The Leaky Pipeline
Dr. Naazneen H. Barma outlines how the national security academic pipeline leaks diversity at every step of the way, and what steps it can take to prevent the problem and promote more inclusion, equity, and representation.
Read the most recent CSIS research on defense reform efforts.
Dr. Naazneen H. Barma outlines how the national security academic pipeline leaks diversity at every step of the way, and what steps it can take to prevent the problem and promote more inclusion, equity, and representation.
In her piece for “Represent,” Rebecca Cokley addresses challenges facing people with both visible and invisible disabilities in the federal work force, particularly the SF-86, a federal form required for security clearances.
In Part I of a two-part article for the “Represent” series, Tony Johnson addresses the threat structural racism poses to U.S. foreign policy and national security and the “supply and demand” aspects of this problem.
As part of its commitment to diversity, equity, and inclusion, the CSIS International Security Program introduces “Represent,” an ongoing essay series where some of the most thoughtful and talented professionals in national security share their stories and provide their recommendations to improve America’s national security.
In this brief, the authors discuss a strategy that they have labeled the Minimal Exposure Strategy. The strategy’s core premise is that the United States is largely secure from military threats due to continental U.S. geography and the deterrent quality of its nuclear and other strategic capabilities.
In this brief, the authors explore a defense approach they have labeled the Progressive Values Strategy. The strategy is grounded in a view that the military instrument is not well suited to meeting many of the security challenges facing the United States. It focuses on achieving a level of military sufficiency that deters adventurism by others—as well as itself.
In this brief, the authors discuss a strategy they have labeled the Innovation Superiority Strategy. The strategy is guided by a focus on achieving enduring American military advantage in the U.S.-China security competition.
This CSIS Brief is the first in a series that explores the contours and implications of strategies that might reduce the U.S. military’s mission space through greater constraints on its ends, ways, or means.
We should stop talking about cybersecurity, not because “cyber issues” are over-hyped, but because the challenges and constantly evolving threat landscape involving cyber are so complex, and we cannot afford to continue operating under an already overextended definition.
There are a myriad of steps the federal government could take to improve its ability to investigate cybercrime and cases that involve digital evidence. But it is pursuing technologically inadvisable solutions that would lessen everyone’s security and seriously jeopardize our national security.