, he knows how to work with law enforcement, the military and civilians. I’m really happy to see him in that position. But it’s very important if they’re going to cut that budget at TSA that they name an Administrator. It’s important to have a political appointee in charge of the agency because that political appointee is tied into the administration.

When you just have career, government people in an agency with no direct ties to the administration, that’s a formula for trouble. You need to know what the President is thinking, what his NSC staff are thinking, and in these big components like CBP, ICE, TSA, if you’re not a political appointee, you know that you’re not going to be able to push anything with the group on the Hill or in the White House because you’re always going to be considered an outsider. The sooner they get an Administrator at TSA, the better it will be for the system. And it’s not that the people who are there now are not capable, it’s that they need that political top cover and the protection to be very effective. The best service they could do right now, particularly if they’re talking about slashing budgets, is to put someone in that spot that has access to the White House and understands the desires and intentions of the White House.

The problem is always trying to find somebody who will take TSA. TSA is that agency that people love to hate. Besides the IRS, TSA is the most vilified agency in the U.S. government. It’s that agency that reaches out and touches two million U.S. citizens a day. I used to say if I didn’t have five YouTube moments by four o’clock, it was a lucky day. Just the way it is.

Mackenzie Weinger is a national security reporter at The Cipher Brief. Follow her on Twitter @mweinger.

Next Steps in U.S.-Cuba Relations
Strengthening U.S. Cyber Defenses
Russia Sanctions: The New Normal
Corruption in China: The Party’s Over
Change in the Kingdom: Three Big Shifts
Managing Information & Risk in the Digital Age
Endgame in Afghanistan
The Convergence of Crime and Terror
Strengthening the Public-Private Partnership
The Billion Dollar Spy: An Interview with Author David Hoffman
The New Battlefield
North Africa: Instability Increasing
The Kidnapping Capital of the World
Homegrown Terror in the Age of ISIS
The Refugee Crisis: Europe on the Brink
The Future of Mexican Oil
Cracks in the System
Embassy Security Three Years After Benghazi
Fourteen Years Later
Can Congress Solve the Cybersecurity Problem?
Arctic Game Changer?
Where They Stand on National Security
The First 100 Days
Worthy of Fleming: Anthony Horowitz's "Trigger Mortis"
At the Crossroads
Eye in the Sky
Rough Road Ahead for Rousseff
Leveling the Playing Field: Tech Access in China
The Dead Drop
Top of Mind for Chief Security Officers
Protecting Your Business
The Future of Oil
Chinese Expansion in Latin America
American Involvement in Syria
The Future of Geospatial Intelligence
The Umbrella Movement: One Year Later
Ebola: An End in Sight?
The Pakistan Problem
The Dead Drop
The Encryption Debate
Going Dark
The US-Mexico Relationship
The Rise of Mobile Technology in Africa
The Dead Drop
Construction Boom in the Gulf
Cybersecurity: The Human Factor
Beijing and the South China Sea
Will Peace Talks Succeed in Colombia?
Social Media and Terrorism
The Rise of Israel’s Tech Sector
Securing the Border
Red Sun Rising
The Dead Drop
Adopting the Iran Deal
Stability on the Peninsula
Crime in South Africa
Combatting Terrorist Financing
The Dead Drop
Recovering from a Cyber Attack
Stability in South Asia
Veterans Day
Israel’s Wave of Violence
The Dead Drop
Protecting Critical Infrastructure
ISIS on the March
The Paris Attacks
Rethinking U.S. Security Assistance
The War on Terror 2.0
Putting Mali in Context
Will Russia Ever Change?
Will Canada Pull Back?
Understanding Putin’s Popularity
Chinese Expansion in Africa
Terrorism Finance and Wildlife Poaching
Illicit Trafficking in Latin America
Climate Change and Security
Preventing Another San Bernardino
Supply Chain Security
Negotiating a New Safe Harbor Agreement
The Battle for Yemen
Foreign Tech Access in China
The Dead Drop
Offensive Cyber Operations
Travel Security in the Age of ISIS
Iran: A Rising Cyber Power?
The Future of Cybersecurity
The Arab Spring Five Years Later
Preparing Today’s Military for Tomorrow’s Wars
Cybersecurity for Small and Medium-Sized Enterprises
Maritime Security in the Gulf of Guinea
Improving Aviation Security
The Dead Drop
Terrorism in 2016
Cybersecurity in 2016
The World in 2016: Opportunities and Risks
China in 2016
Russia in 2016
Moscow’s Cyber Buildup
The China-India Relationship
Russian Influence in Latin America
The Future of Homegrown Terrorism
Stability in Sub-Saharan Africa
Protecting Your Digital Identity
Elections in Taiwan: A Turning Point?
