Working Group on Foreign Policy

Foreign Policy and Strategy

Explore Research

Filter By:

Topic

Type

Author

Enter comma-separated ID numbers for authors
Blank Section (Placeholder)Featured Commentary

Instability In The Middle East

by James D. Fearonvia Defining Ideas
Thursday, May 7, 2015

The failure of states in the region since the Arab Spring poses threats to U.S. security. 

Blank Section (Placeholder)Featured Commentary

Breeding Ground For Terrorism

by Francis Fukuyamavia Defining Ideas
Tuesday, March 31, 2015

The failed states of West Africa and the Middle East have given rise to movements like ISIS and Boko Haram. 

this is an image
Blank Section (Placeholder)

“Failed States and Realistic Expectations,” with Stephen D. Krasner

interview with Stephen D. Krasnervia Analysis
Wednesday, March 25, 2015

Why America’s approach to failed states has been overly ambitious.

Blank Section (Placeholder)Featured Commentary

“Rethinking Failed States” with James Fearon

interview with James D. Fearonvia Analysis
Tuesday, March 17, 2015

When does chaos abroad require an American response?

Blank Section (Placeholder)

“The Challenges of Nation Building,” with Francis Fukuyama

interview with Francis Fukuyamavia Analysis
Monday, March 16, 2015

Why American efforts overseas so often fail.

Rockets
Featured Commentary

Stop Drinking The Weak Sauce

by Amy Zegartvia Foreign Policy
Monday, February 23, 2015

Washington’s paranoia over weak and failing states is distracting it from the real national security threats looming on the horizon.

Blank Section (Placeholder)Featured Commentary

A Grand Strategy for Failed States

by Ambassador Karl W. Eikenberryvia Defining Ideas
Tuesday, February 17, 2015

How should the United States handle threats posed by countries like Yemen, Syria, and Nigeria? 

Featured Commentary

Our mistake: Thinking That All Countries Should Be Structured Like U.S.

by Stephen D. Krasnervia Los Angeles Times
Thursday, January 8, 2015

The United States has the most potent military in terms of firepower and operational capacity in history. Our military overthrew Saddam Hussein and crushed the Taliban in a matter of weeks. Our forces can direct a rocket from Nevada through a window in Kandahar, Afghanistan, and nimbly set up nearly 20 Ebola treatment centers in Liberia.

Blank Section (Placeholder)Featured Commentary

Managing the Cyber Security Threat

by Abraham D. Sofaervia Analysis
Wednesday, November 26, 2014

The cyber threat is part of a transnational game, with low barriers of entry, increasing sophistication, increasing cost, and no prospect that any state will be victorious.  The U.S. needs to manage the risk by focusing on those aspects of cyber insecurity that relate to commerce and critical infrastructure, leaving traditional forms of intelligence and military activities unregulated; and by allowing private companies and individuals to use strong encryption or open source software without built-in vulnerabilities. 

Blank Section (Placeholder)Featured Commentary

Transnational Terrorism

by Stephen D. Krasnervia Analysis
Wednesday, November 26, 2014

Given the low probability of a mass casualty terrorist attack and the lack of new attacks since 9/11, the U.S. is probably devoting too many resources to fighting terrorism. However, no political leader could endorse this conclusion, so the challenge of counterterrorism policy is channeling the political will terrorism engenders effectively.

Pages

Latest Essay Series: Failed States


This essay series focuses on two critical questions: When should the U.S. intervene in weak states and what form should this intervention take?

The Hoover Institution's Working Group on Foreign Policy and Grand Strategy will explore an array of foreign policy topics over a two-year period. Our goal is to develop orienting principles about the most important policy challenges to better serve America's interests.

The certainties of the Cold War, such as they were, have disappeared. The United States now confronts several historically unique challenges, including the rise of a potential peer competitor, a rate of technological change unseen since the 19th century, the proliferation of nuclear and biological capabilities, and the possible joining of these capabilities with transnational terrorist movements. There has been no consensus on a grand strategy or even a set of principles to address specific problems. Reactive and ad hoc measures are not adequate.