Society

FSI researchers work to understand continuity and change in societies as they confront their problems and opportunities. This includes the implications of migration and human trafficking. What happens to a society when young girls exit the sex trade? How do groups moving between locations impact societies, economies, self-identity and citizenship? What are the ethnic challenges faced by an increasingly diverse European Union? From a policy perspective, scholars also work to investigate the consequences of security-related measures for society and its values.

The Europe Center reflects much of FSI’s agenda of investigating societies, serving as a forum for experts to research the cultures, religions and people of Europe. The Center sponsors several seminars and lectures, as well as visiting scholars.

Societal research also addresses issues of demography and aging, such as the social and economic challenges of providing health care for an aging population. How do older adults make decisions, and what societal tools need to be in place to ensure the resulting decisions are well-informed? FSI regularly brings in international scholars to look at these issues. They discuss how adults care for their older parents in rural China as well as the economic aspects of aging populations in China and India.

Paragraphs

This study analyzes the political plights of twenty-eight terrorist groups- the complete list of foreign terrorist organizations (FTOs) as designated by the U.S. Department of State since 2001.7 The data yield two unexpected findings. First, the groups accomplished their forty-two policy objectives only 7 percent of the time. Second, although the groups achieved certain types of policy objectives more than others, the key variable for terrorist success was a tactical one: target selection. Groups whose attacks on civilian targets outnumbered attacks on military targets systematically failed to achieve their policy objectives, regardless of their nature. These findings suggest that (1) terrorist groups rarely achieve their policy objectives, and (2) the poor success rate is inherent to the tactic of terrorism itself. Together, the data challenge the dominant scholarly opinion that terrorism is strategically rational behavior.8 The bulk of the article develops a theory to explain why terrorist groups are unable to achieve their policy objectives by targeting civilians.

This article has five main sections. The first section summarizes the conventional wisdom that terrorism is an effective coercive strategy and highlights the deficit of empirical research sustaining this position. The second section explicates the methods used to assess the outcomes of the forty-two terrorist objectives included in this study and finds that terrorist success rates are actually extremely low. The third section examines the antecedent conditions for terrorism to work. It demonstrates that although terrorist groups are more likely to succeed in coercing target countries into making territorial concessions than ideological concessions, groups that primarily attack civilian targets do not achieve their policy objectives, regardless of their nature. The fourth section develops a theory derived from the social psychology literature for why terrorist groups that target civilians are unable to compel policy change. Its external validity is then tested against three case studies: the September 1999 Russian apartment bombings, the September 11, 2001, attacks on the United States, and Palestinian terrorism in the first intifada. The article concludes with four policy implications for the war on terrorism and suggestions for future research.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
International Security
Authors
Paragraphs

To reduce the risk of nuclear terrorism, we must prevent terrorists from obtaining nuclear weapons or materials. This will require, among other things, a sustained effort to keep dangerous nations from going nuclear--in particular North Korea. This article reviews the efforts the United States has undertaken through the years to keep North Korea from building a nuclear arsenal, arguing that the history of proliferation on the Korean Peninsula is marked by five nuclear crises. A sixth could be on the horizon, further compromising American efforts to lessen the likelihood of a nuclear attack on U.S. soil.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Annals of the American Academy of Political and Social Science
Authors
William J. Perry
News Type
News
Date
Paragraphs
Forty students from nine universities across Russia came to Yaroslavl, 150 miles northeast of Moscow, to participate in an arms control exercise led by CISAC director Scott D. Sagan. In a mock U.N. Security Council session, students addressed Iran's nuclear program, to cap off courses they took this year through FSI's Initiative on Distance Learning, funded by Carnegie Corporation of New York.

One day perhaps Marina Agaltsova will join the diplomatic corps at a foreign embassy, or help write policy positions for the Russian government. Coit Blacker hopes that the lessons from her Stanford-sponsored distance-learning course will stick.

Agaltsova was among a group of Russian students brought to the provincial city of Yaroslavl in late May for an academic conference that capped this year's five distance-learning courses offered at nine universities across Russia by the Initiative on Distance Learning at the Freeman Spogli Institute for International Studies.

