- Brown,
David G. and Kevin Scott.
A Breakthrough and a Deadlock. Center for Strategic and
International Studies, May 14, 2014, 11 pages."In February, officials from Beijing and
Taiwan met publicly in their official capacities for the first time since
1949. Both sides characterized this breakthrough as a step forward in
cross-strait relations" (From the CSIS)
- Erickson,
Andrew and Michael Chase.
"China Goes Ballistic."
The National Interest, May/June
2014, pp. 58-64.
"Watch out for China's growing missile
and nuclear forces. Beijing's
buildup poses an increasingly serious set of strategic, operational and
tactical challenges for the United States and its regional allies and
partners." (From the National
Interest)
- Fleischman,
Janet.
Why It's Time to Put Women's Issues at Center of Foreign Policy.
Center for Strategic and International Studies, May 16, 2014, 3 pages.
"With mainstream attention finally
focused on why the education, health, and empowerment of women and girls
matters to Americans, it is time for the Obama administration to
reinforce its commitment to these issues and elevate them as central to
U.S. foreign policy." (From the CSIS)
- Groves,
Steven and Dean Cheng.
A National Strategy for the South China Sea.
The Heritage Foundation, April 24, 2014, 15 pages.
"The United States should develop and
promulgate a National Strategy for the South China Sea (NSSCS) as part of
its ongoing efforts to counter Chinese aggression in the region and to
resolve the disputes there in a peaceful manner." (From the Heritage
Foundation)
- Hiebert, Murray.
China's Push in the South China Sea Divides the Region.
Center for Strategic and International Studies, May 16, 2014, 3 pages.
"As China brings in a $1 billion oil
exploration rig, parking it in a disputed region of the South China Sea
and unleashing a deadly anti-China protest in Vietnam, nearby Southeast
Asian neighbors appear relatively mute and impotent." (From the
CSIS)
- Hsu,
Kimberly and Craig Murray.
China and International Law in Cyberspace.
U.S.-China Economic and Security Review Commission, May 7, 2014, 10
pages.
"The United States and China were among
15 countries affirming the applicability of international law to
cyberspace in a 2013 UN report. The same group will gather in 2014 to
address some of the more challenging and divisive concepts regarding
state responsibility and use of force in cyberspace. Any fractures in the
debate at this meeting will likely reflect some of the major differences
between the United States and China on cyberspace policy." (From the
U.S.-China Economic and Security Review Commission)
- Gagnon,
Joseph E. and Kent Troutman.
Internationalization of the Renminbi:
The Role of Trade Settlement.
Peter G. Peterson Institute for International Economics, May 19, 2014, 8
pages.
"The
renminbi cannot become a true international
currency until Chinese authorities drop their strict limits on capital
flows between China and the rest of the world." (From the Peter G.
Peterson Institute for International Economics)
- Gloudeman, Lauren.
Bitcoin's
Uncertain Future in China.
U.S.-China Economic and Security Review Commission, May 12, 2014, 21
pages.
"Bitcoin is
changing the way the world thinks about money, and its impact is growing,
especially in the United States. The driving force behind Bitcoin's explosive growth in 2013 was the entry of the Chinese
market, while Bitcoin's subsequent slump in 2014 is largely derived from
prohibitive measures issued by China's
central bank. If Chinese authorities continue their crackdown on Bitcoin, the global market and, by extension, the
U.S. market, may be severely impacted." (From the U.S.-China
Economic and Security Review Commission)
- Lewis,
James Andrew.
DOJ to Charge Chinese Army Hacked U.S. Firms.
Center for Strategic and International Studies, May 19, 2014, 3 pages.
"The lack of consequences helps explain
why cybercrime and cyber espionage are rampant. If you don't hold countries accountable for bad actions, they
see no reason to stop. China has been engaged in a massive campaign of
economic espionage against the United States for years, and in the last
decade, much of the spying has moved into cyberspace." (From the
CSIS)
- McCaffrey,
Barry R.
National Security in an Uncertain Age.
The Heritage Foundation, April 29, 2014, 9 pages."In this inaugural Colonel James D.
McGinley Lecture, General Barry McCaffrey, USA (Ret.), looks at the very
real threats the United States faces in today’s uncertain world and what
our armed forces—the most trusted institution in American society—must
have to counter those threats." (From the Heritage Foundation)
- Mehrotra, Ateev.
Expanding the Use of Telehealth:
Promise and Potential Pitfalls.
RAND, May 1, 2014, 7 pages.
"The growth of telehealth
requires oversight to ensure that these new delivery models do three
things: provide high-quality care, improve access to those who need it
most, and are utilized in a cost-effective manner." (From the RAND)
- Rao, Michael.
"Let's Build a Culture of
Innovation."
Vital Speeches of the Day, May
2014, pp. 161-163.
"We live and lead in an innovative city
that's in the heart of a pioneering Commonwealth. But I worry that we may have hit a
ceiling." (From Vital Speeches
of the Day)
- Anderson,
Janna and Lee Rainie.
Overview from the Internet of Things Will Thrive by 2025.
Pew Research Center Internet Project, May 14, 2014, 10 pages.
"Many experts say the rise of embedded
and wearable computing will bring the next revolution in digital
technology." (From the Pew Research Center Internet Project)
- Bureau of
Counterterrorism.
Executive Summary from Country Reports on Terrorism 2013.
U.S. Department of State, April 2014, 29 pages.
"Country Reports on Terrorism 2013 is
submitted in compliance with Title 22 of the United States Code, Section
2656f (the "Act"), which requires the Department of State to
provide to Congress a full and complete annual report on terrorism for
those countries and groups meeting the criteria of the Act." (From
U.S. Department of State)
|