Expert Commentary

The Evolving Role of the National Security Agency

January 6, 2017 | Corin Stone
 

President-elect Donald Trump was briefed Friday on the findings of the intelligence community that Russia was behind hacks of the Democratic National Committee and Hillary Clinton’s staff during the election campaign. Trump has repeatedly cast doubt on the intelligence community’s conclusion that Russia meddled in the election process.

It comes a day after three of the country’s top intelligence chiefs - Director of National Intelligence James Clapper, Undersecretary of Defense for Intelligence Marcel Lettre and NSA Director ADM Michael Rogers – testified before the Senate Armed Services Committee on foreign cyber threats.

The Cipher Brief’s Leone Lakhani spoke to Corin Stone, the Executive Director of the NSA, about the hearing, the roadmap to fight cyber threats and the evolving role of the NSA.

The Cipher Brief: The nation’s top intelligence officials – including Admiral Rogers -- gave testimony to the Senate Armed Forces Committee, and one of the issues they talked about is the way forward in tackling cyber crime. How does the NSA fit into the broader constellation of agencies in the toolkit of response that the President has at his disposal?

Corin Stone: The NSA obviously is a big part of the toolkit. Each agency has a role to play. We’re not a law enforcement agency. We’re not a homeland security domestic agency. We obviously provide foreign intelligence and help inform on the threats that we need to defend against.

The President needs to use all of the authorities in his toolkit to actually defend U.S. interests. We’re very closely linked with all of the other agencies that play these roles and we work day in, day out – on a literally hourly basis – to make sure that they know what we know as far as threats…so that information can then be proliferated more broadly both at the federal government level, and at the state, local and private sector level as well. That framework and construct continues to evolve as we learn more.

We have two sides to the NSA. We have the foreign intelligence side, which is critical to understanding what the threats are facing this country. Then we have the information assurance side – our experts who help in cyber defense and know how to secure networks and make sure that people can actually defend themselves.

I think the dual insight brings a specialty from NSA; we try to make sure we’re providing that information to other agencies that have more direct contact with the private sector.

TCB: We heard Director [of National Intelligence] James Clapper say that he has received “expressions of concern from foreign counterparts” about what’s being “interpreted as disparagement of the intelligence community” from President-elect Donald Trump. How important is it for the executive branch to respect the findings of the intelligence community, even if it doesn’t ultimately agree?

CS: The intelligence community is an arm of the U.S. government and is here to serve the executive branch and the legislative branch, the government, and the American people. To the extent that the intelligence community has insight, they’re valuable and that should be used by our government and by all the branches.

TCB: How do you view your role as the Executive Director of the National Security Agency? And how do you see that role changing, given the growing challenges in national security, especially in the cyber realm?

CS: Essentially the Executive Director is the number three at the National Security Agency. The director, the deputy director and myself form a senior leadership team. As the number three, I need to be able to stand in for the director or the deputy director on any topic. That can be an internal or personnel issue, a counter-terrorism or cyber defense issue, or any number of topics where it rises to the level of the director. I need to be conversant on that and be able to step in for them in any meeting, any fora in the intelligence community or on the Hill. We try to be as interchangeable as possible.

That said, I do have an Intelligence Community focus because of my background, being from the DNI [Director of National Intelligence]’s office.  I take the lead on much of the collaboration with the other deputies and Executive Directors around the Intelligence Community on things like budget impacts on the Community as a whole, joint duty and ensuring people can move easily around the community and take different assignments.

When Admiral Rogers arrived, he looked around and said “I’ve got a background and knowledge in cryptology, my deputy director also does. I’d like a different perspective from the outside.”

TCB: In terms of insider threats, post-Edward Snowden’s leaks, how have changes in surveillance laws impacted the NSA? Is the NSA able to collect the information it needs to inform policymakers of threats facing the country?

CS: There’s been one major change in the law so far. That involved Section 215 of the USA Patriot Act, so the bulk telephone metadata program expired.

We are now operating under the USA Freedom Act. As you know, that changed the method that we use to obtain the call detail records. Instead of collecting and maintaining five years’ worth of records from the providers, under the USA Freedom Act, we apply to the Foreign Intelligence Surveillance Court. We then get permission to ask the providers to give us the relevant information directly, so the phone companies retain their own call records. We don’t collect them in bulk anymore, and we’re able to get specific information related to international terrorism that we need. So it does preserve the critical capability that we need under the national security program, but also better protects privacy and civil liberties of everyone.

