ng Organizational Responses to COVID-19 and Climate Change: A Conversation with Rebecca Henderson By www.belfercenter.org Published On :: Apr 8, 2020 Apr 8, 2020Rebecca Henderson, the John and Natty McArthur University Professor at Harvard University, shared her perspectives on how large organizations are changing in response to the coronavirus pandemic and climate change in the newest episode of “Environmental Insights: Discussions on Policy and Practice from the Harvard Environmental Economics Program.” Full Article
ng Harvard Business School Professor Rebecca Henderson Outlines Ways Organizations are Changing in Response to the Coronavirus Pandemic and Climate Change in New Edition of "Environmental Insights" By www.belfercenter.org Published On :: Apr 8, 2020 Apr 8, 2020Rebecca Henderson, the John and Natty McArthur University Professor at Harvard University, shared her perspectives on how large organizations are changing in response to the coronavirus pandemic and climate change in the newest episode of "Environmental Insights: Discussions on Policy and Practice from the Harvard Environmental Economics Program," a podcast produced by the Harvard Environmental Economics Program. Listen to the interview here. Listen to the interview here. Full Article
ng How COVID-19 is Testing American Leadership By www.belfercenter.org Published On :: Apr 26, 2020 Apr 26, 2020Joseph Nye suggests that a new U.S. administration might take a leaf from the success of the post-1945 American presidents that are described in Do Morals Matter? Presidents and Foreign Policy from FDR to Trump. The United States could launch a massive COVID-19 aid program like the Marshall Plan. Full Article
ng The Arctic is Transforming… Can We? By www.belfercenter.org Published On :: May 1, 2020 May 1, 2020Joel Clement describes how the Arctic is transforming into a warmer, wetter, and less predictable climate state, what the consequences are for the Arctic's indigenous inhabitants, and what measures can be taken to build resilience. Full Article
ng Hutchins Roundup: Consumer spending, salary history bans, and more. By webfeeds.brookings.edu Published On :: Thu, 30 Apr 2020 15:42:07 +0000 Studies in this week’s Hutchins Roundup find that consumer spending has fallen sharply because of COVID-19, salary history bans have increased women’s earnings relative to men’s, and more. Want to receive the Hutchins Roundup as an email? Sign up here to get it in your inbox every Thursday. Consumer spending falls sharply because of COVID-19… Full Article
ng What’s the Fed doing in response to the COVID-19 crisis? What more could it do? By webfeeds.brookings.edu Published On :: Thu, 30 Apr 2020 20:40:30 +0000 The coronavirus crisis in the United States—and the associated business closures, event cancellations, and work-from-home policies—has triggered a deep economic downturn of uncertain duration. The Federal Reserve has stepped in with a broad array of actions to limit the economic damage from the pandemic, including up to $2.3 trillion in lending to support households, employers, financial… Full Article
ng Making sense of the monthly jobs report during the COVID-19 pandemic By webfeeds.brookings.edu Published On :: Tue, 05 May 2020 18:43:02 +0000 The monthly jobs report—the unemployment rate from one survey and the change in employer payrolls from another survey—is one of the most closely watched economic indicators, particularly at a time of an economic crisis like today. Here’s a look at how these data are collected and how to interpret them during the COVID-19 pandemic. What… Full Article
ng Factoring Pandemic Risks into Financial Modelling By feedproxy.google.com Published On :: Apr 1, 2020 Apr 1, 2020Today’s economic crisis leaves us with an unsettling and perplexing regret. Why weren’t financial portfolios already adjusted for risks that stem from health events such as pandemics? After all, financial portfolios are adjusted for liquidity risks, market risks, credit risks, and even operational and political risks. Full Article
ng Transatlantic Dialogue: The Missing Link in Europe’s Post-Covid-19 Green Deal? By feedproxy.google.com Published On :: Apr 10, 2020 Apr 10, 2020This policy brief emphasizes that the European Green Deal's effectiveness in a post Covid-19 world will require the involvement of strategic partners, especially the US. In the context of a potential US withdrawal from the Paris Agreement and the consequential vacuum, it will be even more important to engage the US in implementing the GD. In light of divergence between the US and the EU during past climate negotiations (e.g. Kyoto, Copenhagen, and Paris), we suggest a gradual approach to US engagement with GD initiatives and objectives. Full Article
ng No, COVID-19 Isn’t Turning Europe Pro-China (Yet) By feedproxy.google.com Published On :: Apr 15, 2020 Apr 15, 2020Ever since the World Health Organization declared Europe the new epicenter of the coronavirus pandemic on March 13, China has seized the opportunity to provide relief to some of the worst-hit European countries as part of a concerted PR offensive aiming at polishing up the Communist Party’s image internationally and — above all — domestically. Although China’s aid offers have generally been welcomed by those leaders struggling to contain the outbreak, it is still far too early to conclude that Beijing is actually winning over any European hearts and minds. Full Article
ng No, the Coronavirus Will Not Change the Global Order By feedproxy.google.com Published On :: Apr 16, 2020 Apr 16, 2020Joseph Nye advises skepticism toward claims that the pandemic changes everything. China won't benefit, and the United States will remain preeminent. Full Article
ng The Global Pandemic Has Spawned New Forms of Activism — and They're Flourishing By feedproxy.google.com Published On :: Apr 20, 2020 Apr 20, 2020The authors have identified nearly 100 distinct methods of nonviolent action that include physical, virtual and hybrid actions. Full Article
