The Right to Privacy in Lebanon

Total Page:16

File Type:pdf, Size:1020Kb

The Right to Privacy in Lebanon Universal Periodic Review Stakeholder Report: 23rd Session, Lebanon The Right to Privacy in Lebanon Submitted by Privacy International, Social Media Exchange and the Association for Progressive Communication The Right to Privacy in Lebanon Stakeholder Report Universal Periodic Review 23rd S e s s io n - L e b a n o n Subm itted by Privacy International, Social M edia Exchange and th e Association for Progressive Comm unication March 2015 In tro d u c tio n 1.This stakeholder report is a subm ission by Privacy International,Social Media Exchange and Association for Progressive Com m unication. Privacy International (PI) is an international hum an rights organisation that works to advance and prom ote the right to privacy around the world. TheSocial Media Exchange (SMEX)is a registered Lebanese nonprofit that conducts tra in in g , re s e a rc h , a n d a d v o c a c y o n s tra te g ic c o m m u n ic a tio n s a n d h u m a n rig h ts in th e d ig ita l era. The Association for Progressive Comm unication (APC) is a n in te rn a tio n a l o rg a n iza tio n and network w ith EC O SO C Status. Its m ission is to em pow er and support organizations, social m ovem ents and individuals in and through the use of inform ation and com m unication te c h n o lo g ie s . 2.Together PI,SM EX a n d A P C w is h to b rin g th e ir c o n c e rn s a b o u t th e p ro te c tio n a n d p ro m o tio n of the right to privacy in Lebanon before the Hum an Rights C ouncil for consideration in Lebanon’s upcom ing review. The right to privacy 3.Privacy is a fundam ental hum an right, enshrined in num erous international hum an rights in s tru m e n ts .1 It is central to the protection of hum an dignity and form s the basis of any dem ocratic society. It also supports and reinforces other rights, such as freedom of expression, information and association. The right to privacy em bodies the presum ption that in d iv id u a ls s h o u ld h a v e a n a re a o f a u to n o m o u s d e v e lo p m e n t, in te ra c tio n a n d lib e rty , a “private sphere” with or without interaction with others, free from arbitrary State intervention and from excessive unsolicited intervention by other uninvited individuals.2 4.Activities that restrict the right to privacy, such as surveillance and censorship, can only be ju s tifi e d w h e n th e y a re p re s c rib e d b y la w , n e c e s s a ry to a c h ie v e a le g itim a te a im , a n d proportionate to the aim pursued.3 5.As innovations in information technology have enabled previously unimagined forms of collecting, storing and sharing personal data, the right to privacy has evolved to encapsulate State obligations related to the protection of personal data.4 A num ber of international 1 Universal Declaration of Human Rights Article 12, United Nations Convention on Migrant Workers Article 14, UN Convention of th e P ro te c tio n o f th e C h ild A rtic le 1 6 , In te rn a tio n a l C o v e n a n t o n C ivil a n d P o litic a l R ig h ts , In te rn a tio n a l C o v e n a n t o n C ivil a n d Political Rights Article 17; regional conventions including Article 10 of the African Charter on the Rights and Welfare of the Child, Article 11 of the American Convention on Human Rights, Article 4 of the African Union Principles on Freedom of Expression, Article 5 of the American Declaration of the Rights and Duties of Man, Article 21 of the Arab Charter on Human Rights, and Article 8 of the European Convention for the Protection of Human Rights and Fundamental Freedom s; Johannesburg Principles on National Security, Free Expression and Access to Information, Cam den Principles on Freedom of Expression and Equality. 