• Heritage Action
  • More

Department of Defense

Our Research & Offerings on Department of Defense
  • Backgrounder posted May 21, 2015 by James Jay Carafano, Ph.D., Charles "Cully" Stimson, Steven P. Bucci, Ph.D., John Malcolm, Paul Rosenzweig Section 215 of the PATRIOT Act and Metadata Collection: Responsible Options for the Way Forward

    Updated May 29, 2015 The Real and Growing Threat of Terrorism Any debate about America’s counterterrorism capabilities must be conducted in the context of the actual terrorist threat the U.S. faces. Since 9/11, The Heritage Foundation has tracked Islamist terrorist plots and attacks, which now, after the recent shooting in Garland, Texas, total 68.[1] This figure,…

  • Special Report posted April 24, 2015 by James Jay Carafano, Ph.D., Charlotte Florance, Daniel J Kaniewski The Ebola Outbreak of 2013–2014: An Assessment of U.S. Actions

    The task force chairmen, steering committee members, and participants remind readers of this report that the affiliations of the contributors are listed only for identification and that they do not imply institutional endorsement. Contributors to this report do not necessarily represent their institutions, and every member of the task force does not necessarily endorse…

  • Issue Brief posted April 15, 2015 by David Inserra Time to Reform the U.S. Counterterrorism Enterprise—Now

    Several months ago, President Obama announced that the Department of Homeland Security (DHS) would provide work authorization and protection from deportation to as many as 5 million unlawful immigrants. While The Heritage Foundation has written extensively on the harm done to the U.S. immigration system and the rule of law, another serious side effect of Obama’s executive…

  • Backgrounder posted March 23, 2015 by James Jay Carafano, Ph.D. Defense Reform by the Numbers: Four Crucial Priorities for the Next Administration

    The Heritage Foundation recently released the 2015 Index of U.S. Military Strength. This comprehensive survey of American military power evaluates the state of the Armed Forces, current threats, and the operating environment in which U.S. forces might be called on to defend a vital interest. The overall findings of the evaluation conclude that the American military is…

  • Testimony posted March 17, 2015 by Steven P. Bucci, Ph.D. Visa Waiver Program Improves Security

    Testimony before the Subcommittee on Border and Maritime Security, Committee on Homeland Security, United States House of Representatives March 17, 2015 Steven P. Bucci, PhD Director, The Heritage Foundation My name is Steven Bucci. I am Director of the Douglas and Sarah Allison Center for Foreign and National Security Policy in The Heritage Foundation’s…

  • Backgrounder posted March 16, 2015 by Steven P. Bucci, Ph.D., Dean Cheng, Brian Slattery, Theodore R. Bromund, Ph.D., Michaela Dodge, Luke Coffey, David Inserra, Charles "Cully" Stimson 10 Objectives for the FY 2016 National Defense Authorization Act

    The National Defense Authorization Act (NDAA) is a central piece of legislation for Congress each year. Not only has the NDAA been passed 53 years in a row, it is one of the last remaining bills that enjoys true bipartisan consensus. The annual legislation has been able to rise above the political fray in part because Congress understands the critical need to set defense…

  • Issue Brief posted March 3, 2015 by David Inserra Congress Should Expand Trusted Traveler Programs and Private Airport Screeners

    Several months ago, President Obama announced that the Department of Homeland Security (DHS) would provide work authorization and protection from deportation to as many as 5 million unlawful immigrants. A serious side effect of this action is the harmful redirection of attention and resources away from other pressing homeland security issues ranging from terrorism to…

  • Issue Brief posted February 23, 2015 by Riley Walters The U.S. Needs to Secure Maritime Ports by Securing Network Ports

    Maritime connectedness continues to be a key asset for U.S. economic and strategic interests. Threats to port and vessel network systems have long been overshadowed by concerns about kinetic attacks and supply-chain security. All maritime stakeholders remain at risk of cyber intrusion as cyber attackers seek any and all means of accessing maritime networks. Therefore, key…

  • Issue Brief posted February 4, 2015 by David Inserra FEMA Reform Needed: Congress Must Act

    Several weeks ago, President Barack Obama announced that the Department of Homeland Security (DHS) would provide work authorization and protection from deportation to as many as 5 million unlawful immigrants. A serious consequence of this policy is the harmful redirection of attention and resources from other pressing homeland security issues. In order to implement the…

  • Issue Brief posted January 26, 2015 by David Inserra Congress Should Refocus DHS on Crucial Cybersecurity Reforms

    Several weeks ago, President Barack Obama announced that the Department of Homeland Security (DHS) would provide work authorization and protection from deportation to as many as 5 million unlawful immigrants. While Heritage has written on the harm done by the President’s executive actions to the U.S. immigration system and the rule of law, another serious side effect is…