ng There's No Such Thing as Good Liberal Hegemony By feedproxy.google.com Published On :: Apr 21, 2020 Apr 21, 2020Stephen Walt argues that as democracies falter, it's worth considering whether the United States made the right call in attempting to create a liberal world order. Full Article
ng In a Global Emergency, Women are Showing How to Lead By feedproxy.google.com Published On :: Apr 21, 2020 Apr 21, 2020Zoe Marks argues that to the extent that female heads of state are performing better than men against the coronavirus crisis, it's likely because women are expected to be — and have learned to be — more democratic leaders, more collaborative and more compassionate communicators. Full Article
ng How COVID-19 is Testing American Leadership By feedproxy.google.com Published On :: Apr 26, 2020 Apr 26, 2020Joseph Nye suggests that a new U.S. administration might take a leaf from the success of the post-1945 American presidents that are described in Do Morals Matter? Presidents and Foreign Policy from FDR to Trump. The United States could launch a massive COVID-19 aid program like the Marshall Plan. Full Article
ng What Caused the COVID-19 Testing Deficit? By feedproxy.google.com Published On :: Apr 30, 2020 Apr 30, 2020As the divergent experiences of the US and South Korea show, testing can be the difference between disease containment and catastrophe. Rather than relying on national governments to ensure the rapid development, production, and deployment of diagnostics during outbreaks, the world needs a global coordinating platform. Full Article
ng The Arctic is Transforming… Can We? By feedproxy.google.com Published On :: May 1, 2020 May 1, 2020Joel Clement describes how the Arctic is transforming into a warmer, wetter, and less predictable climate state, what the consequences are for the Arctic's indigenous inhabitants, and what measures can be taken to build resilience. Full Article
ng The United States Forgot Its Strategy for Winning Cold Wars By feedproxy.google.com Published On :: May 5, 2020 May 5, 2020Stephen Walt writes that arguments against U.S. offshore balancing misunderstand history. The strategy that worked against the Soviet Union can work against China. Full Article
ng Breaking the Ice: How France and the UK Could Reshape a Credible European Defense and Renew the Transatlantic Partnership By feedproxy.google.com Published On :: May 7, 2020 May 7, 2020History is replete with irony, but rarely more poignantly than in the summer of 2016 when, on 23 June, the UK voted to leave the European Union and the next day, 24 June, the EU published its Global Strategy document asserting its ambition of “strategic autonomy.” Whither Franco-British defense cooperation in such chaotic circumstances? This paper attempts to provide the outline of an answer to that question. Full Article
ng No going back: How America and the Middle East can turn the page to a productive future By webfeeds.brookings.edu Published On :: Wed, 23 Oct 2019 14:32:36 +0000 Ever since President Trump abruptly decided to withdraw troops from northern Syria, there’s been growing debate about the role of America in the Middle East. And there should be. This is a region that about 400 million souls call home. And it’s right on Europe’s doorstep. If we’ve learned anything since 9/11, it should be… Full Article
ng Reforming Tunisia’s military courts By webfeeds.brookings.edu Published On :: Thu, 07 Nov 2019 21:44:42 +0000 As Tunisia’s newly-elected parliamentarians take their seats, a number of democratic reforms await their attention. Amnesty International has already highlighted five key areas, including the state of emergency, security force abuses, transitional justice, the constitutional court, and the death penalty. To this list we would humbly add a sixth: reforming, if not abolishing, the military… Full Article
ng Stepping Back from the Brink on Iran By feedproxy.google.com Published On :: Jan 8, 2020 Jan 8, 2020Neither the United States nor Iran wants to go to war. That’s the good news. The bad news is that in the fog of crisis — similar in many ways to the fog of war — the danger of inadvertently stumbling into war is dangerously high. Full Article
ng The Overwhelming Case for No First Use By feedproxy.google.com Published On :: Jan 13, 2020 Jan 13, 2020The arguments in favor of the United States' declaring that the only purpose of its nuclear weapons is to deter others who possess them from using theirs — in other words, that in no circumstances will this country use nuclear weapons first — are far stronger than the arguments against this stance. It must be hoped that the next US administration will take this no-first-use step promptly. Full Article
ng The Low-Yield Nuclear Warhead: A Dangerous Weapon Based on Bad Strategic Thinking By feedproxy.google.com Published On :: Jan 28, 2020 Jan 28, 2020In the unintuitive world of nuclear weapons strategy, it’s often difficult to identify which decisions can serve to decrease the risk of a devastating nuclear conflict and which might instead increase it. Such complexity stems from the very foundation of the field: Nuclear weapons are widely seen as bombs built never to be used. Historically, granular—even seemingly mundane—decisions about force structure, research efforts, or communicated strategy have confounded planners, sometimes causing the opposite of the intended effect. Full Article
ng Accumulating Evidence Using Crowdsourcing and Machine Learning: A Living Bibliography about Existential Risk and Global Catastrophic Risk By feedproxy.google.com Published On :: Feb 3, 2020 Feb 3, 2020The study of existential risk — the risk of human extinction or the collapse of human civilization — has only recently emerged as an integrated field of research, and yet an overwhelming volume of relevant research has already been published. To provide an evidence base for policy and risk analysis, this research should be systematically reviewed. In a systematic review, one of many time-consuming tasks is to read the titles and abstracts of research publications, to see if they meet the inclusion criteria. The authors show how this task can be shared between multiple people (using crowdsourcing) and partially automated (using machine learning), as methods of handling an overwhelming volume of research. Full Article