The Caliphate of Crime
Biotechnology’s Dark Side
Rethinking U.S. Strategy Toward China
The Evolution of Weapons of Mass Destruction
A New Era in US-Iranian Relations?
Will Information Sharing Improve Cybersecurity?
Evaluating China's New Silk Road
Tech in Latin America: Opportunities and Challenges
The Destruction of Libyan Oil
Ransomware: Protecting Yourself from Cyber Extortion
The US and India: Strengthening Security Cooperation
Security and Stability in Afghanistan
Combatting the Al Shabaab Threat
Sports Security: Protecting Your Venue
Israel’s Arab Alliance: A Counter to ISIS and Iran?
The End of U.S. Space Supremacy
The Caucasus: Instability Increasing
Stabilizing Iraq
The Trans-Pacific Partnership: Deepening U.S. Commitment to Asia
Securing Industrial Control Systems
The Battle for Ukraine
Defeating Boko Haram
Jordan: The Indispensable Ally
China’s Military Modernization
The Cybersecurity Skills Shortage
Solving Mexico’s Violence Problem
The Northern Triangle: The Most Violent Region in the World
The Future of the Middle East
Terrorism in the World’s Largest Muslim Country
The Rise of Quantum Computing
Europe’s Terrorism Problem
Stability in the East China Sea
The Rise of Counter-Drone Technology
The ISIS WMD Threat
Healthcare and the Cyber Threat
Security in the Indo-Pacific: Australia’s New Role
Countering ISIS' Message
Containing the ISIS Cancer
Security, Privacy, and the Fight Over Encryption
Taking Aim at Smart Guns
Losing Patience with North Korea
The Difficult Road Ahead for Colombia
The Taliban Resurgence
ISIS: The New Face of Global Jihad?
Connecting with Latin America
Russia and China: Mutually Assured Detachment
The Scourge of Terrorism
The Security Challenge of Terror
European Unity in the Face of Crises
Developing Enhanced Cybersecurity Systems
Pakistan: Friend and Foe?
Egypt’s Economy on the Brink
Tehran’s Balancing Act
Russia Makes Moves in the Middle East
Kenya’s Battle with al-Shabaab
Missile Defense in the Korean Peninsula
Are America's Ports Secure?
The Human Factor Behind the Panama Papers Leak
Russian Military Modernization
APTs: The Boogeymen of Cybersecurity
Vietnam: Guns and Butter
Syria: Power-sharing, Partitioning, and the Fight Against ISIS
Turbulence in Turkey
The U.S. and the Philippines: Shoulder to Shoulder in the South China Sea
The Darker Side of the Internet of Things
Cybersecurity Challenges in Asia
Taliban on the Offensive
Quagmire in Yemen
Cocaine and Conflict in Colombia
The Cloud: Nebulous, but Nimble
Censorship in China
An Emerging Crime-Terror Nexus in Europe
IRGC: Iran's Power Player
Latin America: The New Frontier for Cyber Attacks
The Hydra and the Snake: The Death of Osama Bin Laden
Nuclear Deterrence and Assurance in East Asia
Vehicle Cybersecurity: Running in Place
What Drives ISIS
Tensions Simmer in the South China Sea
Managing the Mobile Phone Malware Threat
Leaving the Oil Spigot Open
Burundi: A Path Toward Civil War?
The Value of Special Operations Forces
ISIS in the Balkans
The Tech Must Flow
North Korea’s Party Congress: What was all the fuss about?
Argentina: A Smoother Ride
Libya: Obama’s “Worst Mistake”
Tsai Ing-Wen’s Balancing Act
The North Korea Workers’ Party Congress and Kim Jong-un’s Legitimacy
Flying the Unfriendly Skies: Airline Security
Nuclear Standoff in South Asia
How to Read Riyadh
Even in Defeat, Austria’s Far-right Emulates Populist Growth in Europe
More Effective, Less Secure: The Cyber-Threat to Medical Devices
A New Era in the U.S.-Japan Security Partnership
Passing the Torch to the Next Generation of Saudi Leaders
U.S. Military Aid to Egypt Continues Despite Democratic Struggle
How Secure are Radiological Materials?