Find more work on Department of Defense
  • Lecture posted May 5, 2004 by The Honorable Frank J. Williams Abraham Lincoln and Civil Liberties in Wartime

    This month, several individuals detained as "enemy combatants" will make their appeals for freedom to the highest court in the land. Perhaps now, more than any other time in recent memory, the eyes of the world are intensely focused on the United States Supreme Court. In making their decisions, they must walk a fine line between protecting the civil liberties we all…

  • Center for Data Analysis Report posted November 7, 2005 by Tim Kane, Ph.D. Who Bears the Burden? Demographic Characteristics of U.S. Military Recruits Before and After 9/11

    A few Members of Congress, motivated by American combat in the Middle East, have called for the reinstatement of a compulsory military draft. The case for coercing young citizens to join the military is supposedly based on social jus­tice?that all should serve?and seems to be but­tressed by reports of shortfalls in voluntary enlistment. In a New York Times op-ed…

  • Backgrounder posted July 26, 2010 by Sally McNamara, Ariel Cohen, Ph.D., James Phillips Countering Turkey’s Strategic Drift

    Abstract: For decades, Turkey and the United States cooperated in the Mediterranean, the Persian Gulf, Central Asia, and even Korea. However, Turkish and U.S. interests in the Balkans, Central Asia, the Caucasus, the Middle East, and the Persian Gulf have recently diverged. On its current trajectory, Turkey’s traditional strategic relationship with the West could devolve…

  • Backgrounder posted January 10, 2011 by Mackenzie Eaglen, Julia Pollak How to Save Money, Reform Processes, and Increase Efficiency in the Defense Department

    Abstract: After the sweeping cuts in the FY 2010 defense spending bill and with the proposed reductions in FY 2011, further defense cuts would jeopardize long-standing core capabilities that comprise the foundation of American military strength. Nevertheless, policymakers should relentlessly pursue greater efficiencies within defense operations and eliminate waste and…

  • Backgrounder posted March 16, 2015 by Steven P. Bucci, Ph.D., Dean Cheng, Brian Slattery, Theodore R. Bromund, Ph.D., Michaela Dodge, Luke Coffey, David Inserra, Charles "Cully" Stimson 10 Objectives for the FY 2016 National Defense Authorization Act

    The National Defense Authorization Act (NDAA) is a central piece of legislation for Congress each year. Not only has the NDAA been passed 53 years in a row, it is one of the last remaining bills that enjoys true bipartisan consensus. The annual legislation has been able to rise above the political fray in part because Congress understands the critical need to set defense…

  • Backgrounder posted August 7, 2012 by Bruce Klingner, Dean Cheng U.S. Asian Policy: America's Security Commitment to Asia Needs More Forces

    Abstract: Since the 19th century, Asia has been—and will continue to be—a region of vital importance to the United States. And yet, even as the threats to stability in Asia multiply, there has not been a commensurate increase of U.S. capabilities. While the Obama Administration believes its “Asia Pivot” will animate U.S. policy toward Asia, the U.S. military lacks the…

  • Testimony posted July 15, 2010 by James Jay Carafano, Ph.D. Responsible Contracting: Modernizing the Business of Government for National Security

    Testimony before the Committee on the Budget United States Senate July 15, 2010 Responsible Contracting: Modernizing the Business of Government for National Security My name is Dr. James Jay Carafano. I am the Deputy Director of the Kathryn and Shelby Cullom Davis…

  • Backgrounder posted May 3, 2013 by Michaela Dodge Beyond BRAC: Global Defense Infrastructure for the 21st Century

    The budget cuts instituted under the Budget Control Act of 2011 are compelling the Administration and Congress to decrease the Department of Defense’s resources. These cuts dramatically undermine the country’s ability to protect its vital interests.[1] The cuts also increase pressures to conduct more base realignments and closures (BRACs). As these pressures increase, it…

  • Backgrounder posted May 6, 2010 by Baker Spring Performance-Based Logistics: Making the Military More Efficient

    Abstract: The military should—and can—operate more efficiently. One area that has potential for major savings is logistics. As combat capabilities grow, the logistics system must adapt. Performance-based logistics is an approach that organizes logistics around these increasing combat capabilities, offering huge savings (up to $32 billion a year) in the process. But…

  • WebMemo posted August 26, 2010 by Paul Rosenzweig Cyber Security: A Complex "Web" of Problems

    The Obama Administration made a strong start at rationalizing U.S. cyber security policies, including an initial 100-day review of existing protocol and the creation of a “cyber coordinator” position.[1] Unfortunately, the momentum with which the Administration started seems to have waned. As a result, though the U.S. is better organized now than it was three years ago,…

Find more work on Department of Defense
Find more work on Department of Defense
Find more work on Department of Defense