ng The Need for Creative and Effective Nuclear Security Vulnerability Assessment and Testing By feedproxy.google.com Published On :: Feb 10, 2020 Feb 10, 2020Realistic, creative vulnerability assessment and testing are critical to finding and fixing nuclear security weaknesses and avoiding over-confidence. Both vulnerability assessment and realistic testing are needed to ensure that nuclear security systems are providing the level of protection required. Systems must be challenged by experts thinking like adversaries, trying to find ways to overcome them. Effective vulnerability assessment and realistic testing are more difficult in the case of insider threats, and special attention is needed. Organizations need to find ways to give people the mission and the incentives to find nuclear security weaknesses and suggest ways they might be fixed. With the right approaches and incentives in place, effective vulnerability assessment and testing can be a key part of achieving and sustaining high levels of nuclear security. Full Article
ng The Risks and Rewards of Emerging Technology in Nuclear Security By feedproxy.google.com Published On :: Feb 10, 2020 Feb 10, 2020Nuclear security is never finished. Nuclear security measures for protecting all nuclear weapons, weapons-usable nuclear materials, and facilities whose sabotage could cause disastrous consequences should protect against the full range of plausible threats. It is an ongoing endeavor that requires constant assessment of physical protection operations and reevaluation of potential threats. One of the most challenging areas of nuclear security is how to account for the impact–positive and negative—of non-nuclear emerging technologies. The amended Convention on the Physical Protection of Nuclear Material (amended CPPNM) states it should be reviewed in light of the prevailing situation, and a key part of the prevailing situation is technological evolution. Therefore, the upcoming review conference in 2021, as well as any future review conferences, should examine the security threats and benefits posed by emerging technologies. Full Article
ng Assessing Progress on Nuclear Security Action Plans By feedproxy.google.com Published On :: Feb 10, 2020 Feb 10, 2020Participants at the final Nuclear Security Summit in 2016 agreed on “action plans” for initiatives they would support by five international organizations and groups—the International Atomic Energy Agency, the Global Initiative to Combat Nuclear Terrorism, INTERPOL, the United Nations, and the Global Partnership Against the Spread of Weapons and Materials of Destruction. These institutions were supposed to play key roles in bolstering ongoing nuclear security cooperation after the summit process ended. The action plans were modest documents, largely endorsing activities already underway, and there have been mixed results in implementing them. To date, these organizations have not filled any substantial part of the role once played by the nuclear security summits. Full Article
ng Public Testimony on Trump Administration Funding for Nuclear Theft Preventing Programs By feedproxy.google.com Published On :: Mar 31, 2020 Mar 31, 2020A nuclear explosion detonated anywhere by a terrorist group would be a global humanitarian, economic, and political catastrophe. The current COVID-19 pandemic reminds us not to ignore prevention of and preparation for low-probability, high-consequence disasters. For nuclear terrorism, while preparation is important, prevention must be the top priority. The most effective strategy for keeping nuclear weapons out of the hands of terrorists is to ensure that nuclear materials and facilities around the world have strong and sustainable security. Every president for more than two decades has made strengthening nuclear security around the globe a priority. This includes the Trump administration, whose 2018 Nuclear Posture Review states: “[n]uclear terrorism remains among the most significant threats to the security of the United States, allies, and partners.” Full Article
ng Living with Uncertainty: Modeling China's Nuclear Survivability By feedproxy.google.com Published On :: Apr 11, 2020 Apr 11, 2020A simplified nuclear exchange model demonstrates that China’s ability to launch a successful nuclear retaliatory strike in response to an adversary’s nuclear first strike has been and remains far from assured. This study suggests that China’s criterion for effective nuclear deterrence is very low. Full Article
ng Breaking Down the Huawei v. Pentagon Dispute By feedproxy.google.com Published On :: Mar 26, 2020 Mar 26, 2020If nothing else, the long-running Huawei situation shows the importance of considering the supply chain when it comes to cybersecurity. Huawei being the Chinese telecommunications equipment maker basically banned by the federal government. Bruce Schneier joins Host Tom Temin on Federal Drive. Full Article
ng Spies Are Fighting a Shadow War Against the Coronavirus By feedproxy.google.com Published On :: Apr 3, 2020 Apr 3, 2020Calder Walton describes four ways how intelligence services are certain to contribute to defeating COVID-19 and why pandemic intelligence will become a central part of future U.S. national security. Full Article
ng No, the Coronavirus Will Not Change the Global Order By feedproxy.google.com Published On :: Apr 16, 2020 Apr 16, 2020Joseph Nye advises skepticism toward claims that the pandemic changes everything. China won't benefit, and the United States will remain preeminent. Full Article