Through videotaped lectures, web readings and online chat sessions with senior research scholar Kathryn Stoner-Weiss and 14 other Stanford instructors, students in Democracy, Development and Rule of Law explored democratic ideals and practices, studying examples in Latin America, Asia and the former Soviet Union. "The course taught me that there is a black side to the reforms" that followed perestroika in Russia, Agaltsova says. "I learned more about Russian history [in the course] than I had learned in school."

That's the idea, says FSI director Blacker, who wants to re-establish the teaching of critical analysis, lost under decades of Communist rule, in Russian universities. "The social sciences were disemboweled," he says. He wants to develop future generations of diplomats and policy makers whose worldview is shaped "by how they think, not what they're told to think."

This year, to cap off the courses, 40 students came to Yaroslavl to participate in a mock United Nations Security Council session addressing Iran's nuclear program. They traveled from the farthest reaches of the Russian hinterlands, like Amur State University in Blagoveschensk, 4,800 miles from Moscow.

The arms control simulation is a teaching tool developed for the Stanford undergraduate class International Security in a Changing World, taught by Blacker and Scott Sagan, a political science professor and director of the Center for International Security and Cooperation within FSI. Sagan has exported the simulation to several universities in the United States where his former graduate students now teach--UC-Berkeley, Dartmouth, Columbia, Duke--but this was the first one he has conducted overseas.

This year's scenario was the International Atomic Energy Agency's referral of Iran to the U.N. Security Council for failure to fully disclose its nuclear activities. During the simulation, students submitted proposals to their heads of state, played by Blacker, Sagan and Russian faculty members. By the end of the two-day session, delegates had overcome seemingly intractable differences during four intensive sessions led by Stanford third-year law student Matthew Rojansky, acting as U.N. undersecretary-general for legal affairs. The council's resolution gave Iran three months to comply with the IAEA's requests and provided for Iran to obtain nuclear fuel from Russia, with the production and waste disposal to occur on Russian soil under IAEA controls.

After the session closed, students set aside their delegate roles to reflect on what they had learned. Narina Tadevosian, a student from Yakutsk State in far eastern Siberia, said she was surprised at "how strict Russia was" in taking a leading role in the session.

"If only it were so in real life," she added.

Hero Image
arms
All News button
1
Paragraphs

ABSTRACT:

While the refugee protection system is one of international law's most recognizable features, it routinely places massive numbers of refugees in camps in the developing world, where they face chronic threats to their physical security from crime and disorder, physical coercion, and military attacks. Yet key actors responsible for refugee protection, including host states, advanced industrialized countries, and the United Nations High Commissioner for Refugees (UNHCR), have failed to prioritize refugee security.

This article asks: (1) Why? (2) What have been the consequences? and (3) What do these answers reveal about how organizations carry out legal mandates in complicated political environments?

Conventional wisdom holds that security only recently became a major problem in the refugee protection system; that UNHCR's role in enhancing refugees' physical security is limited by the agency's legal mandate and practical constraints; and that problems of violence and physical security are largely episodic concerns affecting small numbers in discrete refugee populations. Drawing on historical documents, interviews, data on budgets and performance measures, and legal doctrine, I show this conventional wisdom to be wrong. Only some of the problems associated with the current system can be explained by international geopolitics or by legal compromises reflected in refugee law.Instead, that system's brutal realities also reflect bureaucratic dynamics, political pressures, and legal interpretations shaping the discretionary choices of UNHCR and its nongovernmental organization partners. I develop the argument by tracing the remarkable history of UNHCR as it transformed itself from a refugee advocacy organization with a limited mandate into a modern relief agency.

This evolution helps explain the persistence of security problems and sheds light on the challenges of implementing ambitious legal mandates under uncertainty, particularly when the organizations doing so operate in complex political environments.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Georgetown Journal of International Law
Authors
Paragraphs

This is the fourth and final volume in a pioneering series on the Chinese military. It begins with an examination of Chinese military culture and history, with special attention to the transition from Mao Zedong's revolutionary doctrine and the conflict with Moscow to Beijing's preoccupation with Taiwanese separatism and preparations for war to thwart it. Because such a war might involve the United States, the Chinese have concentrated on measures to deter American intervention. Part II focuses on the military and decisionmaking, first in the National Command Authority and then in the People's Liberation Army's command-and-control prioritizing system. Part III provides a detailed study of the Second Artillery, China's strategic rocket forces. Based in part on interviews, the book provides an unprecedented look at its history, operational structure, modernization, and strategy. This is followed by a historical account of the air force's long effort to modernize and its role in joint operations and air defense. The book concludes with the transformation of military strategy and shows how it is being tested in military exercises with Taiwan and the United States as "imagined enemies."

