How Everything Became War and the Military Became Everything: Tales from the Pentagon
by Rosa Brooks
Societies often go to great lengths to separate war from peace. Wars are declared, sometimes with elaborate ritual. Soldiers wear uniforms and are part of specialized hierarchical organizations. Battlefields are often delineated. Maintaining this distinction is important because what is permissible in wartime is often prohibited in peacetime. Preventing the …
If he wants to succeed where Obama failed, he will need to get tough with Putin. If he does not, then he may face a situation in which Assad’s atrocities continue to attract the extremist response that Trump says is his first priority to subdue.
Chomsky undermines the facile if comforting myths that are often used to justify US action abroad—the distinction between, as he puts it, “what we stand for” and “what we do.” His views are held not only by American critics on the left but also by many people around the world who are more likely to think of themselves as targeted rather than protected by US military power.
Introduction Modern slavery takes many forms, but most slaves are forced to work in the shadows. Those who control modern slaves—whether men compelled to work on Thai fishing boats, domestic workers trapped in the homes of their Saudi employers, children ordered to beg in Senegal, bonded workers in India, or …
Whether the issue is torture, Guantánamo, military commissions, drone attacks, or electronic surveillance, Barack Obama’s tenure has been one of disappointment for those who had hoped for a more consistently rights-respecting approach to combating terrorism.
Following months of Snowden disclosures, the extent to which the National Security Agency’s extraordinary surveillance infringes on the privacy of our communications and other vast areas of our lives has become widely apparent. Far less appreciated, however, is the global threat it poses to freedom of expression. After the revelations about NSA surveillance, many countries have said they may require Internet companies to keep data about their citizens on servers within their own borders. If that becomes standard practice, it will be easier for repressive governments to monitor Internet communications.
As a federal prosecutor in the 1980s, I used to think nothing of scooping up the phone numbers that a suspect called. I viewed that surveillance as no big deal because the Supreme Court had ruled in Smith v. Maryland (1979) that we have no reasonable expectation of privacy in the phone numbers we dial, as opposed to the content of the calls. And in any event, I had limited time or practical ability to follow up on those numbers. Today, by contrast, when I look at the government’s large-scale electronic surveillance of private communications, I see an urgent need to rethink the rationale—and legal limits—for such intrusion.