At the broader policy level, we’re always in a dialogue with policy makers, the judicial branch and the public about our authorities and how they should be implemented. Of course there’s also a constantly changing technology environment.  

It’s important to understand that we undertake our activities and our mission in response to requirements that we get from the intelligence priorities established to support the President’s objectives. We don’t create our own requirements and priorities.

We have very talented, agile and innovative people here at NSA. Our workforce is amazing and they allow us to make the most of we can do and meet the priority needs within the available legal framework that we have.

It is our duty to make sure that policymakers understand what we think we can and can’t do within our legal authorities and within our framework. Then they decide whether that gives them what they need, or whether they need to seek changes to our authorities.  But while that’s a constant dialogue, at the end of the day the law dictates what we can do.

TCB: There’s been criticism of the NSA in terms of intruding on privacy and civil liberties. What kind of steps has the NSA taken to alleviate that kind of criticism?

CS: We’ve hired a full time civil liberties and privacy officer. She is a direct report to the director. Her job is to specifically address the issue of privacy and civil liberties on all operations: assessing our activities, making recommendations, training the workforce about the many unique civil liberties and privacy issues we encounter.

She’s also our coordinator with the Privacy and Civil Liberties Oversight Board, and they have a very active relationship with us. She’s also led a bunch of engagements with what we call civil advocacy groups and academics, who bring in external concerns. We give them a series of briefings on what we do and allow them to meet with folks and ask questions, and that helps us become a little bit more accessible to the public.

I have found that a lot of the concerns that have been raised about the NSA in the past were because there aren’t a lot of facts out there about the NSA. People don’t understand what we do and that’s not through any fault of their own. It’s because we’re an intelligence agency and we weren’t built to be transparent, so we haven’t been.

But now, we’ve published a series of reports, describing the civil liberty and privacy safeguards that are built into our operations in a couple of different areas under Section 702 of the Foreign Intelligence Surveillance Act, under Executive Order 12333 and our implementation of the USA Freedoms Act. They describe the technical safeguards, the oversight mechanisms and the auditing processes that we perform to mitigate these concerns.  

The last thing I would mention is PP28 – the Presidential Policy Directive -- which follows the theme of transparency. Not only is PP28 an unprecedented level of transparency with regard to how we’re going to conduct our mission and protect civil liberties and privacy, but we also made our procedures related to PP28 public as well. And that’s pretty new for us.  

TCB: One of the challenges that’s been a point of discussion in the intelligence community is the improvement of cooperation between the public sector and private sector in tackling some of these evolving threats. Is full cooperation a realistic goal? How is the Agency trying to respond to those concerns?

CS: It depends on how you define “full.” I think really strong cooperation and collaboration is critical, and does happen in many ways. The private sector is responsible for certain things like critical infrastructure. The public sector is responsible for other areas. We have to communicate foreign threats, and understand and deter foreign threats. So we have to work together.

In the world that we live in, neither the government nor the private sector, is strong if we’re working alone. We have to actually inform each other and work together. We’re just connected in ways that ways that maybe we haven’t been in the past, and we’re vulnerable in ways that we haven’t been in the past.

It’s unrealistic for the private sector to withstand the types of activities being directed against them by actors to include nation states, and it’s also totally unrealistic to say that the government should just protect everyone. We can’t defend a network without being inside a network. And neither we, nor the private sector want us inside every network, and so we have to be working together.  

We believe strongly that industry is the nation’s innovation engine on which our economy depends, and our national security depends on a strong industry. We know that companies need to compete globally and we all benefit from their innovation. We, in particular, get an enormous amount of IT and services from industry, so we need access to the latest state-of-the-art technology. In some cases, we help drive commercial advances. We have cooperative research with companies and academia. We spin out technology that can be better leveraged and commercialized by the private sector.

We also obviously have serious mutual interests in cybersecurity and making sure that we have solid and secure networks. NSA has a huge, rich history in information assurance. That’s the side of NSA that doesn’t come to light that often. But it really should.

We publish guidelines and promote best practices through a variety of mechanisms. We participate in the National Institute of Standards and Technology cybersecurity framework, which helps to protect critical infrastructure. We’re constantly trying to help the private sector defend their networks in a way that is meaningful to them, without actually being the ones who have to defend it. 

To listen to our special "15 Minutes" podcast with Corin Stone, click here.