ng Getting Smart on Pandemics: Intelligence in the Wake of COVID-19 By feedproxy.google.com Published On :: Apr 17, 2020 Apr 17, 2020This episode of Horns of a Dilemma touches on whether the failure to properly anticipate and warn about the novel coronavirus constitutes an intelligence failure, what changes might be required in the intelligence community in the wake of the pandemic, and what type of investigation or inquiry might be appropriate in order to learn lessons and incorporate changes for both the intelligence community and the whole of government moving forward. Full Article
ng There's No Such Thing as Good Liberal Hegemony By feedproxy.google.com Published On :: Apr 21, 2020 Apr 21, 2020Stephen Walt argues that as democracies falter, it's worth considering whether the United States made the right call in attempting to create a liberal world order. Full Article
ng How the Pentagon Is Struggling to Stay out of Politics By feedproxy.google.com Published On :: Apr 28, 2020 Apr 28, 2020 Gen. Mark. A. Milley’s job is to provide sound military advice to the president. But at a deeper level, his responsibility is to safeguard the independence and integrity of the armed forces. The last thing the country needs is a military leadership that’s trying to curry favor with any commander in chief, particularly one who’s hungry for affirmation. Full Article
ng The United States Forgot Its Strategy for Winning Cold Wars By feedproxy.google.com Published On :: May 5, 2020 May 5, 2020Stephen Walt writes that arguments against U.S. offshore balancing misunderstand history. The strategy that worked against the Soviet Union can work against China. Full Article
ng Breaking the Ice: How France and the UK Could Reshape a Credible European Defense and Renew the Transatlantic Partnership By feedproxy.google.com Published On :: May 7, 2020 May 7, 2020History is replete with irony, but rarely more poignantly than in the summer of 2016 when, on 23 June, the UK voted to leave the European Union and the next day, 24 June, the EU published its Global Strategy document asserting its ambition of “strategic autonomy.” Whither Franco-British defense cooperation in such chaotic circumstances? This paper attempts to provide the outline of an answer to that question. Full Article
ng The Economic Gains of Cloud Computing: An Address by Federal Chief Information Officer Vivek Kundra By webfeeds.brookings.edu Published On :: Wed, 07 Apr 2010 09:00:00 -0400 Event Information April 7, 20109:00 AM - 11:00 AM EDTFalk AuditoriumThe Brookings Institution1775 Massachusetts Ave., NWWashington, DC Register for the EventCloud computing services over the Internet have the potential to spur a significant increase in government efficiency and decrease technology costs, as well as to create incentives and online platforms for innovation. Adoption of cloud computing technologies could lead to new, efficient ways of governing.On April 7, the Brookings Institution hosted a policy forum that examines the economic benefits of cloud computing for local, state, and federal government. Federal Chief Information Officer Vivek Kundra delivered a keynote address on the role of the government in developing and promoting cloud computing. Brookings Vice President Darrell West moderated a panel of experts and detailed the findings in his paper, "Saving Money through Cloud Computing," which analyzes its governmental cost-savings potential. After the program, panelists took audience questions. Video Cloud Computing a Fiscally Smart MoveCloud Computing Saves Money, Makes Government More OpenCloud Computing Will Fundamentally Change Government OperationsGovernment on Cloud Will Yield Cost-Effective System Audio The Economic Gains of Cloud Computing Transcript Uncorrected Transcript (.pdf) Event Materials 20100407_cloud_computing0407_cloud_computing_kundra_remarks0407_cloud_computing_kundra_presentation Full Article
ng Innovating through Cloud Computing By webfeeds.brookings.edu Published On :: Fri, 07 May 2010 00:00:00 -0400 Technology offers the greatest source for innovation in the public sector and one of the best examples falls within the area of cloud computing. As I noted in a recent paper, the U.S. federal government spends nearly $76 billion each year on information technology, and $20 billion of that is devoted to hardware, software, and file servers. Traditionally, computing services have been delivered through desktops or laptops operated by proprietary software. But new advances in cloud computing have made it possible for public sector agencies alike to access software, services, and data storage through remote file servers.I looked at possible cost savings a federal agency might expect from migrating to the cloud. After undertaking case studies of government agencies that made the move, I found that the agencies generally saw between 25 and 50 percent savings in moving to the cloud. Public officials can save money by reducing the number of file servers they need to purchase, cutting software costs, relying on fewer information technology specialists, and improving the efficiency of their data storage utilization. In 2008, Washington, D.C. city government shifted many of its 38,000 employee email services across 86 agencies to the cloud, and the migration saved 48 percent on email expenditures. In 2009, the city of Los Angeles moved email service for its 30,000 employees to the cloud. An analysis undertaken by City Administrative Officer Miguel Santana for the City Council found that the five-year costs of running the new Google system would be $17,556,484, which was 23.6 percent less than the $22,996,242 for operating GroupWise during that same period. And in terms of personnel savings, the city needed nine fewer people in its information technology department. The U.S. Air Force 45th Space Wing is responsible for launching and tracking unmanned space vehicles from Cape Canaveral Air Force Station and employs more than 10,000 workers. The Wing had 60 distinct file servers, but found that it utilized only 10 percent of central processing unit capacity. Commanders modernized their system and saved $180,000 per year in annual computing costs. In addition, the unit saved money by not buying new hardware or deploying new software. These are just some of the ways the government is using technology to save money and increase efficiency of its operations. Authors Darrell M. West Image Source: © HANNIBAL HANSCHKE / Reuters Full Article