Roadblocks on the Path to Normality in Iran
Caracas in Crisis
Algeria: Exporting Stability
The Push for Kurdish Independence
U.S. and China: Strategic Cooperation at Arm’s Length
City Life: Living Smarter, Not Harder
Homegrown Terror in Orlando
A Rough Patch in U.S.-Saudi Relations
Japan’s “Abenomics”
A Tale of Two Bears: The DNC Hack
The Origins of Brexit
The Chinese Communist Party Under Xi Jinping
The Arctic: Technology and Infrastructure on Earth and in Space
Jordan: Stability Amidst Chaos
Exporting Jihad: Bosnia and Kosovo
Changing World Order: The Effects of Brexit
Navigating Uncharted Waters
Iraq after ISIS: Divide it or Fix it?
Terrorism in Istanbul: Severe Implications
North Korea as a Cyber Threat
One If By Air, Two If By Sea: Unmanned Surface Vehicles
The FBI’s Intelligence Mission
Does NATO Need a New Ideology?
Philippines v. China: Laying Down the Law of the Sea
Is Turkey Returning to a Policy of “Zero Problems?”
Federal Cybersecurity One Year After the OPM Breach
NATO: Weathering the Storms
The Rise of the Fringe: A Threat to Democracy?
Hezbollah's Many Faces
Trans-Pacific Trade Deal Remains in Limbo
The Aftermath of the Nice Attack: Is ISIS’ “Prestige” on the Rise?
Crossing the Line: A Failed Coup in Turkey
France’s Vulnerabilities in a Changing Terror Landscape
The Problem with Proxies
Water Security in South Asia: Running Dry and Running Out of Options
The Clash over Social Media Data
Extremist Groups Target Diversity in Bangladesh
Kenya: Private Sector and Government Coordinate on National Security
The ISIS-Al Qaeda Rivalry
Will Syria’s Most Productive Citizens Ever Return Home?
Trust but Verify: The United States, China & Economic Espionage
The World is Watching: The American Election and China
The Status Quo Will Not Work in South Sudan
Kurdistan as a Geopolitical Playground
Rio Olympic Games: A Missed Opportunity
Spinning Silk: Asia and the GCC
China-Japan Relations: Trading Goods While Exchanging Words
Climate Change in Ethiopia: Managing the Risks
Mounting Security Challenges in Afghanistan
Is There a Future for the Muslim Brotherhood in Egypt?
Niger Delta Militants Compound Nigeria’s Security Crises
Thailand Under the Junta
Brazil: Getting its House Back in Order Post Olympics
Indicators of Political Instability
Finding Water in the Desert: Water Security in the Middle East
The Blurring Line Between Cyber and Physical Threats
The World is Watching: The American Election and Russia
NATO’s Ambiguity on the Red Line for Russia
Boko Haram: The Plague Affecting Nigeria and Beyond
Tunisia: From Revolution to Governance
Russia, China, and Cyber Espionage
Best Of: The F-35 Joint Strike Fighter: Game-Changer or Procurement Nightmare?
Climate Change Jeopardizes National Security
Algeria: A Bulwark Against ISIS
Venezuela's Military: Both a Stabilizing and Destabilizing Force
Will Theresa May's Britain Stay Committed to European Defense?
America and the Asian Infrastructure Investment Bank
What’s at Stake in the South China Sea?
Fifteen Years After 9/11: Much Accomplished, Much to be Done
The Post-9/11 U.S. Military
The Post-9/11 U.S. Intelligence Community
South Africa: ANC Losing Its Grip on Power
The World is Watching: The American Election and Saudi Arabia
Turkish Leverage Over the United States and European Union
Nuclear North Korea: A No-Win Scenario?
Insider Cyber Threats: A Pressing Problem Facing Business
Al Shabaab: A Persistent Threat
Unease, Uncertainty, and Strife: Global Inequality and Instability
Europe Bears a Big Burden in the World's Migration Crisis
Malicious Cyber-Actors in the Financial Services Industry
China's Ongoing Struggle to Clamp Down on Terrorism
Growing Instability in Africa’s Top Two Oil Producers
The World is Watching: The American Election and Iran
Dollars and Sense: Military Spending During an Economic Downturn
Forewarned is Forearmed: Confronting Adversaries in Cyberspace
Is Peace Possible in Colombia?
