at

Next Moves on Climate Policy: A Conversation with Sue Biniaz

Sue Biniaz, former lead climate negotiator for the United States, shared her thoughts on the postponement of COP-26, and on the possible re-engagement of the U.S. in the international effort to address climate change in the newest episode of “Environmental Insights: Discussions on Policy and Practice from the Harvard Environmental Economics Program,” a podcast produced by the Harvard Environmental Economics Program.




at

What’s the Fed doing in response to the COVID-19 crisis? What more could it do?

The coronavirus crisis in the United States—and the associated business closures, event cancellations, and work-from-home policies—has triggered a deep economic downturn of uncertain duration. The Federal Reserve has stepped in with a broad array of actions to limit the economic damage from the pandemic, including up to $2.3 trillion in lending to support households, employers, financial…

       




at

Class Notes: Harvard Discrimination, California’s Shelter-in-Place Order, and More

This week in Class Notes: California's shelter-in-place order was effective at mitigating the spread of COVID-19. Asian Americans experience significant discrimination in the Harvard admissions process. The U.S. tax system is biased against labor in favor of capital, which has resulted in inefficiently high levels of automation. Our top chart shows that poor workers are much more likely to keep commuting in…

       




at

Selective Wilsonianism: Material Interests and the West's Support for Democracy

Analysis of the West's differing responses to Ukrainian and Armenian mass movements reveal that, contrary to the popular Wilsonian narrative, the West assists democratic movements only when that assistance coincides with its material interests.




at

Transatlantic Dialogue: The Missing Link in Europe’s Post-Covid-19 Green Deal?

This policy brief emphasizes that the European Green Deal's effectiveness in a post Covid-19 world will require the involvement of strategic partners, especially the US. In the context of a potential US withdrawal from the Paris Agreement and the consequential vacuum, it will be even more important to engage the US in implementing the GD. In light of divergence between the US and the EU during past climate negotiations (e.g. Kyoto, Copenhagen, and Paris), we suggest a gradual approach to US engagement with GD initiatives and objectives.




at

So Do Morals Matter in U.S. Foreign Policy? I Asked the Expert.

In his new book, Do Morals Matter? Presidents and Foreign Policy from FDR to Trump, Joseph S. Nye developed a scorecard to determine how U.S. presidents since 1945 factored questions of ethics and morality into their foreign policy. In an interview, Henry Farrell asked him a few questions to get to the heart of his findings.




at

What Caused the COVID-19 Testing Deficit?

As the divergent experiences of the US and South Korea show, testing can be the difference between disease containment and catastrophe. Rather than relying on national governments to ensure the rapid development, production, and deployment of diagnostics during outbreaks, the world needs a global coordinating platform.




at

The United States Forgot Its Strategy for Winning Cold Wars

Stephen Walt writes that arguments against U.S. offshore balancing misunderstand history. The strategy that worked against the Soviet Union can work against China.




at

Breaking the Ice: How France and the UK Could Reshape a Credible European Defense and Renew the Transatlantic Partnership

History is replete with irony, but rarely more poignantly than in the summer of 2016 when, on 23 June, the UK voted to leave the European Union and the next day, 24 June, the EU published its Global Strategy document asserting its ambition of “strategic autonomy.” Whither Franco-British defense cooperation in such chaotic circumstances? This paper attempts to provide the outline of an answer to that question.




at

From Islamists to Muslim Democrats: The case of Tunisia’s Ennahda

       




at

Why is the United States So Bad at Foreign Policy?

Stephen Walt writes that the United States' unusual historical experience, geographic isolation, large domestic market, and general ignorance have weakened its ability to make viable foreign-policy strategies.




at

The U.S.-China Relationship is at a Crossroads

Joseph Nye writes that some decoupling of interdependence is likely, particularly in areas related to technology that directly affect national security. But will Washington and Beijing go too far?




at

What Makes for a Moral Foreign Policy?