The Author is Corin Stone

Corin R. Stone currently serves on a joint duty assignment as the Executive Director of the National Security Agency. Previously, she served in the U.S. State Department as an attorney-advisor in the Office of the Legal Adviser, and spent eight months in Iraq, first as an Associate General Counsel in the Coalition Provisional Authority, and then as the first Legal Adviser to Ambassador Negroponte and the new U.S. Embassy in Baghdad. In addition to other roles at the U.S. Department of State,... Read More

Learn more about The Cipher's Network here

Next Steps in U.S.-Cuba Relations
Strengthening U.S. Cyber Defenses
Russia Sanctions: The New Normal
Corruption in China: The Party’s Over
Change in the Kingdom: Three Big Shifts
Managing Information & Risk in the Digital Age
Endgame in Afghanistan
The Convergence of Crime and Terror
Strengthening the Public-Private Partnership
The Billion Dollar Spy: An Interview with Author David Hoffman
The New Battlefield
North Africa: Instability Increasing
The Kidnapping Capital of the World
Homegrown Terror in the Age of ISIS
The Refugee Crisis: Europe on the Brink
The Future of Mexican Oil
Cracks in the System
Embassy Security Three Years After Benghazi
Fourteen Years Later
Can Congress Solve the Cybersecurity Problem?
Arctic Game Changer?
Where They Stand on National Security
The First 100 Days
Worthy of Fleming: Anthony Horowitz's "Trigger Mortis"
At the Crossroads
Eye in the Sky
Rough Road Ahead for Rousseff
Leveling the Playing Field: Tech Access in China
The Dead Drop
Top of Mind for Chief Security Officers
Protecting Your Business
The Future of Oil
Chinese Expansion in Latin America
American Involvement in Syria
The Future of Geospatial Intelligence
The Umbrella Movement: One Year Later
Ebola: An End in Sight?
The Pakistan Problem
The Dead Drop
The Encryption Debate
Going Dark
The US-Mexico Relationship
The Rise of Mobile Technology in Africa
The Dead Drop
Construction Boom in the Gulf
Cybersecurity: The Human Factor
Beijing and the South China Sea
Will Peace Talks Succeed in Colombia?
Social Media and Terrorism
The Rise of Israel’s Tech Sector
Securing the Border
Red Sun Rising
The Dead Drop
Adopting the Iran Deal
Stability on the Peninsula
Crime in South Africa
Combatting Terrorist Financing
The Dead Drop
Recovering from a Cyber Attack
Stability in South Asia
Veterans Day
Israel’s Wave of Violence
The Dead Drop
Protecting Critical Infrastructure
ISIS on the March
The Paris Attacks
Rethinking U.S. Security Assistance
The War on Terror 2.0
Putting Mali in Context
Will Russia Ever Change?
Will Canada Pull Back?
Understanding Putin’s Popularity
Chinese Expansion in Africa
Terrorism Finance and Wildlife Poaching
Illicit Trafficking in Latin America
Climate Change and Security
Preventing Another San Bernardino
Supply Chain Security
Negotiating a New Safe Harbor Agreement
The Battle for Yemen
Foreign Tech Access in China
The Dead Drop
Offensive Cyber Operations
Travel Security in the Age of ISIS
Iran: A Rising Cyber Power?
The Future of Cybersecurity
The Arab Spring Five Years Later
Preparing Today’s Military for Tomorrow’s Wars
Cybersecurity for Small and Medium-Sized Enterprises
Maritime Security in the Gulf of Guinea
Improving Aviation Security
The Dead Drop
Terrorism in 2016
Cybersecurity in 2016
The World in 2016: Opportunities and Risks
China in 2016
Russia in 2016
Moscow’s Cyber Buildup
The China-India Relationship
Russian Influence in Latin America
The Future of Homegrown Terrorism
Stability in Sub-Saharan Africa
Protecting Your Digital Identity
Elections in Taiwan: A Turning Point?
The Caliphate of Crime
Biotechnology’s Dark Side
Rethinking U.S. Strategy Toward China
The Evolution of Weapons of Mass Destruction
A New Era in US-Iranian Relations?
Will Information Sharing Improve Cybersecurity?
Evaluating China's New Silk Road
Tech in Latin America: Opportunities and Challenges
The Destruction of Libyan Oil