The Rise of Hypersonic Weapons
Nuclear No First Use: Ambiguity vs. Clarity
Al Qaeda Growing Stronger By the Minute
Cyber and the Law
The DRC: Strong Grip on Power, Weak Handle on Governance
Combatting Haqqani Network is Key to Afghan Strategy
War and Peace: Syria and the Question of American Intervention
The F35: A 21st Century Coalition Asset
Objective: Mosul
Where is Duterte Leading the Philippines?
Great Power Politics in Latin America
In the Strait of Hormuz, Little has Changed with Iran
Corralling the Cartel: OPEC and Oil Prices
Russian Hacking: The Difficult Path Between Inaction and Escalation
Philippines' Duterte Leaves U.S. Policymakers "Baffled"
The World is Watching: The American Election and Germany
Can Hamas Elections Shift the Status Quo?
What is the Future of U.S. Policy in Latin America?
Conflict and Common Goals: the Government and Silicon Valley
Kashmir in Crisis—Again
Al Qaeda in Syria: The Split That Wasn't
EU and U.S. Interests in Hungary in Jeopardy
The Price of Turkish Posturing in Iraq
Is it Possible to Hack the Vote?
Decision Day in the U.S.: Daunting Security Challenges Ahead
The State of Play in Syria
Modi: Modernizing India
Trump's Win Creates Uncertainty in Europe
The Powers and Pitfalls of Drone Warfare
Insurgent Use of Unmanned Aerial Systems: A Cat-and-Mouse Game
The African Migrant Crisis: The EU Takes Action
The U.S. Military: Ready or Not?
Sisi, the IMF, and Egypt's Crumbling Economy
Can Robots Fight Wars? The Future of Lethal Autonomous Weapons Systems
The Global Debate Over the Legality of Drones Continues
Agility and Innovation in the Third Offset Strategy
China's Economy: Great Power, Great Responsibility
Identity in Cyberspace: The Advent of Biometrics Authentication
Obama's Legacy on Russia and China: Making the Grade
Sweden, Finland & Norway Deepen Defense Ties with the West
Developing and Sticking With a Clear Strategy in Afghanistan
Italy’s Choice: Damned If You Do, Damned If You Don’t
Predicting the Future: Anticipating Security Events with Data Analytics
Russia’s Energy Leverage Wanes in Parts of Europe
The U.S.-Japan Alliance: A Safe Harbor
President Obama's Counterterrorism Legacy
Dialing Up Controversy with China
China Officially Ties Internet Restrictions to its own National Security
Trumping Trade: Alternatives to TPP
The International Criminal Court, Under Pressure, Turns Eyes on U.S.
Egyptian and Israeli Cold Peace Has Never Been Warmer
Trump, Russia, and the CIA: Allies and Adversaries Confused
Hacking Against Cybercrime: The FBI's New Approach
Trumping Trade: The Future of NAFTA
Violence in Mexico Surges
Directed-Energy Weapons: Time to Focus
At the Crossroads Between East and West: Turkey and the World in 2016
The Perils of Connectivity: Cyber Insecurity in 2016
The Party Endures: China and the World in 2016
Cracks in the Union: Europe and the World in 2016
Eyes on the Kremlin: Russia and the World in 2016
Terrorists Don't Have to Win - They Just Have to Survive: Counterterrorism in 2016
A Perennial Task with No Finish Line: U.S. Defense Planning and Procurement in 2016
A Changing of the Guard: U.S. Counterterrorism Policy
Poland: Strong Defense Partner But Taking Undemocratic Steps
Land, Sea, and Air: U.S. Military Readiness in the Navy and Marine Corps
Syria's Tangled Trilateral Road to Peace
The UK’s New Surveillance Law: Security Necessity or Snoopers’ Charter?
South Korea’s Foreign Policy: Leaderless, but Not Rudderless
Jammeh to Cede Power, Leave The Gambia
Mali’s Instability: Advantage, Al-Qaeda in the Islamic Maghreb
Railguns: The Fast, the Furious—and the Future?
Swarming the Battlefield: Combat Evolves Toward Lethal Autonomous Weapons
Mixed Signals to Moscow: The Trump Administration's Russia Policy Puzzle
NATO’s Changing Face Under the Trump Administration
South Korea’s Presidential Crisis: Is Democracy Stuck in Park?
Power and the U.S. Presidency
Trump's Hour of Action: Recommendations for Cyber Policy
Passing the ‘Football’: The Future of U.S. Nuclear Policy
The Baltics Up the Ante in Defense
Take It or Leave It: The Future of the Two-State Solution
Trump and Trudeau: Fire and Ice
Cybersecurity in the Gulf: The Middle East's Virtual Frontline
Little Margin for Error in South China Sea Policy
Eritrea: A Potential U.S. Counterterror Partner
Trump Administration Faces Daunting Challenges in Afghanistan
The New Space Race
Autonomous Hacking Bots: Menace or Savior?