Joseph Nye's new book rates the efforts of presidents from FDR to Trump.




at

The Low-Yield Nuclear Warhead: A Dangerous Weapon Based on Bad Strategic Thinking

In the unintuitive world of nuclear weapons strategy, it’s often difficult to identify which decisions can serve to decrease the risk of a devastating nuclear conflict and which might instead increase it. Such complexity stems from the very foundation of the field: Nuclear weapons are widely seen as bombs built never to be used. Historically, granular—even seemingly mundane—decisions about force structure, research efforts, or communicated strategy have confounded planners, sometimes causing the opposite of the intended effect.




at

Accumulating Evidence Using Crowdsourcing and Machine Learning: A Living Bibliography about Existential Risk and Global Catastrophic Risk

The study of existential risk — the risk of human extinction or the collapse of human civilization — has only recently emerged as an integrated field of research, and yet an overwhelming volume of relevant research has already been published. To provide an evidence base for policy and risk analysis, this research should be systematically reviewed. In a systematic review, one of many time-consuming tasks is to read the titles and abstracts of research publications, to see if they meet the inclusion criteria. The authors show how this task can be shared between multiple people (using crowdsourcing) and partially automated (using machine learning), as methods of handling an overwhelming volume of research.




at

The Need for Creative and Effective Nuclear Security Vulnerability Assessment and Testing

Realistic, creative vulnerability assessment and testing are critical to finding and fixing nuclear security weaknesses and avoiding over-confidence. Both vulnerability assessment and realistic testing are needed to ensure that nuclear security systems are providing the level of protection required. Systems must be challenged by experts thinking like adversaries, trying to find ways to overcome them. Effective vulnerability assessment and realistic testing are more difficult in the case of insider threats, and special attention is needed. Organizations need to find ways to give people the mission and the incentives to find nuclear security weaknesses and suggest ways they might be fixed. With the right approaches and incentives in place, effective vulnerability assessment and testing can be a key part of achieving and sustaining high levels of nuclear security.




at

Secrecy, Public Relations and the British Nuclear Debate

The opening of the British archives has seen historians uncover the secrets of the UK's nuclear weapons programme since the 1990s. While a growing number have sought to expose these former secrets, there has been less effort to consider government secrecy itself. What was kept a secret, when and why? And how and why, notably from the 1980s, did the British government decide to officially disclose greater information about the British nuclear weapons programme to Members of Parliament, journalists, defence academics and the tax-paying general public. 




at

Budapest Memorandum at 25: Between Past and Future

On December 5, 1994, leaders of the United States, the United Kingdom, and the Russian Federation met in Budapest, Hungary, to pledge security assurances to Ukraine in connection with its accession to the Treaty on the Nonproliferation of Nuclear Weapons (NPT) as a non-nuclear-weapons state. The signature of the so-called Budapest Memorandum concluded arduous negotiations that resulted in Ukraine’s agreement to relinquish the world’s third-largest nuclear arsenal, which the country inherited from the collapsed Soviet Union, and transfer all nuclear warheads to Russia for dismantlement. The signatories of the memorandum pledged to respect Ukraine’s territorial integrity and inviolability of its borders, and to refrain from the use or threat of military force. Russia breached these commitments with its annexation of Crimea in 2014 and aggression in eastern Ukraine, bringing the meaning and value of security assurance pledged in the Memorandum under renewed scrutiny.

On the occasion of the 25th anniversary of the memorandum’s signature, the Project on Managing the Atom at the Belfer Center for Science & International Affairs at the Harvard Kennedy School, with the support of the Center for U.S.-Ukrainian Relations and the Harvard Ukrainian Research Institute, hosted a conference to revisit the history of the Budapest Memorandum, consider the repercussions of its violation for international security and the broader nonproliferation regime, and draw lessons for the future. The conference brought together academics, practitioners, and experts who have contributed to developing U.S. policy toward post-Soviet nuclear disarmament, participated in the negotiations of the Budapest Memorandum, and dealt with the repercussions of its breach in 2014. The conference highlighted five key lessons learned from the experience of Ukraine’s disarmament, highlighted at the conference.




at

Public Testimony on Trump Administration Funding for Nuclear Theft Preventing Programs

A nuclear explosion detonated anywhere by a terrorist group would be a global humanitarian, economic, and political catastrophe. The current COVID-19 pandemic reminds us not to ignore prevention of and preparation for low-probability, high-consequence disasters. For nuclear terrorism, while preparation is important, prevention must be the top priority. The most effective strategy for keeping nuclear weapons out of the hands of terrorists is to ensure that nuclear materials and facilities around the world have strong and sustainable security. Every president for more than two decades has made strengthening nuclear security around the globe a priority. This includes the Trump administration, whose 2018 Nuclear Posture Review states: “[n]uclear terrorism remains among the most significant threats to the security of the United States, allies, and partners.”




at

So Do Morals Matter in U.S. Foreign Policy? I Asked the Expert.

