Several noteworthy new hearing volumes on national security policy have recently appeared (all pdf). In most cases, the published volumes include valuable new supplementary material for the record.
“Examining the State Secrets Privilege: Protecting National Security While Preserving Accountability,” Senate Judiciary Committee, February 13, 2008 (published December 2009) (large pdf).
“Coercive Interrogation Techniques: Do They Work, Are They Reliable, and What Did the FBI Know About Them?”, Senate Judiciary Committee, June 10, 2008 (published December 2009) (large pdf).
“Protecting National Security and Civil Liberties: Strategies for Terrorism Information Sharing,” Senate Judiciary Committee, April 21, 2009 (published January 2010).
“Chinese Interrogation vs. Congressional Oversight: The Uighurs at Guantanamo,” House Foreign Affairs Committee, July 16, 2009 (published December 2009).
To increase the real and perceived benefit of research funding, funding agencies should develop challenge goals for their extramural research programs focused on the impact portion of their mission.
Without trusted mechanisms to ensure privacy while enabling secure data access, essential R&D stalls, educational innovation stalls, and U.S. global competitiveness suffers.
Satellite imagery has long served as a tool for observing on-the-ground activity worldwide, and offers especially valuable insights into the operation, development, and physical features related to nuclear technology.
This year’s Red Sky Summit was an opportunity to further consider what the role of fire tech can and should be – and how public policy can support its development, scaling, and application.