Managing the Terrorism Threat with Drones

The contours of America’s counterterrorism strategy against al Qaeda and the Islamic State have remained remarkably consistent over the past two decades, broadly focused on degrading al Qaeda’s and the Islamic State’s external attack capabilities and global networks, disrupting their operations through military operations or enhanced law enforcement and border security, and denying them sanctuaries.… Continue reading Managing the Terrorism Threat with Drones

Endless War Challenges Analysis of Drone Strike Effectiveness

Whether counterterrorism drone strikes are effective is one of the major questions currently facing US policymakers. The objectives offered as justifications for these strikes are arguably vague and over-broad and therefore run the risk of taking on an endless character. David Sterman argues that “endlessness” is a hazard that has not been appropriately addressed by… Continue reading Endless War Challenges Analysis of Drone Strike Effectiveness

Bubbles Over Barriers: Amending the Foreign Sovereign Immunities Act for Cyber Accountability

More and more often, the Foreign Sovereign Immunities Act (FSIA) has protected cyberattack-conducting state actors and their cybersecurity contractors from legal liability and suits brought by victims seeking redress in US courts. Adam Silow argues that it is time for foreign sovereign immunity to receive an update for the digital era. State-sponsored cyberattacks and their… Continue reading Bubbles Over Barriers: Amending the Foreign Sovereign Immunities Act for Cyber Accountability