Ransomware: Protecting Yourself from Cyber Extortion
The US and India: Strengthening Security Cooperation
Security and Stability in Afghanistan
Combatting the Al Shabaab Threat
Sports Security: Protecting Your Venue
Israel’s Arab Alliance: A Counter to ISIS and Iran?
The End of U.S. Space Supremacy
The Caucasus: Instability Increasing
Stabilizing Iraq
The Trans-Pacific Partnership: Deepening U.S. Commitment to Asia
Securing Industrial Control Systems
The Battle for Ukraine
Defeating Boko Haram
Jordan: The Indispensable Ally
China’s Military Modernization
The Cybersecurity Skills Shortage
Solving Mexico’s Violence Problem
The Northern Triangle: The Most Violent Region in the World
The Future of the Middle East
Terrorism in the World’s Largest Muslim Country
The Rise of Quantum Computing
Europe’s Terrorism Problem
Stability in the East China Sea
The Rise of Counter-Drone Technology
The ISIS WMD Threat
Healthcare and the Cyber Threat
Security in the Indo-Pacific: Australia’s New Role
Countering ISIS' Message
Containing the ISIS Cancer
Security, Privacy, and the Fight Over Encryption
Taking Aim at Smart Guns
Losing Patience with North Korea
The Difficult Road Ahead for Colombia
The Taliban Resurgence
ISIS: The New Face of Global Jihad?
Connecting with Latin America
Russia and China: Mutually Assured Detachment
The Scourge of Terrorism
The Security Challenge of Terror
European Unity in the Face of Crises
Developing Enhanced Cybersecurity Systems
Pakistan: Friend and Foe?
Egypt’s Economy on the Brink
Tehran’s Balancing Act
Russia Makes Moves in the Middle East
Kenya’s Battle with al-Shabaab
Missile Defense in the Korean Peninsula
Are America's Ports Secure?
The Human Factor Behind the Panama Papers Leak
Russian Military Modernization
APTs: The Boogeymen of Cybersecurity
Vietnam: Guns and Butter
Syria: Power-sharing, Partitioning, and the Fight Against ISIS
Turbulence in Turkey
The U.S. and the Philippines: Shoulder to Shoulder in the South China Sea
The Darker Side of the Internet of Things
Cybersecurity Challenges in Asia
Taliban on the Offensive
Quagmire in Yemen
Cocaine and Conflict in Colombia
The Cloud: Nebulous, but Nimble
Censorship in China
An Emerging Crime-Terror Nexus in Europe
IRGC: Iran's Power Player
Latin America: The New Frontier for Cyber Attacks
The Hydra and the Snake: The Death of Osama Bin Laden
Nuclear Deterrence and Assurance in East Asia
Vehicle Cybersecurity: Running in Place
What Drives ISIS
Tensions Simmer in the South China Sea
Managing the Mobile Phone Malware Threat
Leaving the Oil Spigot Open
Burundi: A Path Toward Civil War?
The Value of Special Operations Forces
ISIS in the Balkans
The Tech Must Flow
North Korea’s Party Congress: What was all the fuss about?
Argentina: A Smoother Ride
Libya: Obama’s “Worst Mistake”
Tsai Ing-Wen’s Balancing Act
The North Korea Workers’ Party Congress and Kim Jong-un’s Legitimacy
Flying the Unfriendly Skies: Airline Security
Nuclear Standoff in South Asia
How to Read Riyadh
Even in Defeat, Austria’s Far-right Emulates Populist Growth in Europe
More Effective, Less Secure: The Cyber-Threat to Medical Devices
A New Era in the U.S.-Japan Security Partnership
Passing the Torch to the Next Generation of Saudi Leaders
U.S. Military Aid to Egypt Continues Despite Democratic Struggle
How Secure are Radiological Materials?
Roadblocks on the Path to Normality in Iran
Caracas in Crisis
Algeria: Exporting Stability
The Push for Kurdish Independence
U.S. and China: Strategic Cooperation at Arm’s Length
City Life: Living Smarter, Not Harder
Homegrown Terror in Orlando
A Rough Patch in U.S.-Saudi Relations
Japan’s “Abenomics”
A Tale of Two Bears: The DNC Hack
The Origins of Brexit
The Chinese Communist Party Under Xi Jinping
The Arctic: Technology and Infrastructure on Earth and in Space
Jordan: Stability Amidst Chaos
Exporting Jihad: Bosnia and Kosovo
Changing World Order: The Effects of Brexit
Navigating Uncharted Waters
Iraq after ISIS: Divide it or Fix it?
