On May 28, 2014, at West Point Academy's graduation ceremony, President Obama discussed his vision for the future of the U.S. military and U.S. leadership in the world, regarding protection of the United States from immediate threats, counterterrorism efforts, transparency, multilateral action, and international law. On May 29, 2014, National Public Radio (NPR) interviewed President Obama about the speech and his foreign policy agenda, particularly on Syria, Ukraine, China, and Guantanamo Bay prison.
Authors: Ray Takeyh, Eric Edelman, and Dennis Ross The Washington Post
Arms control has often been a bone of contention between the White House and Congress. Presidents and their diplomats prefer to reach agreements in secret and then shield the accord from congressional scrutiny, much less consent.
Janine Davidson evaluates the heated, often emotional discussion surrounding the Air Force's decision to retire the A-10 Warthog. She argues that the A-10 debate speaks to larger issues surrounding the future of close air support, and that—while there are good arguments to divest from the A-10—the Air Force has so far done a poor job communicating them.
In the wake of the New York Times' dismissal of Jill Abramson, Julia Sweig reflects in her column on the unique challenges professional women face ascending to leadership positions in public or public-oriented organizations.
The U.S. Department of Justice announced the indictment of five Chinese military hackers on May 19, 2014. Wang Dong, Sun Kailiang, Wen Xinyu, Huang Zhenyu, and Gu Chunhui were charged with computer hacking, economic espionage and other offenses directed at Americans in the nuclear power, metals, and solar products industries.
Each year, U.S. state and local governments waste tens of billions of taxpayer dollars competing to lure or retain business investment, with little impact on business behavior. Edward Alden and Rebecca Strauss lay out incremental steps for curbing the subsidy war, beginning with greater disclosure and cost-benefit analyses, and building up to a multistate agreement that creates strong disincentives for continuing subsidies.
How can the United States protect cyberspace "control system of our country," without restricting the open "flow of information on the Internet"? What should countries consider when developing international cybersecurity standards and protocol? What should their citizens know to protect their information and their rights? Cybersecurity Policy Research Links provide news, background information, legislation, analysis, and international efforts to protect government and the public's information.
The recently reconstituted G7 is poised to serve as a forum for highly industrialized democracies to coordinate economic, security, and energy policy, but critics say that its membership is outdated, undermining its relevance to global governance.
Each year, state and local governments in the United States spend more than $80 billion, or roughly 7 percent of their total budgets, on tax breaks and subsidies to attract investments from auto companies, movie producers, aircraft makers and other industries. Edward Alden and Rebecca Strauss explore the possiblity of ending such compensation.
The Council on Foreign Relations' David Rockefeller Studies Program—CFR's "think tank"—is home to more than seventy full-time, adjunct, and visiting scholars and practitioners (called "fellows"). Their expertise covers the world's major regions as well as the critical issues shaping today's global agenda. Download the printable CFR Experts Guide.
The authors argue that it is essential to begin working now to expand and establish rules and norms governing armed drones, thereby creating standards of behavior that other countries will be more likely to follow.
The author examines Pakistan's complex role in U.S. foreign policy and advocates for a two-pronged approach that works to quarantine threats while integrating Pakistan into the broader U.S. agenda in Asia.