Shaping the Future of Cyber Diplomacy
Review for State Department Reauthorization
Review for State Department Reauthorization
How Terrorists Use the Internet and Online Networks for Recruitment and Radicalization
The Chinese Communist Party (CCP) is learning how to use American courts to undermine U.S. national security. Specifically, Beijing is working through the courts to block executive branch actions that...
The UN’s response to October 7 makes reform more urgent than ever. UN reform used to be a bipartisan priority — it must now be again.
A Defense Imperative
Safeguarding U.S. National Security in the Electric Vehicle and Battery Industries
The report explains composite violent extremism (CoVE) and introduces its four subtypes: ambiguous, mixed, fused, and convergent extremism.
Cryptocurrency Usage by Domestic Extremists
Iran’s Use of Cyber-Enabled Economic Warfare
The president-elect’s narrow victory at the end of a volatile campaign quickly led to efforts at planning a meeting of the American and Russian leaders. Relations between the two countries...
FDD senior fellow Orde Kittrie discusses Trump and the Lawfare. ...
The philosopher Lily Tomlin used to say: “No matter how cynical you get, it is impossible to keep up.” Has that ever been truer than it is in Washington right now? Last week,...
The closure of the U.S. detention facility at Guantánamo Bay, Cuba, has been on Barack Obama’s mind for a long time. After promising time and again during the 2008 campaign...