When the United States invaded Iraq in 2003, the American media paid little attention to the fact that the U.S. was about to end hundreds of years of Sunni supremacy in one of the Middle East’s most important countries. Among the farthest reaching consequences of America’s introduction of democracy to the Shiite-majority country was the…
Tag: Iran
Policy Series: “Maximum Pressure:” The Trump Administration and Iran
While campaigning for President in 2015 and 2016, Donald Trump never missed an opportunity to attack the major foreign policy achievement of President Barack Obama: the Joint Comprehensive Plan of Action (JCPOA), an agreement reached between the Islamic Republic of Iran and the United States, European Union, China, and Russia in June 2015 that halted…
Roundtable 10-7 on Losing an Enemy: Obama, Iran, and the Triumph of Diplomacy
With the Trump administration debating whether to certify that Iran is complying with the 2015 Joint Comprehensive Plan of Action (JCPOA), colloquially known as the Iran Nuclear Deal, this Roundtable on the tortuous path to its conclusion is timely. Our reviewers bring special expertise to the task. Robert Gallucci was the lead negotiator for the…
Article Review 89 on “Causes of the U.S. Hostage Crisis in Iran: The Untold Account of the Communist Threat.”
In this detailed and scholarly article, Mohammad Ayatollahi Tabaar is definitely on to something. He argues that those who captured and occupied the U.S. Embassy in Tehran in 1979-1981 (the so-called “Moslem Student Followers of the Imam’s Line”) were responding to serious challenges from Iranian leftists. By their action, he argues, the occupiers were pre-empting…
Policy Series: The Trump Administration and the Middle East
With one very important exception, and despite a number of rhetorical and stylistic differences, the Trump Administration’s approach to the Middle East is not substantially different from that of the Obama Administration.[1] President Barack Obama prioritized the fight against Salafi jihadist groups (al-Qaeda, the Islamic State of Iraq and Syria [ISIS], and their offshoots) above…
Forum 7 on “What Really Happened: Solving the Cold War’s Cold Cases.”
While covert action had been a staple of American national security policy long before the Cold War, it was with that conflict that it gained wide-spread recognition as a key instrument of policy. Even after decades of analysis, however, we still are grappling with the question of what benefits these operations have provided to America’s…
Roundtable 7-15 on The Kennan Diaries
An eleven year old George Kennan began keeping a diary on January 1, 1916. At the very start of the diary he wrote “In this simple, little book, A record of the day I cast; So I afterwards may look back upon my happy past” (684). Due to Kennan’s remarkably lengthy and prolific career as…
Review Essay 23 on Psychology, Strategy, and Conflict
Each year, undergraduates in my introductory course on international relations read three articles by Robert Jervis. His classic “Cooperation under the Security Dilemma” forces students, so often used to thinking in terms of intentions and motivations, to recognize how structure can lead to tragic outcomes in world politics. They then turn to a chapter from…
Article Review 26 on “Forced to be Free? Why Foreign-Imposed Regime Change Rarely Leads to Democratization.”
Will the international community be able to build consolidated democratic regimes in Afghanistan or Iraq in the context of decade-long military interventions in those nations? In “Forced to be Free?” Alexander Downes and Jonathan Monten argue persuasively that if foreign nations intervene in a state simply to impose a new leader on that state, democracy…
“The Skeptics Misconstrue the Cyber Revolution” (Response to Essay 17)
Let it be stated at the outset: the virtual weapon has not fundamentally changed the nature of war. Further, insofar as the consequences of its use do not rise to the level of traditional interstate violence, there will be no such thing as cyber ‘war.’ In these respects, those who claim that the contemporary cyber…