2 Martin Scheinin, Report of the Special Rapporteur on the promotion and protection of human rights and fu n d a m e n ta l fre e d o m s w h ile c o u n te rin g te rro rism , 2 0 0 9 , A /H R C /1 7 /3 4 . 3 Universal Declaration of Human Rights Article 29; General Comment No. 27, Adopted by The Human Rights Committee Under Article 40, Paragraph 4, Of The International Covenant On Civil And Political Rights, CC PR/C/21/Rev.1/Add.9, November 2, 1999; see also M artin Scheinin, “Report of the Special Rapporteur on the prom otion and protection of human rights and fu n d a m e n ta l fre e d o m s w h ile c o u n te rin g te rro rism ,” 2 0 0 9 , A /H R C /1 7 /3 4 . 4 Human Rights Committee general comment No. 16 (1988) on the right to respect of privacy, family, home and correspondence, and protection of honour and reputation (art. 17). in s tru m e n ts e n s h rin e d a ta p ro te c tio n p rin c ip le s , 5 and many domestic legislatures have in c o rp o ra te d s u c h p rin c ip le s in to n a tio n a l la w . 6 Follow up to the previous UPR 6.There was no mention of the right to privacy and data protection either in the National Report subm itted by Lebanon or in the report of the W orking G roup. 7.However, at the last review, Armenia submitted a recommendation to Lebanon on guaranteeing freedom of expression w hich read,“C ontinue to guarantee freedom of expression7 c re a tin g a d d itio n a l c o n d itio n s fo r its fu lfi lm e n t.” 8 Domestic laws and regulations related to privacy 8.Article 14 of the Lebanese Constitution does ensure the inviolability of the hom e: “The citizen's place of residence is inviolable. N o one m ay enter it except in the circumstances and manners prescribed by Law.” 9.Articles 8 and 13 of the Constitution indirectly protect the right to privacy9 w ith the fo rm er guaranteeing individual liberty and the latter freedom of expression. It had been interpreted th a t th e s e la w s in c lu d e th e s e c re c y o f a ll m e a n s o f c o m m u n ic a tio n s , b o th m a il a n d te le p h o n e calls.10 10.The Law No. 140 related to the protection of secrecy of com m unications carried out by all means of communication, stipulates that the right to secrecy of communications, both in te rn a l a n d e x te rn a l, b y a ll m e a n s w ire d o r w ire le s s (la n d lin e s a n d m o b ile o f a ll ty p e s in c lu d in g m o b ile te le p h o n e , fa x , e le c tro n ic m a ils ) is g u a ra n te e d a n d p ro te c te d b y la w a n d cannot be subjected to any forms of tapping, surveillance, interception or violation except in th e c a s e s , a n d b y th e m e a n s a n d p ro c e d u re s , p re s c rib e d b y la w . A rtic le 9 8 o f th e L e b a n e s e Code of Civil Procedures regulates the regime applicable to search and seizures. 11.Whilst there is no data protection framework in place, various laws protect personal data including, Article 2 of the Banking Secrecy Law of Septem ber 3, 1956 (the Banking Secrecy Law ), and the penal code under Article 579, 580 and 581 relating to the violation of secrets, Article 7 of the Code of M edical Ethics (Law no. 288 of February 22, 1994) protects the confidentiality of physician and patients relationships, and Articles 51 and 58 of the Consumer Protection Code (Law no. 659 of 4 February 2005) says that suppliers must not disclose data without the consent of the consum er.