Terrorism in Istanbul: Severe Implications
North Korea as a Cyber Threat
One If By Air, Two If By Sea: Unmanned Surface Vehicles
The FBI’s Intelligence Mission
Does NATO Need a New Ideology?
Philippines v. China: Laying Down the Law of the Sea
Is Turkey Returning to a Policy of “Zero Problems?”
Federal Cybersecurity One Year After the OPM Breach
NATO: Weathering the Storms
The Rise of the Fringe: A Threat to Democracy?
Hezbollah's Many Faces
Trans-Pacific Trade Deal Remains in Limbo
The Aftermath of the Nice Attack: Is ISIS’ “Prestige” on the Rise?
Crossing the Line: A Failed Coup in Turkey
France’s Vulnerabilities in a Changing Terror Landscape
The Problem with Proxies
Water Security in South Asia: Running Dry and Running Out of Options
The Clash over Social Media Data
Extremist Groups Target Diversity in Bangladesh
Kenya: Private Sector and Government Coordinate on National Security
The ISIS-Al Qaeda Rivalry
Will Syria’s Most Productive Citizens Ever Return Home?
Trust but Verify: The United States, China & Economic Espionage
The World is Watching: The American Election and China
The Status Quo Will Not Work in South Sudan
Kurdistan as a Geopolitical Playground
Rio Olympic Games: A Missed Opportunity
Spinning Silk: Asia and the GCC
China-Japan Relations: Trading Goods While Exchanging Words
Climate Change in Ethiopia: Managing the Risks
Mounting Security Challenges in Afghanistan
Is There a Future for the Muslim Brotherhood in Egypt?
Niger Delta Militants Compound Nigeria’s Security Crises
Thailand Under the Junta
Brazil: Getting its House Back in Order Post Olympics
Indicators of Political Instability
Finding Water in the Desert: Water Security in the Middle East
The Blurring Line Between Cyber and Physical Threats
The World is Watching: The American Election and Russia
NATO’s Ambiguity on the Red Line for Russia
Boko Haram: The Plague Affecting Nigeria and Beyond
Tunisia: From Revolution to Governance
Russia, China, and Cyber Espionage
Best Of: The F-35 Joint Strike Fighter: Game-Changer or Procurement Nightmare?
Climate Change Jeopardizes National Security
Algeria: A Bulwark Against ISIS
Venezuela's Military: Both a Stabilizing and Destabilizing Force
Will Theresa May's Britain Stay Committed to European Defense?
America and the Asian Infrastructure Investment Bank
What’s at Stake in the South China Sea?
Fifteen Years After 9/11: Much Accomplished, Much to be Done
The Post-9/11 U.S. Military
The Post-9/11 U.S. Intelligence Community
South Africa: ANC Losing Its Grip on Power
The World is Watching: The American Election and Saudi Arabia
Turkish Leverage Over the United States and European Union
Nuclear North Korea: A No-Win Scenario?
Insider Cyber Threats: A Pressing Problem Facing Business
Al Shabaab: A Persistent Threat
Unease, Uncertainty, and Strife: Global Inequality and Instability
Europe Bears a Big Burden in the World's Migration Crisis
Malicious Cyber-Actors in the Financial Services Industry
China's Ongoing Struggle to Clamp Down on Terrorism
Growing Instability in Africa’s Top Two Oil Producers
The World is Watching: The American Election and Iran
Dollars and Sense: Military Spending During an Economic Downturn
Forewarned is Forearmed: Confronting Adversaries in Cyberspace
Is Peace Possible in Colombia?
The Rise of Hypersonic Weapons
Nuclear No First Use: Ambiguity vs. Clarity
Al Qaeda Growing Stronger By the Minute
Cyber and the Law
The DRC: Strong Grip on Power, Weak Handle on Governance
Combatting Haqqani Network is Key to Afghan Strategy
War and Peace: Syria and the Question of American Intervention
The F35: A 21st Century Coalition Asset
Objective: Mosul
Where is Duterte Leading the Philippines?
Great Power Politics in Latin America
In the Strait of Hormuz, Little has Changed with Iran
Corralling the Cartel: OPEC and Oil Prices
Russian Hacking: The Difficult Path Between Inaction and Escalation
Philippines' Duterte Leaves U.S. Policymakers "Baffled"
