384 Results for:

February 1, 2021

Immigration and Migration
Arthur C. Helton Lecture: Migrants and the U.S. Southern Border

Panelists discuss the humanitarian concerns facing migrants at the U.S. southern border, including how the pandemic is affecting refugees and asylum seekers, and the future of immigration under the n…

Play A woman in the United States takes a picture to Mexico through the border fence as residents of Anapra, a neighbourhood on the outskirts of Ciudad Juarez in Mexico, and other people attend a prayer with priests and bishops from both countries to ask for the migrants and people of the area, on February 26, 2019. - Built two years ago, the Anapra fence is one of several reinforced border barriers that the administration of US President Donald Trump calls the first sections of the wall.

October 28, 2022

Wars and Conflict
Nonstate Warfare: The Military Methods of Guerillas, Warlords, and Militias

Teaching Notes for Toxic Politics, authored by CFR Senior Fellow Yanzhong Huang, discuss how China’s environmental crisis is undermining public health and becoming an Achilles heel in its reemergence as a global power.

Nonstate Warfare Teaching Notes Image

April 9, 2018

North Korea
U.S.-North Korea Relations: Any Progress on Nonproliferation Efforts?

Mike Mullen and Victor Cha discuss the status of U.S.-North Korea relations, nuclear security, and non-proliferation one and a half year's after the task force report was released. 

Play North Korean leader Kim Jong Un

February 2, 2005

Iraq
IRAQ: The Kurds’ Agenda

This publication is now archived. What do the Kurds of Iraq want? Kurdish leaders on the Iraqi Governing Council (IGC) are pushing for an autonomous federal state in the new Iraqi nation. Kurds…

October 24, 2023

Cybersecurity
Countering the Ransomware Threat With Anne Neuberger

Deputy National Security Advisor Anne Neuberger discusses international cyber cooperation initiatives to improve resilience to ransomware, efforts to disrupt ransomware and pursue those responsible f…

Play A cybersecurity agent checks data on a computer.