On May 28, 2014, at West Point Academy's graduation ceremony, President Obama discussed his vision for the future of the U.S. military and U.S. leadership in the world, regarding protection of the United States from immediate threats, counterterrorism efforts, transparency, multilateral action, and international law. On May 29, 2014, National Public Radio (NPR) interviewed President Obama about the speech and his foreign policy agenda, particularly on Syria, Ukraine, China, and Guantanamo Bay prison.
President Barack Obama and Secretary of State John Kerry gave statements on May 27, 2014, on the U.S. strategy in Afghanistan after 2014. They outline the number of staff and troops that will be involved in upholding security commitments and assisting in political and economic transitions. President Obama also spoke on May 28, 2014, at the graduation ceremony at the West Point Academy, to discuss how Afghanistan fits into the broader military strategy.
Janine Davidson evaluates the heated, often emotional discussion surrounding the Air Force's decision to retire the A-10 Warthog. She argues that the A-10 debate speaks to larger issues surrounding the future of close air support, and that—while there are good arguments to divest from the A-10—the Air Force has so far done a poor job communicating them.
The U.S. Department of Justice announced the indictment of five Chinese military hackers on May 19, 2014. Wang Dong, Sun Kailiang, Wen Xinyu, Huang Zhenyu, and Gu Chunhui were charged with computer hacking, economic espionage and other offenses directed at Americans in the nuclear power, metals, and solar products industries.
The China National Overseas Oil Coorporation (CNOOC) began drilling in Vietnamese-claimed waters late last week, accompanied by more than seventy vessels, including armed Chinese warships.Elizabeth Economy and Michael Levi write that the United States needs to face up to the full magnitude of the Chinese challenge to have any hope of successfully confronting it.
How can the United States protect cyberspace "control system of our country," without restricting the open "flow of information on the Internet"? What should countries consider when developing international cybersecurity standards and protocol? What should their citizens know to protect their information and their rights? Cybersecurity Policy Research Links provide news, background information, legislation, analysis, and international efforts to protect government and the public's information.
On May 09, 2014, Press Secretary Rear Admiral John Kirby previewed Secretary of Defense Chuck Hagel's travel to Saudi Arabia, Jordan, and Israel. Rear Admiral Kirby also provided details on U.S. participation in a coordination cell in Nigeria, to help Nigerian authorities analyze intelligence regarding Boko Haram's kidnapping of school girls.
Secretary of Defense Chuck Hagel spoke at the Woodrow Wilson International Center Forum on May 2, 2014. He discussed strengthening NATO, in the context of Russia's annexation of Crimea and U.S. defense budget constraints.
The long-running debate over the tradeoffs the United States should make between national security and civil liberties flared up spectacularly last summer, when Edward Snowden, a National Security Agency contractor, handed journalists a huge trove of heavily classified documents that exposed, in excruciating detail, electronic surveillance programs and other operations carried out by the NSA. Americans suddenly learned that in recent years, the NSA had been acquiring the phone and Internet communications of hundreds of thousands of U.S. citizens, as well as collecting massive volumes of bulk telephone records known as "metadata" -- phone numbers and the time and length of calls.
The U.S. Army and U.S. Marine Corps produce this document to guide ground forces in current and future counterinsurgency operations. The manual was updated in 2006 (the first time in twenty years) and again in 2014.
The Council on Foreign Relations' David Rockefeller Studies Program—CFR's "think tank"—is home to more than seventy full-time, adjunct, and visiting scholars and practitioners (called "fellows"). Their expertise covers the world's major regions as well as the critical issues shaping today's global agenda. Download the printable CFR Experts Guide.
The authors argue that it is essential to begin working now to expand and establish rules and norms governing armed drones, thereby creating standards of behavior that other countries will be more likely to follow.
The author examines Pakistan's complex role in U.S. foreign policy and advocates for a two-pronged approach that works to quarantine threats while integrating Pakistan into the broader U.S. agenda in Asia.