Recommended publications
  • Re Joinder Submitted by the Republic of Uganda
    INTERNATIONAL COURT OF JUSTICE CASE CONCERNING ARMED ACTIVITIES ON THE TERRITORY OF THE CONGO DEMOCRATIC REPUBLIC OF THE CONGO v. UGANDA REJOINDER SUBMITTED BY THE REPUBLIC OF UGANDA VOLUME 1 6 DECEMBER 2002 TABLE OF CONTENTS Page INTRODUCTION .................................................................... 1 CHAPTER 1 : THE PERSISTENT ANOMALIES IN THE REPLY CONCERNING MATTERS OF PROCEDURE AND EVIDENCE ............................................... 10 A. The Continuing Confusion Relating To Liability (Merits) And Quantum (Compensation) ...................... 10 B. Uganda Reaffirms Her Position That The Court Lacks Coinpetence To Deal With The Events In Kisangani In June 2000 ................................................ 1 1 C. The Courl:'~Finding On The Third Counter-Claim ..... 13 D. The Alleged Admissions By Uganda ........................... 15 E. The Appropriate Standard Of Proof ............................. 15 CHAPTER II: REAFFIRMATION OF UGANDA'S NECESSITY TO ACT IN SELF- DEFENCE ................................................. 2 1 A. The DRC's Admissions Regarding The Threat To Uganda's Security Posed By The ADF ........................ 27 B. The DRC's Admissions Regarding The Threat To Uganda's Security Posed By Sudan ............................. 35 C. The DRC's Admissions Regarding Her Consent To The Presetnce Of Ugandan Troops In Congolese Territory To Address The Threats To Uganda's Security.. ......................................................................4 1 D. The DRC's Failure To Establish That Uganda Intervened
    [Show full text]
  • Improving Counterterrorism and Law Enforcement Cooperation Between the United States and the Arab Gulf States
    Improving Counterterrorism and Law Enforcement Cooperation between the United States and the Arab Gulf States Thomas Warrick and Joze Pelayo Scowcroft Middle East Security Initiative The Atlantic Council’s Scowcroft Middle East Security Initiative honors the legacy of Brent Scowcroft and his tireless efforts to build a new security architecture for the region. Our work in this area addresses the full range of security threats and challenges including the danger of interstate warfare, the role of terrorist groups and other nonstate actors, and the underlying security threats facing countries in the region. Through all of the Council’s Middle East programming, we work with allies and partners in Europe and the wider Middle East to protect US interests, build peace and security, and unlock the human potential of the region. You can read more about our programs at www.atlanticcouncil.org/ programs/middle-east-programs/. Task Force on Mideast Counterterrorism – Law Enforcement Cooperation ■ Javed Ali, Towsley Policymaker in Residence, Gerald R. Ford School of Public Policy, University of Michigan ■ Kirsten Fontenrose, Director, Scowcroft Middle East Security Initiative, Atlantic Council ■ Daniel L. Glaser, Principal, Financial Integrity Network ■ Bernard Hudson, Nonresident Fellow, Belfer Center for Science and International Affairs ■ Michael McGarrity, Vice President Global Risk Services, Global Guardian ■ Pamela G. Quanrud, Former Director, C-ISIL Coalition, US Department of State ■ Todd Rosenblum, Nonresident Senior Fellow, Scowcroft Center
    [Show full text]
  • Considering the Creation of a Domestic Intelligence Agency in the United States
    HOMELAND SECURITY PROGRAM and the INTELLIGENCE POLICY CENTER THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY research organization providing POPULATION AND AGING PUBLIC SAFETY objective analysis and effective SCIENCE AND TECHNOLOGY solutions that address the challenges SUBSTANCE ABUSE facing the public and private sectors TERRORISM AND HOMELAND SECURITY around the world. TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Homeland Security Program RAND Intelligence Policy Center View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity.
    [Show full text]
  • UK Eyes Alpha by the Same Author UK Eyes Alpha Big Boys' Rules: the SAS and the Secret Struggle Against the IRA Lnside British Lntelligence
    UK Eyes Alpha By the same author UK Eyes Alpha Big Boys' Rules: The SAS and the secret struggle against the IRA lnside British lntelligence Mark Urban tr firhrr anr/ fulrr' ft For Ruth and Edwin Contents lntroduction Part One The First published in I996 1 Coming Earthquake 3 and Faber Limited by Faber 2 A Dark and Curious Shadow 13 3 Queen Square London vcrN JAU 3 The Charm Offensive 26 Typeset by Faber and Faber Ltd Printed in England by Clays Ltd, St Ives plc 4 Most Ridiculed Service 42 All rights reserved 5 ZIRCON 56 O Mark Urban, 1996 6 Springtime for Sceptics 70 Mark Urbar-r is hereby identified as author of 7 A Brilliant Intelligence Operation 84 this work in accordance with Section 77 of the Copyright, Designs and Patents Act 1988 8 The \7all Comes Tumbling Down 101 A CIP rccord for this book is available from the Part Two British Library 9 Supergun LL7 tsnN o-57r-r7689-5 10 Black Death on the Nevsky Prospekt L29 ll Assault on Kuwait L43 12 Desert Shield 153 13 Desert Storm 165 14 Moscow Endgame LA2 Part Three l5 An Accidcnt of History L97 l(r Irrlo thc ll:rllirrn 2LO tt),)B / (,1,1 l, I Qulgrnirc 17 Time for Revenge 22L lntroduction 18 Intelligence, Power and Economic Hegemony 232 19 Very Huge Bills 245 How good is British intelligence? What kind of a return do ministers and officials get 20 The Axe Falls 2il for the hundreds of millions of pounds spent on espionage each year? How does this secret establishment find direction and purpose 2l Irish Intrigues 269 in an age when old certainties have evaporated? Very few people, even in Conclusion 286 Whitehall, would feel confident enough to answer these questions.