A Chinese translation by Litai Xue was published by Mirror Books, Hong Kong, in 2007.

All Publications button
1
Publication Type
Books
Publication Date
Journal Publisher
Stanford University Press
Authors
Authors
News Type
Commentary
Date
Paragraphs

Americans have never been in greater need of understanding religious differences and cultivating respect for religious freedom. The events of 9/11 transformed America's relationship with Muslims at home and abroad, a surge in immigration from Asia and Africa has increased the nation's religious diversity, and cultural conflicts between secularists and religious conservatives occur like clockwork.

So you might think the last thing school districts would want is to bring religion into the classroom. Better to play it safe, and avoid lawsuits and angry parents by limiting any mention of faith to the private sphere. But school officials in Modesto, in Northern California, decided not to play it safe. In 2000, the religiously diverse community took a risk and, in an almost unheard-of undertaking for a public school district, offered a required course on world religions and religious liberty for ninth-graders.

As college professors and social scientists studying religious freedom in the USA, we wanted to know more. Could greater discussion of religious differences actually deepen cultural divides? From October 2003 to January '05, we surveyed more than 400 Modesto students and conducted in-depth interviews with students, teachers, administrators and community leaders. We granted anonymity to students so they could speak freely, but we recorded the interviews. No prior study on American teens' views on religious liberty has scientifically surveyed such a large number of students.

To our surprise, students' respect for rights and liberties increased measurably after taking the course. Perhaps more important, the community has embraced the course as a vehicle for fostering understanding, not indoctrination.

All-American city

Modesto, population 190,000, resembles many medium-size U.S. cities. Over the past 40 years, it has made room for an array of immigrants, including Buddhists, Sikhs and Muslims. Evangelical "megachurches" have sprung up alongside mainline Protestant and Roman Catholic denominations and a flourishing Jewish community. Overt incidents of religious prejudice have been rare, but the cultural divide bred mutual suspicion.

In 1997, some religious groups in Modesto battled the school over a policy of tolerance for gay and lesbian students. Out of the dispute came a meeting of the minds: A 115-member committee of community members and educators was formed to examine how to provide safe schools for all students. That meant putting an end to bullying, whether based on sexual orientation, race or ethnicity--even religion. The world religions course was one of several initiatives designed to further the "safe schools" mission.

The experiment succeeded. Our surveys indicate it increased students' respect for religious liberty as well as for basic First Amendment rights. One Russian Orthodox boy, for instance, found that the course brought him closer to his neighbors. "We have a Hindu family living across the street who pray(s) to a statue," he said. "I thought it was just plain dumb. But I notice now they had a pretty good reason."

Bringing religious beliefs out into the open increased students' respect for religious liberty for two reasons. First, students not only emerged from the course far more knowledgeable about world religions, they also were able to apply the knowledge practically. One student told us that the course gave him a greater appreciation for the religious diversity in his school. "I walk up to one of my friends I've known for years. I had no idea he was a Sikh. When I see the bracelet (worn for religious reasons), I say, 'Oh, you're a Sikh.' "

Second, students learned that major faiths shared common moral values. When we asked one student why she enjoyed studying other religions, she said: "All my life I've been a Christian, and that's really the only religion I know about. So when I take this class I see there are other religions out there, and they kind of believe in the same thing I do."

Even so, students did not become relativists or converts. They were no more likely to disbelieve the truth of their own religious traditions after taking the course.

A broad spectrum of Modesto's residents has embraced the course. Students can opt out, but only a handful have. The school board, which stands divided on other hot-button cultural issues, voted unanimously to adopt the course. Religious leaders of all faiths lent their support because they realized that something had to be done to bring peace to the schools--and that pushing religious identity undercover would create more problems than it solved.

Lessons beyond Modesto

Recent disputes over the teaching of evolution in Kansas and Dover, Pa., and over a Bible studies course in Odessa, Texas, have made national headlines. These stories leave the impression that all attempts to teach about religion in public schools--even courses far more balanced than these disputed courses--are bound to cause controversy. How did Modesto avoid this fate, and what lessons does Modesto provide for other communities?