ng Steps to Improve Cloud Computing in the Public Sector By webfeeds.brookings.edu Published On :: Wed, 21 Jul 2010 09:58:00 -0400 Executive SummaryGovernment information technology is subject to a variety of rules, regulations, and procurement policies. Computing is treated differently depending on whether the platform is based on desktops, laptops, mobile devices, or remote file servers known as cloud computing. There are differences between the executive, legislative, and judicial branches of government, as well as in the level of privacy and security expected for various applications. Some people perceive higher security on desktop or laptop computers and lower security with the cloud because the latter’s information is stored remotely through third-party commercial providers. In reality, though, there are serious security threats to all electronic information regardless of platform, and cloud server providers often take security more seriously than mass consumers or government officials employing weak passwords on their local computers. In this paper, I review current federal IT policy and discuss rules, practices, and procedures that limit innovation. There are a variety of obstacles that make it difficult for policymakers to take full advantage of the technological revolution that has unfolded in recent years. After outlining these issues, I make recommendations on policy changes required to improve the efficiency and effectiveness of federal computing. My specific recommendations include: Public officials should develop more consistent rules on computing across desktop, laptop, mobile, and cloud platforms. The use of video, collaboration, and social networking should be authorized for congressional offices. This would make legislative branch policy consistent with that of the executive branch. Judicial branch computing should be modernized, with greater emphasis on cloud computing. There should be a more uniform certification process for federal agencies. Right now, each agency is responsible for certifying its own applications. It makes sense to have a “joint authorization board” with the power to review management services and certify particular products for use across the government. Congress should update the Electronic Communications Privacy Act to change the process by which law enforcement agents obtain electronic information. Instead of using a prosecutor’s subpoena, legislation should require a “probable cause” search warrant that is approved by a judge. This would provide greater safeguards in terms of online content, pictures, geolocation data, and e-mails. Privacy rights should be placed on the same footing regardless of whether a person is using desktop or cloud computing. It makes little sense to have weaker standards on one platform than another. Consumers and government decision-makers expect the same level of protection whether they are accessing information on a desktop, laptop, mobile, or cloud storage system. Congress should amend the Computer Fraud and Abuse Act to strengthen penalties for unwanted intrusion into computing systems. The law has inconsistent penalties and prosecutors have found that it is hard to prosecute cyber-crimes. Apps.gov represents a big step forward and government use should be expanded because it makes procurement easier and speeds public sector innovation. It is a model of how the government can reinvent itself through digital technology in ways that improve efficiency and effectiveness. Countries need to harmonize their laws on cloud computing so as to reduce current inconsistencies in regard to privacy, data storage, security processes, and personnel training, There should be mechanisms for data exchange that encourage portability across platforms. We should avoid vendor lock-in that precludes data exchange. Data on uptime, downtime, recover time, archiving, and maintenance schedules would help build public trust by providing information on computing performance. Downloads Download the Full Paper Authors Darrell M. West Image Source: Martin Barraud Full Article
ng Moving to the Cloud: How the Public Sector Can Leverage the Power of Cloud Computing By webfeeds.brookings.edu Published On :: Wed, 21 Jul 2010 10:00:00 -0400 Event Information July 21, 201010:00 AM - 12:00 PM EDTFalk AuditoriumThe Brookings Institution1775 Massachusetts Ave., NWWashington, DC Register for the EventThe U.S. government spends billions of dollars each year on computer hardware, software and file servers that may no longer be necessary. Currently, the public sector makes relatively little use of cloud computing, even though studies suggest substantial government savings from a migration to more Internet-based computing with shared resources.On July 21, the Center for Technology Innovation at Brookings hosted a policy forum on steps to enhance public sector adoption of cloud computing innovations. Brookings Vice President Darrell West moderated a panel of experts, including David McClure of the General Services Administration, Dawn Leaf of the National Institute for Standards and Technology, and Katie Ratte of the Federal Trade Commission. West released a paper detailing the policy changes required to improve the efficiency and effectiveness of federal computing. Audio Moving to the Cloud: How the Public Sector Can Leverage the Power of Cloud Computing Transcript Uncorrected Transcript (.pdf)Download Dawn Leaf's PowerPoint Presentation (.pdf)Download David McClure's PowerPoint Presentation (.pdf) Event Materials 20100721_cloud_computing0721_cloud_computing_leaf0721_cloud_computing_mcclure Full Article