    [Show full text]
  • NYU/CIC Draft Report
    Pathways to Change Baseline Study to Identify Theories of Change on Political Settlements and Confidence Building By Molly Elgin-Cossart, Bruce Jones, and Jane Esberg July 31, 2012 This is one part of a two-part preliminary study. It is designed to excavate, through interviews with development field staff, perspectives and story lines on how international actors (especially development actors) can influence the degree of inclusiveness of political settlements. This is an interim step to a longer-term, more comprehensive study to assess the causal relationship between donor programming and political settlements. The purpose of this initial study is to narrow the field of inquiry by providing ‘theories of change’ that can then be tested. A cognate study, more conceptually oriented, focuses on political settlements (defined below) that follow violence or episodes or imminent threatened violence, to provide an exegesis of the argument that ‘inclusive enough’ settlements matter to stability and thus development in fragile states. That study is designed to help establish a research agenda that could test and refine that proposition. Prepared with support from the UK Department for International Development, the Norwegian Ministry of Foreign Affairs, and the Carnegie Corporation. 1 Preface ........................................................................................................................... 3 Background: Why an emphasis on inclusive political settlements? ........................... 4 Research approach .......................................................................................................
    [Show full text]
  • National Security Agency/Central Security Service
    Description of document: National Security Agency/Central Security Service (NSA/CSS) United States Cryptologic History, Special Series Crisis Collection Volume 2, The Suez Crisis: A Brief Comint History, 1988 Interagency Security Classification Appeals Panel (ISCAP) appeal 2013 ISCAP release date: 05-March-2018 Posted date: 14-May-2018 Source of document: Mandatory Declassification Review Request National Security Agency NSC/CSS MDR Appeal Authority DJ5 National Security Agency 9800 Savage Road STE 6881 Fort George G. Meade, MD 20755-6881 The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. Interagency Security Classification Appeals Panel EXECUTIVE SECRETARY MEMBERS c/o Infonnation Security Oversight Office 700 Pennsylvania Avenue, N .W., Room 100 Mark A.
    [Show full text]
  • Reprieve Welcomes the APPG’S Inquiry Into the British Government’S Work with Partners in the Use of Armed Drones
    SUBMISSIONS TO THE APPG INQUIRY INTO THE USE OF ARMED DRONES: WORKING WITH PARTNERS Table of Contents INTRODUCTION 2 EXECUTIVE SUMMARY 2 I. UK COMPLICITY IN THE US DRONE PROGRAMME 4 A. British bases provide the US drone programme with intelligence and operational support 5 B. British “boots on the ground” help drone strikes find their targets 11 C. British pilots fly American drones 13 D. Britain’s legal basis for lethal operations has crept toward the US position 14 II. CONCLUSION 15 III. RECOMMENDATIONS 15 ANNEX A – GLOSSARY OF KEY TERMS 17 ANNEX B – ANATOMY OF A US DRONE STRIKE 18 1 INTRODUCTION Reprieve welcomes the APPG’s inquiry into the British Government’s work with partners in the use of armed drones. The inquiry comes at a pivotal moment for the US drone programme and Britain’s participation. As well as ramping up the number of drone strikes taken by US forces, President Trump has indicated a willingness to dramatically widen the scope of such operations, even calling for the killing of terror suspects’ families. The UK’s participation in the programme could lead to the unlawful killing of civilians. The UK needs appropriate safeguards to ensure that its intelligence is not misused to commit grave human rights abuses. Unfortunately, UK policy and practice in this area is currently shrouded in secrecy, hindering efforts by Parliament and the public to ensure our overseas actions reflect our laws and values. At the same time, the UK Government’s newly disclosed legal rationale for participating in these activities leaves major questions unanswered.