  • Extensive training gave teachers the knowledge and enthusiasm to handle a sensitive subject.
  • An interfaith religious council reviewed the course before its implementation and paved the way for its acceptance. The council members applauded particularly the district's decision to have the course focus on objectively describing religions rather than evaluating their merits.
  • The focus on description prevented the perception that the course was biased or an attempt to indoctrinate students into a particular faith.
  • Most crucial was the school district's decision to introduce the course as part of an effort to counteract the hostility against students who were seen as different.
First Baptist Church Associate Pastor Paul Zook explained that despite the council members' disagreements, "We could find common ground (because) we all want kids to be safe."

Limiting deeply held beliefs to the private sphere breeds suspicion and tension. True religious liberty prevails not only when people feel comfortable expressing their beliefs, but also when they learn to discuss religious differences with civility and respect.

 Emile Lester is an assistant professor at The College of William and Mary. Patrick S. Roberts is a postdoctoral fellow at the Center for International Security and Cooperation at Stanford University.

 

All News button
1
Paragraphs

The emerging schism between the West and the Islamic world makes America's relationship with Turkey--a Western-oriented, democratizing Muslim country--more important than ever. Unfortunately, despite the long history of close collaboration, U.S.-Turkish relations have deteriorated markedly over the last three years. The U.S. invasion of Iraq--and the potential consequences for Turkey with its large Kurdish population--is the primary issue that divides Washington and Ankara, but there are also differences regarding Cyprus, Syria, Iran, Israel, and Hamas, as well as a rising tide of anti-Americanism in Turkey. To repair this important alliance relationship, Washington should establish a regular trilateral dialogue involving the United States, Turkey, and Iraqi Kurds; play a leading role in seeking a settlement to the long-standing dispute over Cyprus; be more active in supporting Ankara's bid for EU membership; and work to create a U.S.-Turkey Cooperation Commission that would meet on a biannual basis to provide a structured forum for government agencies, NGOs, and private sector leaders from both countries to discuss matters of mutual concern.

All Publications button
1
Publication Type
Policy Briefs
Publication Date
Journal Publisher
Council on Foreign Relations
Authors
Authors
News Type
Commentary
Date
Paragraphs
In the war on terror, the United States has become a military theater of operations. At stake, writes CISAC fellow Laura K. Donohue, is the long-held "principle, embedded in the 1878 Posse Comitatus Act, that the U.S. military not be used for domestic law enforcement."

Today, the Senate Intelligence Committee will begin questioning Air Force Gen. Michael Hayden, nominated to be director of the Central Intelligence Agency, about the National Security Agency's collection of U.S. citizens' telephone records.

The scrutiny of the NSA is deserved, but the Senate and the American public may be missing a broader and more disturbing development. For the first time since the Civil War, the United States has been designated a military theater of operations. The Department of Defense -- which includes the NSA -- is focusing its vast resources on the homeland. And it is taking an unprecedented role in domestic spying.

It may be legal. But it circumvents three decades of efforts by Congress to restrict government surveillance of Americans under the guise of national security. And it represents a profound shift in the role of the military operating inside the United States. What's at stake here is the erosion of the principle, embedded in the 1878 Posse Comitatus Act, that the U.S. military not be used for domestic law enforcement.

When the administration declared the United States to be a theater of military operations in 2002, it created a U.S. Northern Command, which set up intelligence centers in Colorado and Texas to analyze the domestic threat. But these are not the military's only domestic intelligence efforts. According to the Congressional Research Service, the Pentagon controls "a substantial portion" of U.S. national intelligence assets, the traditional turf of the FBI and CIA.

In 2003, Congress created the job of undersecretary of Defense for intelligence to oversee the department's many intelligence bodies -- including a new entity called Counterintelligence Field Activity, or CIFA.

CIFA was ordered to maintain a "domestic law-enforcement database" on "potential terrorist threats" to U.S. military installations, and it began collecting information on U.S. citizens.

