Author: Stewart M. Patrick Global Summitry: Politics, Economics, and Law in International Governance
A defining feature of twenty-first century multilateralism is growing reliance on informal, non-binding, purpose-built partnerships and coalitions of the interested, willing, and capable. But the new multilateralism also presents dangers, among these encouraging rampant forum-shopping, undermining critical international organizations, and reducing accountability in global governance, writes Stewart Patrick.
Drawing on his government experience in the immediate aftermath of the 9/11 attacks, John Bellinger argues that the specter of terrorist attacks should never be used to promote fear mongering or xenophobic policies.
How can the United States protect cyberspace, the "control system of our country," without restricting the open "flow of information on the Internet"? What should countries consider when developing international cybersecurity standards and protocol? What should their citizens know to protect their information and their rights? Cybersecurity Policy Research Links provide news, background information, legislation, analysis, and international efforts to protect government and the public's information.
Tim Kaine discusses U.S. leadership and involvement in the Middle East, provides his view on the need for Congress to authorize military action against the Islamic State, and addresses U.S. policy options in the region.
Unification would constitute one of the most decisive changes in the history of Northeast Asia since the outbreak of the Korean War in 1950, with far-reaching implications for the United States and the balance of power in the region. Sue Mi Terry outlines steps that the United States should take to increase the likelihood that the U.S.-South Korea alliance would survive the disappearance of North Korea.
I sat in the resort town of Izmir, Turkey, in a clean and dimly lit living room filled with eight children sporting sweet smiles and bare feet. They played and joked like children anywhere, except they were undernourished and underdressed for the biting winter chill that was pushing me to zip up my lined winter parka.
The U.S. government's effort to persuade other countries to adopt norms of responsibility for cyberspace faces a significant obstacle: computers located in the United States host much of the malicious software used to carry out cyberattacks. Robert K. Knake explains.
Remember the Iran nuclear deal, source of so much anxiety just one month ago? While much of the world watched in horror at the aftermath of the attacks in Paris, Iran began dismantling its centrifuges. But short-term compliance with the deal isn’t as important as what happens when it expires in 10 years.
The issue of women in combat per se was no longer a question," said Secretary of DefenseAshton Carter on Thursday as he declared that all jobs in the United States military would at last be open to all Americans.
Learn more about CFR’s mission and its work over the past year in the 2015 Annual Report. The Annual Report spotlights new initiatives, high-profile events, and authoritative scholarship from CFR experts, and includes a message from CFR President Richard N. Haass. Read and download »