    [Show full text]
  • Syria: Syrian Telecommunications Establishment, Syrian Computer Society
    2 ENEMIES OF THE INTERNET / 12 MARCH 2014 //////////////////////////////////////////////////////////////////////////////////////// INTRODUCTION ........................................................................................................... 4 EUROPE AND CENTRAL ASIA .................................................................................. 8 Belarus: Operations and Analysis Centre ....................................................... 8 Russia: Federal Security Service ............................................................................ 10 Turkmenistan: TurkmenTelecom ............................................................................. 12 United Kingdom: Government Communications Headquarters ....................... 13 Uzbekistan: Expert Commission on Information and Mass Communication ................................................................................. 16 AMERICAS .................................................................................................................... 18 Cuba: Ministry of Informatics and Communications ............................................ 18 USA: National Security Agency ............................................................................... 20 MIDDLE EAST AND NORTH AFRICA ............................................................................... 23 Bahrain: Ministry of Interior, National Security Apparatus ............................................................................ 23 Iran: Supreme Council for Cyberspace, Working Group
    [Show full text]
  • National Security in Lebanon: Diplomatic Approach Overview
    National Security in Lebanon: diplomatic approach Overview Tannous Moawad Niccolo Machiavelli was the first person who spoke about national security in 1530. National security emerged in Europe after the war between Catholics and Protestants. At the end of this war, after the Westphalia convention, the Nation State concept emerged. During the 30 years’ war in Europe, France allied against the pope of Rome at the request of Richelieu. Although France was Catholic, Richelieu said that this decision was taken to protect the French national security. It is important to use all the available energies. The entity in charge should coordinate and cooperate with different entities to deal with all the issues related to the national interest. The majority of the countries of the world have established a national security entity that included defense, foreign affairs, financial and economic dimensions, under a coordinated administrative entity. The risks are numerous. A country located in the hot zone can risk total destruction, and can risk a penetration of its available e-services (communication, transport, and banking) and an electronic war that could paralyze the whole country. The sectarian composition negatively affected the security system and lead to the creation of four entities that operate in the same field which decreases efficiency, especially in the absence of a coordinating body. These entities are the Lebanese Army Intelligence Directorate in charge of fighting espionage ; The General Directorate of General Security that takes care of foreigners and Palestinians affairs and that is affiliated to the Ministry of Interior; The Lebanese State Security in charge of collecting information and fighting espionage; and the Information Department within the Internal Security Forces that has been activated after the assassination of late PM Rafiq Hariri with the objective of establishing a security entity under the control of Sunnis.
    [Show full text]
  • Securing Israel – the Mossad
    Strategic Thinking in a Complex World Web: https://www.nimmonsconsulting.com Securing Israel – The Mossad Eur Ing Steve Nimmons FBCS CITP FIET CEng FRSA Nimmons Consulting, London, January 2018 Mossad is one of the world’s most famous, some may say feared intelligence agencies. As part of Israel’s intelligence community, it works alongside sister organisations such as Aman (military intelligence) and Shin Bet (Israel’s domestic security service). In the aftermath of the holocaust and World War II, the formation of the modern state of Israel in 1948 was met with immediate Arab resistance. In the War of Independence, the armies of Egypt, Jordan, Syria, Lebanon and Iraq attacked the fledgling state. Israel, facing existential threat from inception had need of extensive military, security and intelligence capabilities. Protection of the homeland from volatile and hostile neighbours, hunting Nazi war criminals, protecting and gathering in the diaspora were immediate challenges. Mossad therefore had to establish itself quickly, form strategic alliances with other intelligence agencies and work to protect Israeli interests on the global stage. In so doing, it established a reputation for ingenuity, fearless commitment and ruthless execution of executive Page 1 of 19 Securing Israel – The Mossad Nimmons Consulting, London, January 2018 Eur Ing Steve Nimmons FBCS CITP FIET CEng FRSA Strategic Thinking in a Complex World Web: https://www.nimmonsconsulting.com actions. As threats to Israeli interests evolved, the Six Day War of 1967 (Oren, 2003), Yom Kippur War of 1973, Lebanese civil war, the end of the Cold War, risks of nuclear proliferation in Iraq and now Iran (Gold, 2009, pp.