In his new book, Do Morals Matter? Presidents and Foreign Policy from FDR to Trump, Joseph S. Nye developed a scorecard to determine how U.S. presidents since 1945 factored questions of ethics and morality into their foreign policy. In an interview, Henry Farrell asked him a few questions to get to the heart of his findings.




at

Poll: What the American Public Likes and Hates about Trump's Nuclear Policies

The authors conducted a study which highlights how the U.S. public as a whole and various demographic groups view President Donald Trump's positions on nuclear weapons.




at

Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance

Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance




at

COVID-19's Painful Lesson About Strategy and Power

Joseph Nye writes that while trade wars have set back economic globalization,  the environmental globalization represented by pandemics and climate change is unstoppable. Borders are becoming more porous to everything from drugs to infectious diseases to cyber terrorism, and the United States must use its soft power of attraction to develop networks and institutions that address these new threats.




at

So Do Morals Matter in U.S. Foreign Policy? I Asked the Expert.

In his new book, Do Morals Matter? Presidents and Foreign Policy from FDR to Trump, Joseph S. Nye developed a scorecard to determine how U.S. presidents since 1945 factored questions of ethics and morality into their foreign policy. In an interview, Henry Farrell asked him a few questions to get to the heart of his findings.




at

Poll: What the American Public Likes and Hates about Trump's Nuclear Policies

The authors conducted a study which highlights how the U.S. public as a whole and various demographic groups view President Donald Trump's positions on nuclear weapons.




at

Why Bernie Sanders Will Win in 2020, No Matter Who Gets Elected

Stephen Walt writes that even though Bernie Sanders is out of the presidential race, the time has come for many of the policies that he promoted: Universal Healthcare; Democratic Socialism; Income Redistribution; and Foreign Policy.




at

The United States Forgot Its Strategy for Winning Cold Wars

Stephen Walt writes that arguments against U.S. offshore balancing misunderstand history. The strategy that worked against the Soviet Union can work against China.




at

Breaking the Ice: How France and the UK Could Reshape a Credible European Defense and Renew the Transatlantic Partnership

History is replete with irony, but rarely more poignantly than in the summer of 2016 when, on 23 June, the UK voted to leave the European Union and the next day, 24 June, the EU published its Global Strategy document asserting its ambition of “strategic autonomy.” Whither Franco-British defense cooperation in such chaotic circumstances? This paper attempts to provide the outline of an answer to that question.




at

The Economic Gains of Cloud Computing: An Address by Federal Chief Information Officer Vivek Kundra

Event Information

April 7, 2010
9:00 AM - 11:00 AM EDT

Falk Auditorium
The Brookings Institution
1775 Massachusetts Ave., NW
Washington, DC

Register for the Event

Cloud computing services over the Internet have the potential to spur a significant increase in government efficiency and decrease technology costs, as well as to create incentives and online platforms for innovation. Adoption of cloud computing technologies could lead to new, efficient ways of governing.

On April 7, the Brookings Institution hosted a policy forum that examines the economic benefits of cloud computing for local, state, and federal government. Federal Chief Information Officer Vivek Kundra delivered a keynote address on the role of the government in developing and promoting cloud computing. Brookings Vice President Darrell West moderated a panel of experts and detailed the findings in his paper, "Saving Money through Cloud Computing," which analyzes its governmental cost-savings potential.

After the program, panelists took audience questions.

