March 5, 2012
ChinaIn late February, New York-based Global Times writer Rong Xiaoqing published a piece on Jeremy Lin and the “Hunger for Heroes in the U.S.” In her piece, Rong argues that the United States—and democra…
June 22, 2016
United StatesThe next president’s trade policy will affect millions of Americans, as well as the health and competitiveness of the country’s economy. This video breaks down the decisions the president will face i…
April 12, 2018
Digital PolicyThis week: Mark Zuckerberg testifies before Congress, internet connections severed in West Africa, and Germany and the United Kingdom call out Russian cyber operations.
January 28, 2016
ChinaThe president of the United States will have to deal with a rising and more assertive China on a wide range of issues, including Asia-Pacific security, trade, and cybersecurity. U.S.-China relations …
October 28, 2015
Immigration and MigrationU.S. immigration policy has been a touchstone of political debate for decades as policymakers consider U.S. labor demands and border security concerns. Comprehensive immigration reform has eluded Was…
November 9, 2015
Democratic Republic of CongoOver the past two decades, the eastern provinces of the Democratic Republic of the Congo have experienced fighting that has killed more than five million people. As the eastern Congo struggles to ove…
September 14, 2017
KurdsKurds have become critical players amid domestic upheaval and political changes throughout the Middle East. Explore the history of the Kurdish people and why some Kurds may be on the verge of achievi…
January 2, 2018
U.S. Foreign PolicyTeaching Notes for The Sovereignty Wars written by CFR Senior Fellow and Director Stewart M. Patrick.
December 27, 2017
United StatesYear’s end is a time for taking stock, counting successes, and assessing failures. It is also time for remembering those who are no longer with us. Here are ten Americans who died in 2017 who through…
January 17, 2019
Defense TechnologyPanelists discuss the national security risks posed by corruption of IoT devices and ways to mitigate the probability of successful attacks.