In 2005, a presidential commission suggested that CIFA, set up as a clearinghouse for information, be empowered to conduct domestic investigations into crimes such as treason, espionage and terrorism. Astoundingly, the commission declared that such an expansion of military powers would not require congressional approval; a presidential order and Pentagon directive would suffice. One Defense Department program feeding information to CIFA is TALON (Threat and Local Observation Notice), which is supposed to obtain data from "concerned citizens and military members regarding suspicious incidents" that could herald terrorist attacks. But the military appears to have interpreted its mandate broadly. A TALON report was filed on a protest against "war profiteering" by Halliburton, Newsweek reported. The protesters alleged the defense contractor overcharged for food for U.S. troops in Iraq.

Counterintelligence reports were also filed on New York University's OUTlaw, a decades-old organization of openly gay law students. "The term 'outlaw' is a backhanded way of saying it's all right to commit possible violence," concluded one misguided military investigator in a document obtained last month under the Freedom of Information Act." NBC reported that about four dozen TALON database entries on "suspicious incidents" were not about terrorism but about opposition to the Iraq war and military recruiting.

These misguided military forays into domestic surveillance harken back to Vietnam War-era abuses. This time, they are the result of a much broader intelligence-gathering effort by the military on U.S. soil. President Bush said last week, "We're not mining or trolling through the personal lives of millions of innocent Americans." But a 2004 survey by the General Accounting Office found 199 data-mining operations that collect information ranging from credit-card statements to medical records. The Defense Department had five programs on intelligence and counterterrorism.

The Defense Intelligence Agency, created in 1961 to provide foreign military intelligence, now uses "Verity K2" software to scan U.S. intelligence files and the Internet "to identify foreign terrorists or Americans connected to foreign terrorism activity," and "Inxight Smart Discovery" software to help identify patterns in databases. CIFA has reportedly contracted with Computer Sciences Corp. to buy identity-masking software, which could allow it to create fake websites and monitor legitimate U.S. sites without leaving clues that it had been there. The National Geospatial-Intelligence Agency is collecting data from 133 U.S. cities; intelligence sources told the Los Angeles Times that, when collection is completed, the agency would be able to identify occupants in each house, their nationality and even their political affiliation.

In 2002, the Defense Department launched the granddaddy of all data-mining efforts, Total Information Awareness, to trawl through all government and commercial databases available worldwide. In 2003, concerned about privacy implications, Congress cut its funding. But many of the projects simply transferred to other Defense Department agencies. Two of the most important, the Information Awareness Prototype System and Genoa II, moved to NSA headquarters.

The Pentagon argues that its monitoring of U.S. citizens is legal. "Contrary to popular belief, there is no absolute ban on intelligence" agencies collecting information on Americans or disseminating it, says a memo by Robert Noonan, deputy chief of staff for intelligence. Military intelligence agents can receive any information "from anyone, any time," Noonan wrote.

Throughout U.S. history, we have struggled to balance security concerns with the protection of individual rights, and a thick body of law regulates domestic law enforcement agencies' behavior. Congress should think twice before it lets the behemoth Defense Department into domestic law enforcement.

All News button
1
-

Professor Li Shian is a Professor of History and Director of American and European Studies at Beijing's Renmin University. He is the Chief Editor of the journal World History and is a Council Member of the China Society for Human Rights Studies, which he has represented at several international human rights conferences. A former Chairman of the History Department at Renmin University, Dr. Li was awarded his doctorate at the University of Birmingham in 1989, and did post-graduate work at Stanford University from July 1990 to October 1992. He is the author of several books, including A Study of American Human Rights History and A History of the Development of Western Capitalism.

Professor Li will deliver remarks on the role human rights plays in US-China relations, from a Chinese perspective. He will begin with an exposition of human rights in traditional and post-1949 China, and drawing on this, review US-China exchanges on human rights post-June 4, 1989. He will discuss different approaches for addressing what Chinese and Americans both recognize as a central if contentious issue in their relations: respect for international laws as they protect both individual and collective freedoms.

Philippines Conference Room

Li Shian Professor of History and Director of American and European Studies Speaker Beijing's Renmin University
Seminars
Paragraphs

Today, the Senate Intelligence Committee will begin questioning Air Force Gen. Michael Hayden, nominated to be director of the Central Intelligence Agency, about the National Security Agency's collection of U.S. citizens' telephone records.

The scrutiny of the NSA is deserved, but the Senate and the American public may be missing a broader and more disturbing development. For the first time since the Civil War, the United States has been designated a military theater of operations. The Department of Defense -- which includes the NSA -- is focusing its vast resources on the homeland. And it is taking an unprecedented role in domestic spying.