The World is Watching: The American Election and Germany
Can Hamas Elections Shift the Status Quo?
What is the Future of U.S. Policy in Latin America?
Conflict and Common Goals: the Government and Silicon Valley
Kashmir in Crisis—Again
Al Qaeda in Syria: The Split That Wasn't
EU and U.S. Interests in Hungary in Jeopardy
The Price of Turkish Posturing in Iraq
Is it Possible to Hack the Vote?
Decision Day in the U.S.: Daunting Security Challenges Ahead
The State of Play in Syria
Modi: Modernizing India
Trump's Win Creates Uncertainty in Europe
The Powers and Pitfalls of Drone Warfare
Insurgent Use of Unmanned Aerial Systems: A Cat-and-Mouse Game
The African Migrant Crisis: The EU Takes Action
The U.S. Military: Ready or Not?
Sisi, the IMF, and Egypt's Crumbling Economy
Can Robots Fight Wars? The Future of Lethal Autonomous Weapons Systems
The Global Debate Over the Legality of Drones Continues
Agility and Innovation in the Third Offset Strategy
China's Economy: Great Power, Great Responsibility
Identity in Cyberspace: The Advent of Biometrics Authentication
Obama's Legacy on Russia and China: Making the Grade
Sweden, Finland & Norway Deepen Defense Ties with the West
Developing and Sticking With a Clear Strategy in Afghanistan
Italy’s Choice: Damned If You Do, Damned If You Don’t
Predicting the Future: Anticipating Security Events with Data Analytics
Russia’s Energy Leverage Wanes in Parts of Europe
The U.S.-Japan Alliance: A Safe Harbor
President Obama's Counterterrorism Legacy
Dialing Up Controversy with China
China Officially Ties Internet Restrictions to its own National Security
Trumping Trade: Alternatives to TPP
The International Criminal Court, Under Pressure, Turns Eyes on U.S.
Egyptian and Israeli Cold Peace Has Never Been Warmer
Trump, Russia, and the CIA: Allies and Adversaries Confused
Hacking Against Cybercrime: The FBI's New Approach
Trumping Trade: The Future of NAFTA
Violence in Mexico Surges
Directed-Energy Weapons: Time to Focus
At the Crossroads Between East and West: Turkey and the World in 2016
The Perils of Connectivity: Cyber Insecurity in 2016
The Party Endures: China and the World in 2016
Cracks in the Union: Europe and the World in 2016
Eyes on the Kremlin: Russia and the World in 2016
Terrorists Don't Have to Win - They Just Have to Survive: Counterterrorism in 2016
A Perennial Task with No Finish Line: U.S. Defense Planning and Procurement in 2016
A Changing of the Guard: U.S. Counterterrorism Policy
Poland: Strong Defense Partner But Taking Undemocratic Steps
Land, Sea, and Air: U.S. Military Readiness in the Navy and Marine Corps
Syria's Tangled Trilateral Road to Peace
The UK’s New Surveillance Law: Security Necessity or Snoopers’ Charter?
South Korea’s Foreign Policy: Leaderless, but Not Rudderless
Jammeh to Cede Power, Leave The Gambia
Mali’s Instability: Advantage, Al-Qaeda in the Islamic Maghreb
Railguns: The Fast, the Furious—and the Future?
Swarming the Battlefield: Combat Evolves Toward Lethal Autonomous Weapons
Mixed Signals to Moscow: The Trump Administration's Russia Policy Puzzle
NATO’s Changing Face Under the Trump Administration
South Korea’s Presidential Crisis: Is Democracy Stuck in Park?
Power and the U.S. Presidency
Trump's Hour of Action: Recommendations for Cyber Policy
Passing the ‘Football’: The Future of U.S. Nuclear Policy
The Baltics Up the Ante in Defense
Take It or Leave It: The Future of the Two-State Solution
Trump and Trudeau: Fire and Ice
Cybersecurity in the Gulf: The Middle East's Virtual Frontline
Little Margin for Error in South China Sea Policy
Eritrea: A Potential U.S. Counterterror Partner
Trump Administration Faces Daunting Challenges in Afghanistan
The New Space Race
Autonomous Hacking Bots: Menace or Savior?
Myanmar’s Rohingya Crisis – Fertile Ground for Jihadis in Southeast Asia?
Cuba Lingers in Limbo
Designating the Muslim Brotherhood As Terrorists Is Complicated
Trump and the New Map of the Middle East
The New Technology of Humanitarian Assistance