Video

Audio

Transcript

Event Materials

     
 
 




at

Innovating through Cloud Computing


Technology offers the greatest source for innovation in the public sector and one of the best examples falls within the area of cloud computing. As I noted in a recent paper, the U.S. federal government spends nearly $76 billion each year on information technology, and $20 billion of that is devoted to hardware, software, and file servers. Traditionally, computing services have been delivered through desktops or laptops operated by proprietary software. But new advances in cloud computing have made it possible for public sector agencies alike to access software, services, and data storage through remote file servers.

I looked at possible cost savings a federal agency might expect from migrating to the cloud. After undertaking case studies of government agencies that made the move, I found that the agencies generally saw between 25 and 50 percent savings in moving to the cloud. Public officials can save money by reducing the number of file servers they need to purchase, cutting software costs, relying on fewer information technology specialists, and improving the efficiency of their data storage utilization.

In 2008, Washington, D.C. city government shifted many of its 38,000 employee email services across 86 agencies to the cloud, and the migration saved 48 percent on email expenditures. In 2009, the city of Los Angeles moved email service for its 30,000 employees to the cloud. An analysis undertaken by City Administrative Officer Miguel Santana for the City Council found that the five-year costs of running the new Google system would be $17,556,484, which was 23.6 percent less than the $22,996,242 for operating GroupWise during that same period. And in terms of personnel savings, the city needed nine fewer people in its information technology department.

The U.S. Air Force 45th Space Wing is responsible for launching and tracking unmanned space vehicles from Cape Canaveral Air Force Station and employs more than 10,000 workers. The Wing had 60 distinct file servers, but found that it utilized only 10 percent of central processing unit capacity. Commanders modernized their system and saved $180,000 per year in annual computing costs. In addition, the unit saved money by not buying new hardware or deploying new software. These are just some of the ways the government is using technology to save money and increase efficiency of its operations.

Authors

Image Source: © HANNIBAL HANSCHKE / Reuters
     
 
 




at

The Terms They Are A-Changin'...: Watching Cloud Computing Contracts Take Shape


EXECUTIVE SUMMARY

Many web services are examples of cloud computing, from storage and backup sites such as Flickr and Dropbox to online business productivity services such as Google Docs and Salesforce.com. Cloud computing offers a potentially attractive solution to customers keen to acquire computing infrastructure without large up-front investment, particularly in cases where their demand may be variable and unpredictable, as a means of achieving financial savings, productivity improvements and the wider flexibility that accompanies Internet-hosting of data and applications.

The greater flexibility of a cloud computing service as compared with a traditional outsourcing contract may be offset by reduced certainty for the customer in terms of the location of data placed into the cloud and the legal foundations of any contract with the provider. There may be unforeseen costs and risks hidden in the terms and conditions of such services.

This document reports on a detailed survey and analysis of the terms and conditions offered by cloud computing providers.

The survey formed part of the Cloud Legal Project at the Centre for Commercial Law Studies (CCLS), within the School of Law at Queen Mary, University of London, UK. Funded by a donation from Microsoft, but academically independent, the project is examining a wide range of legal and regulatory issues arising from cloud computing. The project's survey of 31 cloud computing contracts from 27 different providers, based on their standard terms of service as offered to customers in the E.U. and U.K., found that many include clauses that could have a significant impact, often negative, on the rights and interests of customers. The ease and convenience with which cloud computing arrangements can be set up may lull customers into overlooking the significant issues that can arise when key data and processes are entrusted to cloud service providers. The main lesson to be drawn from the Cloud Legal Project’s survey is that customers should review the terms and conditions of a cloud service carefully before signing up to it.

The survey found that some contracts, for instance, have clauses disclaiming responsibility for keeping the user’s data secure or intact. Others reserve the right to terminate accounts for apparent lack of use (potentially important if they are used for occasional backup or disaster recovery purposes), for violation of the provider’s Acceptable Use Policy, or indeed for any or no reason at all. Furthermore, whilst some providers promise only to hand over customer data if served with a court order, others state that they will do so on much wider grounds, including it simply being in their own business interests to disclose the data. Cloud providers also often exclude liability for loss of data, or strictly limit the damages that can be claimed against them – damages that might otherwise be substantial if a failure brought down an e-commerce web site.