ng Privacy and Security in the Cloud Computing Age By webfeeds.brookings.edu Published On :: Tue, 26 Oct 2010 10:00:00 -0400 Event Information October 26, 201010:00 AM - 11:30 AM EDTFalk AuditoriumThe Brookings Institution1775 Massachusetts Ave., NWWashington, DC Register for the EventAlthough research suggests that considerable efficiencies can be gained from cloud computing technology, concerns over privacy and security continue to deter government and private-sector firms from migrating to the cloud. By its very nature, storing information or accessing services through remote providers would seem to raise the level of privacy and security risks. But is such apprehension warranted? What are the real security threats posed to individuals, business and government by cloud computing technologies? Do the cost-saving benefits outweigh the dangers?On October 26, the Brookings Institution hosted a policy forum on the privacy and security challenges raised by cloud computing. Governance Studies Director Darrell West moderated a panel of technology industry experts examining how cloud computing systems can generate innovation and cost savings without sacrificing privacy and security. West will also present findings from his forthcoming paper “Privacy, Security, and Innovation in Cloud Computing.” After the program, panelists took audience questions. Transcript Uncorrected Transcript (.pdf) Event Materials 20101026_cloud_computing Full Article
ng Privacy and Security in Cloud Computing By webfeeds.brookings.edu Published On :: Tue, 26 Oct 2010 11:50:00 -0400 Executive Summary Cloud computing can mean different things to different people, and obviously the privacy and security concerns will differ between a consumer using a public cloud application, a medium-sized enterprise using a customized suite of business applications on a cloud platform, and a government agency with a private cloud for internal database sharing (Whitten, 2010). The shift of each category of user to cloud systems brings a different package of benefits and risks. What remains constant, though, is the tangible and intangible value that the user seeks to protect. For an individual, the value at risk can range from loss of civil liberties to the contents of bank accounts. For a business, the value runs from core trade secrets to continuity of business operations and public reputation. Much of this is hard to estimate and translate into standard metrics of value (Lev, 2003) The task in this transition is to compare the opportunities of cloud adoption with the risks. The benefits of cloud have been discussed elsewhere, to the individual to the enterprise, and to the government (West, 2010a, 2010b). This document explores how to think about privacy and security on the cloud. It is not intended to be a catalog of cloud threats (see ENISA (2009) for an example of rigorous exploration of the risks of cloud adoption to specific groups). We frame the set of concerns for the cloud and highlight what is new and what is not. We analyze a set of policy issues that represent systematic concerns deserving the attention of policy-makers. We argue that the weak link in security generally is the human factor and surrounding institutions and incentives matter more than the platform itself. As long as we learn the lessons of past breakdowns, cloud computing has the potential to generate innovation without sacrificing privacy and security (Amoroso, 2006; Benioff, 2009). Downloads Download the Full Paper Authors Allan A. FriedmanDarrell M. West Image Source: Jupiterimages Full Article
ng The Terms They Are A-Changin'...: Watching Cloud Computing Contracts Take Shape By webfeeds.brookings.edu Published On :: Tue, 01 Mar 2011 13:45:00 -0500 EXECUTIVE SUMMARYMany web services are examples of cloud computing, from storage and backup sites such as Flickr and Dropbox to online business productivity services such as Google Docs and Salesforce.com. Cloud computing offers a potentially attractive solution to customers keen to acquire computing infrastructure without large up-front investment, particularly in cases where their demand may be variable and unpredictable, as a means of achieving financial savings, productivity improvements and the wider flexibility that accompanies Internet-hosting of data and applications. The greater flexibility of a cloud computing service as compared with a traditional outsourcing contract may be offset by reduced certainty for the customer in terms of the location of data placed into the cloud and the legal foundations of any contract with the provider. There may be unforeseen costs and risks hidden in the terms and conditions of such services. This document reports on a detailed survey and analysis of the terms and conditions offered by cloud computing providers. The survey formed part of the Cloud Legal Project at the Centre for Commercial Law Studies (CCLS), within the School of Law at Queen Mary, University of London, UK. Funded by a donation from Microsoft, but academically independent, the project is examining a wide range of legal and regulatory issues arising from cloud computing. The project's survey of 31 cloud computing contracts from 27 different providers, based on their standard terms of service as offered to customers in the E.U. and U.K., found that many include clauses that could have a significant impact, often negative, on the rights and interests of customers. The ease and convenience with which cloud computing arrangements can be set up may lull customers into overlooking the significant issues that can arise when key data and processes are entrusted to cloud service providers. The main lesson to be drawn from the Cloud Legal Project’s survey is that customers should review the terms and conditions of a cloud service carefully before signing up to it. The survey found that some contracts, for instance, have clauses