Articles & Multimedia
Showing 2721-2740 of 3073 Publications
-
Defense / Indo-Pacific Security
A Response to Lyle Goldstein's “How China Sees America's Moves in Asia”In “How China Sees America's Moves in Asia,” Professor Lyle Goldstein highlights the disturbing conclusion of a recent essay by three Chinese analysts: China is under siege, p...
By Ely Ratner
-
Defense / Indo-Pacific Security / Technology & National Security
China’s Cyber Moves Hurting BeijingA new report by an arm of the U.S. Director of National Intelligence confirms what officials have privately lamented for several years: the United States is the target of a v...
By Richard Fontaine
-
Defense / Indo-Pacific Security
The Obama-Xi Summit: Three Essential Messages from WashingtonIn mid-November, U.S. President Barack Obama will meet with his Chinese counterpart Xi Jinping in Beijing in what has been billed as a sequel to their June 2013 gathering in s...
By Ely Ratner
-
Defense / Indo-Pacific Security
Engagement and Assurance: Debating the U.S.-Chinese RelationshipIn “How China Sees America’s Moves in Asia,” Professor Lyle Goldstein highlights the disturbing conclusion of a recent essay by three Chinese analysts: China is under siege, p...
By Ely Ratner
-
National Security Human Capital Program / Middle East Security
Don’t Wreck the Iran TalksIran and the international community are approaching the finish line in negotiations to roll back Iran’s nuclear enrichment program. Even at this late hour, however, American ...
By Elizabeth Rosenberg
-
Defense / Technology & National Security
America's Secret Weapon for Battlefield Dominance: Build the SwarmThe U.S. military is at a crisis point. We are staring down the barrel of a future where U.S. military technological superiority may no longer be a given wherethe military str...
By Paul Scharre
-
Technology & National Security
Superiority at any Price? Political Consequences of the First Offset StrategyMilitary strategies serve political ends. Judgments about their effectiveness cannot be separated from the historical and geopolitical context in which they exist. The first U...
By Van Jackson
-
Rule #1 and the Cult of Invulnerability
On the morning of December 7, 1941, the USS Arizona, with 13.5 inches of armor at her waterline, 18 inches of armor on her turrets, and watertight compartments throughout her ...
By Jerry Hendrix
-
Bryn Mawr Classical Review
In a field crowded with competitors it is a surprise to find a new prose version of Sophocles' three Oedipus plays. In the first paragraph of their preface the translators exp...
By Richard Fontaine
-
Defense / Indo-Pacific Security
Making BankLater this week, the Chinese government will convene a multilateral meeting in Beijing that is either an act of enlightened global leadership or a not-so-subtle effort to unde...
By Ely Ratner
-
Defense / Technology & National Security
To Save Money, Go UnmannedU.S. Defense Department leaders have called for a renewed effort to sustain America’s military technological dominance, but to do so they will have to fight an uphill battle a...
By Daniel Burg & Paul Scharre
-
Defense / Technology & National Security
Technology strategy then and now – the Long Range Research and Development Planning ProgramDeputy Secretary of Defense Bob Work has called for a new offset strategy to help maintain the United States’ military technical superiority. But is a third offset strategy th...
By Ben FitzGerald
-
Don't Mistake Russia for Iran
With sanctions beginning to bite, Russia is starting to play a new economic game. To alleviate the pain of Western restrictions on its financial and energy sectors, Russia is ...
By Elizabeth Rosenberg
-
Defense / Technology & National Security
The Coming Swarm: Robotics on the BattlefieldThe unfolding robotics revolution is transforming a range of industries, from manufacturing to transportation, warehouse management, household appliances, toys, elder care and...
By Paul Scharre
-
Defense / Indo-Pacific Security
Preventing violence in a post-Kim NorthHow would Kim Jong Un’s removal from power affect the likelihood of North Korean violence against the United States or South Korea, and what might be done to prevent such viol...
By Van Jackson
-
Contain ISIS, Then Roll It Back
Nine days after the attacks of Sept. 11, 2001, President George W. Bush addressed a joint session of Congress. Referring to thousands of terrorists active in more than 60 coun...
By Richard Fontaine
-
Defense / Indo-Pacific Security
Does Kim Really Run North Korea? Find Out with Military DiplomacyRecent rumors of Kim Jong-un’s whereabouts and whether a coup had occurred put our ignorance about what goes on in North Korea on full display. Speculation is natural when it ...
By Van Jackson
-
Jordan: The Canary in the Coal Mine
After the United States initiated an airstrike campaign against the Islamic State of Iraq and the Levant (ISIL), Jordanannounced that it was one of five Arab states participat...
By Amanda Claypool
-
Technology & National Security
Offset Strategies & Warfighting RegimesToday’s headlines are reinforcing the alarms sounded by defense policymakers and analysts warning of the perils of cuts to the defense budget, the blind meat-axe of sequestrat...
By Shawn Brimley
-
Defense / Technology & National Security
To Save the Navy’s Next-Gen Drone, Kill It FirstThe Defense Department was set to release this summer the final request for proposal for the Unmanned Carrier-Launched Airborne Surveillance and Strike, or UCLASS, aircraft, b...
By Paul Scharre & Shawn Brimley