Reliable Security Information



Eliminating Migration

Migration Migration has been a common occurrence in all of human history, people carrying out conquest or fleeing from it, or from religious or ethnic persecution, or from natural disasters, or just seeking a better life. Under current global conditions this has reached unprecedented...

Read all of "Eliminating Migration" »

Age of Amity

We are barely into the Twenty-First Century and we see a world of turmoil. The United States stumbles on the world stage with no clear sense of direction, an economic recovery plodding along and beset by increasing problems with racism, economic inequality and political alienation....

Read all of "Age of Amity" »

Shifting Afghan Gears: Build, Don't Blast

Afghanistan has enormous economic potential as outlined in a recent US Army review; developing this is the key to stability. Despite fourteen years of US military support, the situation has deteriorated to the point that the senior US officer has stated flatly, "we have to...

Read all of "Shifting Afghan Gears: Build, Don't Blast" »

The Two Sides of Cybersecurity

Cybersecurity is a two-sided proposition, requiring both defense of internal networks and the ability to operate effectively in the cyber domain. Securing government networks is certainly necessary, but authorities should not lose sight of the need to couple their defense of America's networks with appropriate...

Read all of "The Two Sides of Cybersecurity" »

Rebuilding Afghanistan - a Critical Task

It is easy to see our Afghan effort drifting not just to a debacle but to a disaster. We had worked hard to get the Soviets out, and then had zero idea of what to do next. But this initial effort did build strong ties...

Read all of "Rebuilding Afghanistan - a Critical Task" »

U.S. needs a new electronic identity-protection strategy to prevent 'hybrid warfare' attacks

By Dan Gonzales Earlier this month, the FBI revealed that as many as 18 million current and former government employees and other U.S. citizens may have had their personal information stolen in a cyberattack on the Office of Personnel and Management. The General Accounting Office...

Read all of "U.S. needs a new electronic identity-protection strategy to prevent 'hybrid warfare' attacks" »

Putin: Eyes Wide Shut

The United States is entering a period of growing competition and tension in relations with Russia. The Russia that the United States faces today is more assertive and more unpredictable--and thus, in many ways, more dangerous--than the Russia that the United States confronted during the...

Read all of "Putin: Eyes Wide Shut" »

Inside the Terrorist Factory

As the civil wars in Syria and Iraq continue, they sharpen the sectarian divide between Sunnis and Shias, threatening the stability of the region and attracting a steady flow of foreign volunteers, effectively turning Syria and Iraq into a terrorist factory. The main recruiters...

Read all of "Inside the Terrorist Factory" »

National Strategic Void

There is global malaise. The European Union is in turmoil. Russia is increasingly provocative. China is assertive and fragile. The post-WorldWar American leadership dominance is gone. America is adrift. There is a void where national strategy should be....

Read all of "National Strategic Void" »

Seth Rogen's digital Pearl Harbor

What happens when hackers from North Korea, according to the US government, threaten the American arm of an entertainment giant, Sony, over a mediocre-to-crappy movie, Seth Rogen's The Interview, set to open Xmas Day? Americans fold. Despite the lack of any actual credible threat of...

Read all of "Seth Rogen's digital Pearl Harbor" »

Why Afghanistan II ?

This commentary builds on an earlier one that also set Afghanistan in the context of promoting global stability, the need for a credible strategy, and a focus on development to counter radical Islam. Now there continues to be widespread skepticism among the American public on...

Read all of "Why Afghanistan II ?" »

Russia's INF Treaty Violation: More Questions than Answers

In its recently released 2014 Compliance Report, the U.S. Department of State has formally accused Moscow of violating the 1987 Intermediate Nuclear Forces (INF) Treaty.1 Regrettably, the unclassified version of the report does not specify the exact nature of the treaty violation.2 This has allowed...

Read all of "Russia's INF Treaty Violation: More Questions than Answers" »

Navy Passes the Buck on 'Boomer' Buy

Navy Passes the Buck on 'Boomer' Buy   edited by Charles Knight & Carl Conetta The Reset Defense Bulletin is a bi-weekly service of the Project on Defense Alternatives. Long Range Strike Bomber   CRS reports that the ten-fold increase in funding included in the...

Read all of "Navy Passes the Buck on 'Boomer' Buy" »

Afghanistan and Kids At the Border

These are two current challenges facing the nation and at first glance seem totally unrelated. But in fact they are two aspects of the core challenge for the Twenty-first Century: promoting US prosperity....

Read all of "Afghanistan and Kids At the Border" »

 
Subscribe to SitRep:
GlobalSecurity.org SitRep RSS Feed GlobalSecurity.org SitRep ATOM Feed