After more than thirty years of federal government service, CFR's Michael P. Dempsey shares his reflections on the state of U.S. national security, global conflicts, and the U.S. intelligence community.
China is once again conducting cyber-enabled theft of U.S. intellectual property to advance its technological capabilities. A new Council on Foreign Relations brief provides recommendations to combat this new old threat.
In his book A Great Place to Have a War, Joshua Kurlantzick tells the story of the CIA’s covert war in Laos during the Vietnam War. He examines how the country became, surprisingly, a U.S. policy priority, and analyzes why and how the CIA was able to build the war into one of the biggest covert operations in U.S. history. He further uses the Laos war as a prism to examine the CIA’s operations in the global war on terror today.
Critical infrastructure companies cannot protect themselves from adversarial nation-states without federal assistance. The U.S. government should create a classified network to share information on cyber threats with private companies critical to the economy.
According to the New York Times, the White House wants to further limit China's access to U.S. technologies by barring their citizens in U.S. universities from performing sensitive research. That might do more harm than good.
China is increasing its administrative control over the South China Sea. The U.S. government should initiate information operations that hinder China’s ability to expand and consolidate its control of the South China Sea and the airspace above it.
A number of African leaders have turned to Chinese investment as a viable alternative to Western development aid. The recent allegations of Chinese cyberespionage of the African Union's headquarters might prompt them to reconsider.