    [Show full text]
  • Security Council Distr.: General 8 March 2017
    United Nations S/2017/201 Security Council Distr.: General 8 March 2017 Original: English Report of the Secretary-General on the implementation of Security Council resolution 1701 (2006) Reporting period from 5 November 2016 to 28 February 2017 I. Introduction 1. The present report provides a comprehensive assessment of the implementation of Security Council resolution 1701 (2006) since my predecessor’s report of 4 November 2016 (S/2016/931). 2. My Special Coordinator for Lebanon continued to provide the good offices of the United Nations, in coordination with the International Support Group for Lebanon, to support the efforts of Lebanon to address its security and stability challenges. The situation in the area of operations of the United Nations Interim Force in Lebanon (UNIFIL) remained generally calm. Both parties remain committed to resolution 1701 (2006). The parties did not, however, use the prevailing calm to effect progress on their outstanding obligations under the resolution and towards a permanent ceasefire. 3. In a welcome political achievement, on 18 December 2016, Prime Minister Saad Hariri formed a new Government, which was endorsed by Parliament on 28 December 2016. As Parliament’s term is due to end on 20 June 2017, it is important that preparations for new elections, in accordance with the electoral calendar, continue in conformity with the country’s constitution and its democratic practice. 4. Lebanon’s stability and security also remain contingent on developments in the neighbouring Syrian Arab Republic. The Lebanese Armed Forces continued to play a vital role in maintaining security on the border with the Syrian Arab Republic and throughout Lebanon, including in countering threats from terrorist extremist groups such as the Islamic State of Iraq and the Levant (ISIL) and the Nusrah Front.
    [Show full text]
  • The Israeli National Security Constellation and Its Effect on Policymaking
    A GUIDE FOR THE PERPLEXED: THE ISRAELI NATIONAL SECURITY CONSTELLATION AND ITS EFFECT ON POLICYMAKING THE PHILADELPHIA PAPERS, NO. 17 J OSHU A K R A S na FOREIGN POLICY RESEARCH INSTITUTE FEBRUARY 2018 All rights reserved. Printed in the United States of America. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. © 2018 by the Foreign Policy Research Institute COVER: Israeli Cabinet Members visit the Golan Heights, February 2018 (Kobi Gideon, Government Press Office of Israel) FOREIGN POLICY RESEARCH INSTITUTE MISSION The Foreign Policy Research Institute is dedicated to bringing the insights of scholarship to bear on the foreign policy and national security challenges facing the United States. It seeks to educate the public, teach teachers, train students, and offer ideas to advance U.S. national interests based on a nonpartisan, geopolitical perspective that illuminates contemporary international affairs through the lens of history, geography, and culture. EDUCATING THE AMERICAN PUBLIC: FPRI was founded on the premise than an informed and educated citizenry is paramount for the U.S. to conduct a coherent foreign policy. Today, we live in a world of unprecedented complexity and ever-changing threats, and as we make decisions regarding the nation’s foreign policy, the stakes could not be higher. FPRI offers insights to help the public understand this volatile world by publishing research, hosting conferences, and holding dozens of public events and lectures each year. PREpaRING TEACHERS: Unique among think tanks, FPRI offers professional development for high school teachers through its Madeleine and W.W.
    [Show full text]