disclaiming responsibility for keeping the user’s data secure or intact. Others reserve the right to terminate accounts for apparent lack of use (potentially important if they are used for occasional backup or disaster recovery purposes), for violation of the provider’s Acceptable Use Policy, or indeed for any or no reason at all. Furthermore, whilst some providers promise only to hand over customer data if served with a court order, others state that they will do so on much wider grounds, including it simply being in their own business interests to disclose the data. Cloud providers also often exclude liability for loss of data, or strictly limit the damages that can be claimed against them – damages that might otherwise be substantial if a failure brought down an e-commerce web site. Although in some U.S. states, in E.U. countries and in various other jurisdictions the validity of such terms may be challenged under consumer protection laws, users of cloud services may face practical obstacles to bringing a claim for data loss or privacy breach against a provider that seems local online but is, in fact, based in another continent. Indeed, service providers usually claim that their contracts are subject to the laws of the place where they have their main place of business. In many cases this is a US state, with a stipulation that any dispute must be heard in the provider’s local courts, regardless of the customer’s location. Perhaps the most disconcerting discovery of the Cloud Legal Project’s survey was that many providers claimed to be able to amend their contracts unilaterally, simply by posting an updated version on the web. In effect, customers are put on notice to download lengthy and complex contracts, on a regular basis, and to compare them against their own copies of earlier versions to look for changes. The cloud computing market is still developing rapidly, and potential cloud customers should be aware that there may be a mismatch between their expectations and the reality of cloud providers' service terms, and be alive to the possibility of unexpected changes to the terms. Downloads Download the Full Paper Authors Simon BradshawChristopher MillardIan Walden Image Source: Natalie Racioppa Full Article
ng Evaluating the Cloud Computing Act of 2011 By webfeeds.brookings.edu Published On :: Thu, 16 Jun 2011 12:00:00 -0400 Event Information June 16, 201112:00 PM - 1:30 PM EDTRoom SVC-209U.S. Capitol Visitor's CenterU.S. CapitolWashington, DC While research suggests that considerable efficiencies can be gained from cloud computing technology, concerns over privacy and security continue to deter governments and private-sector firms from migrating to the cloud. Senator Amy Klobuchar (D-Minn.) has advanced discussion of the “Cloud Computing Act of 2011,” draft legislation that would address these challenges by encouraging the U.S. government to negotiate with other countries to establish consistent laws related to online security and cloud computing. The bill also creates new enforcement tools for investigating and prosecuting those who violate online privacy and security laws.On June 16, the Brookings Institution hosted a forum on the policy proposals in the Cloud Computing Act of 2011. Discussion included an overview of the international policy implications as governments and firms adjust to a coherent legal framework, changes and innovations in public procurement, and challenges for private industry as it balances consumer needs and compliance with these proposed cloud computing safeguards. After the program, panelists took audience questions. Transcript Uncorrected Transcript (.pdf) Event Materials 20110616_cloud_computing Full Article
ng Addressing Export Control in the Age of Cloud Computing By webfeeds.brookings.edu Published On :: Mon, 25 Jul 2011 10:58:00 -0400 Executive SummaryThe move to the cloud is one of the defining information technology trends of the early 21st century. By providing businesses, universities, government agencies, and other entities with access to shared and often physically dispersed computing resources, cloud computing can simultaneously offer increased flexibility, reduced cost, and access to a wider array of services. Cloud computing has also created a set of new challenges. For example, the issues of privacy and security in the cloud are well recognized and have been extensively discussed in the business and popular press. However, one critical issue that has received very little attention with respect to cloud computing is export control. In the broadest sense, export control relates to regulations that the United States and many other countries have put in place to restrict the export of various sensitive items, information, and software. There is an inherent tension between cloud computing and export control. While the concept of the cloud is centered on the premise of removing the need to track the details of data movement among various destinations, export control regulations are built largely around restrictions tied to those very movements. If cloud computing is to reach its full potential, it is critical for providers and users of cloud services to address its implications with respect to export control. It is equally important to adapt the export control regulations to reflect the increasing prevalence of cloud computing in a manner that preserves the ability of American companies to benefit from the efficiencies of the cloud while also ensuring that American national security and foreign policy interests are adequately protected. Downloads Download the Paper Authors John Villasenor Image Source: © Valentin Flauraud / Reuters Full Article
