Wishful Thinking on Iran

…the deal doesn’t rely on trust; it relies on intrusive monitoring provisions, included at suspect sites, where timelines for access are short enough to prevent “break out” or “sneak out”…

Drone Warfare in South Asia

…of pilots over Soviet airspace. In the late 1960s, the U.S. military began using jet-powered drones for surveillance missions over China and Southeast Asia, mapping adversary missile sites on pre-programmed…

Fostering Accountability in Cyberspace

…authority or resources).  4. Effective Accountability Requires Certain Elements as Prerequisites Definitions and clarifications The issue of definitions surfaced repeatedly in the workshop. Agreed definitions on certain terms and types…

America’s Nuclear Weapons Quagmire

…for the new program, while simultaneously building their Sentinel replacements.33Richard Sisk, “Minuteman III Missiles Are Too Old to Upgrade Anymore, STRATCOM Chief Says,” Military.com, January 6, 2021, https://www.military.com/daily-news/2021/01/06/minuteman-iii-missiles-are-too-old-upgrade-anymore-stratcom-chief-says.html; Greg Hadley,…