Myanmar’s Rohingya Crisis – Fertile Ground for Jihadis in Southeast Asia?
Cuba Lingers in Limbo
Designating the Muslim Brotherhood As Terrorists Is Complicated
Trump and the New Map of the Middle East
The New Technology of Humanitarian Assistance
Missile Defense: Blocking Threats or Blocking Diplomacy?
Flynn Controversy Raises New Questions
Doubling Down Against the Jihadist Message
Civilians and the Military Under Trump
The Gulf Cooperation Council Operates in a Tumultuous Region
DIY Defense Tech: More Countries Seek Advanced Homegrown Weaponry
The Vice Closes on Mosul: What Next?
U.S. Marines Head to Norway and Australia
Cyber Proxies: A Central Tenet of Russia’s Hybrid Warfare
The Future of Transatlantic Defense: More Europe
Trump’s NSC: A Bureaucratic Balancing Act
Tallinn Manual 2.0: Stepping Out of the Fog in Cyberspace
Defining Objectives for the U.S.-Iran Relationship
The U.S.-Japan Alliance: Reform and Uncertainty
India’s Cyber Potential: A Bridge Between East and West
Missile Defense: Targeting a Technological Solution
NATO Zeros In on Black Sea Security
Vying for Power in Iran
The TPP Without America
Disentangling the NSA and Cyber Command
The United Nations at a Tipping Point
Developing Special Operations Forces in China and Russia
Hawala Networks: The Paperless Trail of Terrorist Transactions
Objective: Raqqa
The Baltics: Veterans of Russian Cyber Operations
Security Concerns Complicate Investment Opportunities in Mozambique
What Is the “Deep State”?
Al Qaeda Takes Advantage in Syria
The War of Words Between Europe and Turkey
Jumping the Air Gap: How to Breach Isolated Networks
Sizing Up the Trump Defense Budget
Brexit Begins: Hurdles to a UK-EU Deal
India-Israel Relations: An Opportunity That Can’t Be Missed
Why Syria’s Kurds Are America’s Key Ally
China Pivots its Hackers from Industrial Spies to Cyber Warriors
Putin vs. The Unknown
Germany, Japan Strengthen Defensive Capabilities
The Long-Goodbye to Afghanistan – Should It Get Longer?
Turkey’s Referendum: The Dangerous Road to “Yes”
Trump Draws the Line in Syria
EU Economic and Military Investments in Africa Increase
Trump-Xi Summit: No Real Progress Yet, but Stay Tuned
The Zero-Day Dilemma: Should Government Disclose Company Cyber Security Gaps?
Stepping into the Void of Trump’s Global Retreat
Al Qaeda Quietly Expands in South Asia
Chinese Firms Surge into Africa in Search of Customers, Contracts, Jobs
How Spy Agency Hackers Pose As – Anybody
Does Moderate Political Islam Exist?
The Call to Radicalism, Both at Home and Abroad
Instability Casts a Shadow Over French Presidential Election
The Problem of Siloed Cyber Warriors
Sizing Up America’s Aircraft Carriers of the Future
Europe Intel Sharing Will Take Trust
Rebranding Countering Violent Extremism Programs: A Sharper Focus or Missing the Point?
Trump 100 Days: From the Travel Ban to TPP
The Power of Botnets: Amplifying Crime, Disinformation, and Espionage
The “China Solution”: Beijing Aims for Global Leadership
Venezuela Teetering on the Edge
A Tale of Three Libyas
Worlds Collide in the French Election
NSA Curtails Collection Under FISA Provision
U.S. Special Operations Forces’ Changing Mission in the Middle East
The Comey Fallout
Is Sudan Still a State Sponsor of Terror?
Will Moon Bring Back Sunshine Policy in South Korea?
WannaCry Attack: Microsoft Questions Role of Intelligence Community
Defending the U.S. from North Korean Long Range Missiles
Blue Helmets Under Fire - From Trump
The War Against ISIS Has Just Begun
The “Renaissance” in Private Space Launch for Defense
Chinese Industrial Spies Cast a Wider Net
Could Iran’s Elections Indicate a New Future?
Western Balkans in Russia’s Crosshairs
Japan, South Korea Shaken by Pyongyang, Beijing – And Now, Washington