Regions

Primary Sources

President's Global Development Council: Reports

On September 22, 2010, President Barack signed a Presidential Policy Directive on Global Development, or the U.S. Global Development Policy, which calls for "the elevation of development as a core pillar of American power and charts a course for development, diplomacy and defense to mutually reinforce and complement one another in an integrated comprehensive approach to national security." In 2012, the Global Development Council was established and in 2014, it produced its first report of recommendations for implementing the U.S. Global Development Policy.

See more in Global; United States; Economic Development

Event

The Challenges of Rebuilding Nepal

Alyssa Ayres, CFR's senior fellow for India, Pakistan, and South Asia, discusses the international and domestic response to the recent earthquakes in Nepal, as part of CFR's Religion and Foreign Policy Conference Call series.

See more in Nepal; Disasters; Religion

Primary Sources

U.S.-Gulf Cooperation Council Camp David Joint Statement

On May 14, 2015, President Obama met at Camp David with delegations from Saudi Arabia, the United Arab Emirates, Kuwait, Oman, Qatar, and Bahrain. They discussed the security relationship between the the United States and the Gulf Cooperation Council (GCC), particularly in addressing terrorist threats from the self-proclaimed Islamic State and al-Qaeda, transferring defense technologies, and negotating with Iran.

See more in United States; Middle East and North Africa; Regional Security

Contingency Planning Memorandum No. 24

Strategic Risks of Ambiguity in Cyberspace

Author: Benjamin Brake

Ambiguity in cyberspace—in terms of who is responsible for and the intent of a cyberattack—poses a growing risk of unnecessary military escalation in and outside the cyber domain. Benjamin Brake details how the Obama administration can strengthen its ability to correctly and efficiently attribute an ambiguous attack, reduce the likelihood of its escalation, and mitigate the consequences.

See more in Global; Cybersecurity