It may be legal. But it circumvents three decades of efforts by Congress to restrict government surveillance of Americans under the guise of national security. And it represents a profound shift in the role of the military operating inside the United States. What's at stake here is the erosion of the principle, embedded in the 1878 Posse Comitatus Act, that the U.S. military not be used for domestic law enforcement.

When the administration declared the United States to be a theater of military operations in 2002, it created a U.S. Northern Command, which set up intelligence centers in Colorado and Texas to analyze the domestic threat. But these are not the military's only domestic intelligence efforts. According to the Congressional Research Service, the Pentagon controls "a substantial portion" of U.S. national intelligence assets, the traditional turf of the FBI and CIA.

In 2003, Congress created the job of undersecretary of Defense for intelligence to oversee the department's many intelligence bodies -- including a new entity called Counterintelligence Field Activity, or CIFA.

CIFA was ordered to maintain a "domestic law-enforcement database" on "potential terrorist threats" to U.S. military installations, and it began collecting information on U.S. citizens.

In 2005, a presidential commission suggested that CIFA, set up as a clearinghouse for information, be empowered to conduct domestic investigations into crimes such as treason, espionage and terrorism. Astoundingly, the commission declared that such an expansion of military powers would not require congressional approval; a presidential order and Pentagon directive would suffice. One Defense Department program feeding information to CIFA is TALON (Threat and Local Observation Notice), which is supposed to obtain data from "concerned citizens and military members regarding suspicious incidents" that could herald terrorist attacks. But the military appears to have interpreted its mandate broadly. A TALON report was filed on a protest against "war profiteering" by Halliburton, Newsweek reported. The protesters alleged the defense contractor overcharged for food for U.S. troops in Iraq.

Counterintelligence reports were also filed on New York University's OUTlaw, a decades-old organization of openly gay law students. "The term 'outlaw' is a backhanded way of saying it's all right to commit possible violence," concluded one misguided military investigator in a document obtained last month under the Freedom of Information Act." NBC reported that about four dozen TALON database entries on "suspicious incidents" were not about terrorism but about opposition to the Iraq war and military recruiting.

These misguided military forays into domestic surveillance harken back to Vietnam War-era abuses. This time, they are the result of a much broader intelligence-gathering effort by the military on U.S. soil. President Bush said last week, "We're not mining or trolling through the personal lives of millions of innocent Americans." But a 2004 survey by the General Accounting Office found 199 data-mining operations that collect information ranging from credit-card statements to medical records. The Defense Department had five programs on intelligence and counterterrorism.

The Defense Intelligence Agency, created in 1961 to provide foreign military intelligence, now uses "Verity K2" software to scan U.S. intelligence files and the Internet "to identify foreign terrorists or Americans connected to foreign terrorism activity," and "Inxight Smart Discovery" software to help identify patterns in databases. CIFA has reportedly contracted with Computer Sciences Corp. to buy identity-masking software, which could allow it to create fake websites and monitor legitimate U.S. sites without leaving clues that it had been there. The National Geospatial-Intelligence Agency is collecting data from 133 U.S. cities; intelligence sources told the Los Angeles Times that, when collection is completed, the agency would be able to identify occupants in each house, their nationality and even their political affiliation.

In 2002, the Defense Department launched the granddaddy of all data-mining efforts, Total Information Awareness, to trawl through all government and commercial databases available worldwide. In 2003, concerned about privacy implications, Congress cut its funding. But many of the projects simply transferred to other Defense Department agencies. Two of the most important, the Information Awareness Prototype System and Genoa II, moved to NSA headquarters.

The Pentagon argues that its monitoring of U.S. citizens is legal. "Contrary to popular belief, there is no absolute ban on intelligence" agencies collecting information on Americans or disseminating it, says a memo by Robert Noonan, deputy chief of staff for intelligence. Military intelligence agents can receive any information "from anyone, any time," Noonan wrote.

Throughout U.S. history, we have struggled to balance security concerns with the protection of individual rights, and a thick body of law regulates domestic law enforcement agencies' behavior. Congress should think twice before it lets the behemoth Defense Department into domestic law enforcement.

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
Los Angeles Times
Authors
Subscribe to Society