Oct 6, 2022
New resource explains how over-investment in militarism and under-investment in climate solutions have contributed to the failure to mitigate climate change – and that ways that we can reinvest military spending to combat the worst existential threat to our communities.
Sep 29, 2022
How Washington’s climate spending compares to its investments in the military.
Sep 20, 2022
In The Nation, Bill Hartung reviews IPS Associate Fellow Miriam Pemberton’s new book.
Mar 2, 2021
As we saw in Texas, climate change is a major security risk. But it’s not the kind the military is well equipped to handle.
Feb 26, 2021
Militarism isn’t security. Real security encompasses justice, health, housing, food, education, and civil rights.
Feb 3, 2017
In this interview with Vox, IPS drug policy expert Sanho Tree explains how evolution could have predicted the failure of the war on drugs.
Jan 26, 2017
No matter how tall or deep Trump’s wall is, it will not stop the flow of drugs or traffickers into the U.S., in fact it will heighten the national security risk.
Oct 6, 2016
Should we rethink the way voters weigh in directly on matters of national security and international relations?
Oct 5, 2016
Help us spread the word about our latest report, “Combat Vs. Climate: The Military and Climate Security Budgets Compared”
Oct 5, 2016
The Military and Climate Security Budgets Compared
Jun 3, 2016
IPS’s Phyllis Bennis tells the Real News Network that although Clinton rightfully used her national security speech to condemn the bigotry and danger of Trump’s positions, she didn’t lay out a much better alternative.
Mar 2, 2016
The feds dropped the ball on a key terrorism case, so now they’re going after privacy itself.
Oct 14, 2015
In a field defined more by conformity than contradiction, here’s where the candidates split.
Jun 5, 2015
A new special issue of The Nation brings an inequality frame to our current cyber world.
May 27, 2015
Join us for a reception with Ronald Goldfarb, celebrating the release of his new book on “Privacy, Secrecy, and Security in the Information Age.”