ng New Federal Government CIO is Key to Improving Government Performance By webfeeds.brookings.edu Published On :: Tue, 09 Aug 2011 12:47:00 -0400 The appointment of new federal chief information officer Steven VanRoekel comes at a challenging time for President Barack Obama. The national economy continues to be weak. Congress plans to cut trillions from the federal budget. And in the time leading up to the 2012 election, American voters remain cynical about the ability of the government to address important policy problems in an effective manner.In an era of deficit reduction and public cynicism, the tasks facing federal officials are to determine how to do more with less and persuade voters the government can become smarter and more effective. There are going to be fewer dollars for virtually every federal program so it is important to figure how ways to innovate and perform more efficiently. Former CIO Vivek Kundra sought to do this through encouraging agencies to move software applications to the cloud, consolidating federal data centers, improving transparency, and improving the information technology procurement process. It is important to continue this progress even as agencies are forced to downsize their operations. As shown in the private sector, government administrators should use technology to cut costs, improve worker productivity, and streamline operations. This is not just a matter of using technology in more innovative ways, but changing the operations and culture of the public sector. Public officials must improve its data mining activities to identify fraud and abuse in Medicare, Medicaid, the Defense Department, and other domestic programs. New software gives managers better tools to evaluate how money is being spent and whether it is fulfilling intended goals. If it is not, programs need to be modified or eliminated. The most important weapon in Mr. VanRoekel’s arsenal may be the scalpel as he goes through the federal government’s $80 billion IT budget. Authors Darrell M. West Image Source: © Hyungwon Kang / Reuters Full Article
ng Riding the Mobile Wave: The Future of Mobile Computing By webfeeds.brookings.edu Published On :: Fri, 05 Oct 2012 10:00:00 -0400 Event Information October 5, 201210:00 AM - 11:30 AM EDTFalk AuditoriumBrookings Institution1775 Massachusetts Avenue NWWashington, DC 20036 Register for the EventIn his new book The Mobile Wave: How Mobile Intelligence Will Change Everything (Vanguard Press, 2012), CEO of MicroStrategy Michael Saylor examines the transformative possibilities of mobile computing on business, society, economies and everyday life. Saylor argues that mobile technologies such as smartphones and tablet computers – “the fifth wave of computer technology” – will be indispensible tools for modern life and completely alter how we live. On October 5, the Center for Technology Innovation at Brookings hosted a forum on mobile computing and its monumental impact on our future. Moderated by Vice President Darrell West, Michael Saylor discussed key highlights from his book and offered insights as to what sort of change we can expect from the macro level down to the most mundane of everyday humans tasks. Audio Riding the Mobile Wave: The Future of Mobile Computing Transcript Transcript (.pdf) Event Materials 20121005_mobile_wave Full Article
ng Bridging Transatlantic Differences on Data and Privacy After Snowden By webfeeds.brookings.edu Published On :: Tue, 20 May 2014 07:30:00 -0400 “Missed connections” is the personals ads category for people whose encounters are too fleeting to form any union – a lost-and-found for relationships. I gave that title to my paper on the conversation between the United States and for Europe on data, privacy, and surveillance because I thought it provides an apt metaphor for the hopes and frustrations on both sides of that conversation. The United States and Europe are linked by common values and overlapping heritage, an enduring security alliance, and the world’s largest trading relationship. Europe has become the largest crossroad of the Internet and the transatlantic backbone is the global Internet’s highest capacity route. [I] But differences in approaches to the regulation of the privacy of personal information threaten to disrupt the vast flow of information between Europe and the U.S. These differences have been exacerbated by the Edward Snowden disclosures, especially stories about the PRISM program and eavesdropping on Chancellor Angela Merkel’s cell phone. The reaction has been profound enough to give momentum to calls for suspension of the “Safe Harbor” agreement that facilitates transfers of data between the U.S. Europe; and Chancellor Merkel, the European Parliament, and other EU leaders who have called for some form of European Internet that would keep data on European citizens inside EU borders. So it can seem like the U.S. and EU are gazing at each other from trains headed in opposite directions. My paper went to press before last week’s European Court of Justice ruling that Google must block search results showing that a Spanish citizen had property attached for debt several years ago. What is most startling about the decision is this information was accurate and had been published in a Spanish newspaper by government mandate but – for these reasons – the newspaper was not obligated to remove the information from its website; nevertheless, Google could be required to remove links to that website from search results in Spain. That is quite different from the way the right to privacy has been applied in America. The decision’s discussion of search as “profiling” bears out what the paper says about European attitudes toward Google and U.S. Internet companies. So the decision heightens the differences between the U.S. and Europe. Nonetheless, it does not have to be so desperate. In my paper, I look at the issues that have divided the United States and Europe when it comes to data and the things they have in common, the issues currently in play, and some ways the United States can help to steer the conversation in the right direction. [I] "Europe Emerges as Global Internet Hub," Telegeography, September 18, 2013. Authors Cameron F. Kerry Image Source: © Yves Herman / Reuters Full Article