As economic power diffuses across more countries and China becomes more dependent on the world economy, Chinese leaders are being forced to abandon their largely passive approach to global governance. This report analyzes China’s interests and behavior to evaluate both the recent history of its interactions with the postwar international order and possible future trajectories. It also draws implications from that analysis for future U.S. policy.
This study explores U.S. policy options for managing cyberspace relations with China via agreements and norms of behavior. It considers two questions: Can negotiations lead to meaningful agreement on norms? If so, what does each side need to be prepared to exchange in order to achieve an acceptable outcome? This analysis should interest those concerned with U.S.-China relations and with developing norms of conduct in cyberspace.
This report examines the technical challenges associated with incorporating bulk, automated analysis of social media information into procedures for vetting people seeking entry into the United States. The authors identify functional requirements and a framework for operational metrics for the proposed social media screening capabilities and provide recommendations on how to implement those capabilities.
As part of a larger study on the future of the post–World War II liberal international order, RAND researchers analyze the health of the existing order and offer implications for future U.S. policy. The study’s overall conclusion is that the postwar order continues to enjoy many elements of stability but is increasingly threatened by major geopolitical and domestic socioeconomic trends that call into question the order’s fundamental assumptions.
In the event of a Sino-U.S. war, intense conventional counterforce attacks could inflict heavy losses and costs on both sides, so leaders need options to contain and terminate fighting. As it takes steps to reduce the likelihood of war with China, the United States must prepare for one by reducing force vulnerabilities, increasing counter–anti-access and area-denial capabilities, and using economic and international effects to its advantage.