Although in some U.S. states, in E.U. countries and in various other jurisdictions the validity of such terms may be challenged under consumer protection laws, users of cloud services may face practical obstacles to bringing a claim for data loss or privacy breach against a provider that seems local online but is, in fact, based in another continent. Indeed, service providers usually claim that their contracts are subject to the laws of the place where they have their main place of business. In many cases this is a US state, with a stipulation that any dispute must be heard in the provider’s local courts, regardless of the customer’s location.

Perhaps the most disconcerting discovery of the Cloud Legal Project’s survey was that many providers claimed to be able to amend their contracts unilaterally, simply by posting an updated version on the web. In effect, customers are put on notice to download lengthy and complex contracts, on a regular basis, and to compare them against their own copies of earlier versions to look for changes.

The cloud computing market is still developing rapidly, and potential cloud customers should be aware that there may be a mismatch between their expectations and the reality of cloud providers' service terms, and be alive to the possibility of unexpected changes to the terms.

Downloads

Authors

  • Simon Bradshaw
  • Christopher Millard
  • Ian Walden
Image Source: Natalie Racioppa
     
 
 




at

Technology and the Federal Government: Recommendations for the Innovation Advisory Board


Our former Brookings colleague Rebecca Blank, now at the Commerce Department, is today leading the first meeting of the Obama Administration’s Innovation Advisory Board, looking at the innovative capacity and economic competitiveness of the United States.

I applaud the effort.  Nothing is more important to America’s longterm competitiveness than emphasizing innovation.  As the council looks to the private sector and global markets, I urge it to examine how the U.S. government can lead innovation and contribute to economic growth.  The best place to look is new and emerging digital technologies that can make government more accessible, accountable, responsive and efficient for the people who use government services every day.

Here are some of the recommendations I made in a recent paper I wrote with colleagues here at Brookings as part of our “Growth Through Innovation” initiative:

  • Save money and gain efficiency by moving federal IT functions “to the cloud,” i.e., using advances in cloud computing to put software, hardware, services and data storage through remote file servers.

  • Continue to prioritize the Obama administration’s existing efforts to put unparalleled amounts of data online at Data.gov and other federal sites, making it easier and cheaper for citizens and businesses to access the information they need.

  • Use social media networks to deliver information to the public and to solicit feedback to improve government performance.

  • Integrate ideas and operations with state and local organizations, where much of government innovation is taking place today. 

  • Apply the methods of private-sector business planning to the public sector to produce region-specific business plans that are low cost and high impact.

These improvements in government services innovations in the digital age can help spur innovation and support a robust business climate.  And, as a sorely needed side benefit, they can also serve to eliminate some of the current distrust and even contempt for government that has brought public approval of the performance of the federal government to near historic lows.  



Authors

Image Source: © Mario Anzuoni / Reuters
     
 
 




at

Evaluating the Cloud Computing Act of 2011


Event Information

June 16, 2011
12:00 PM - 1:30 PM EDT

Room SVC-209
U.S. Capitol Visitor's Center
U.S. Capitol
Washington, DC

While research suggests that considerable efficiencies can be gained from cloud computing technology, concerns over privacy and security continue to deter governments and private-sector firms from migrating to the cloud. Senator Amy Klobuchar (D-Minn.) has advanced discussion of the “Cloud Computing Act of 2011,” draft legislation that would address these challenges by encouraging the U.S. government to negotiate with other countries to establish consistent laws related to online security and cloud computing. The bill also creates new enforcement tools for investigating and prosecuting those who violate online privacy and security laws.

On June 16, the Brookings Institution hosted a forum on the policy proposals in the Cloud Computing Act of 2011. Discussion included an overview of the international policy implications as governments and firms adjust to a coherent legal framework, changes and innovations in public procurement, and challenges for private industry as it balances consumer needs and compliance with these proposed cloud computing safeguards.

After the program, panelists took audience questions.

Transcript

Event Materials

     
 
 




at

Bridging Transatlantic Differences on Data and Privacy After Snowden


“Missed connections” is the personals ads category for people whose encounters are too fleeting to form any union – a lost-and-found for relationships.  I gave that title to my paper on the conversation between the United States and for Europe on data, privacy, and surveillance because I thought it provides an apt metaphor for the hopes and frustrations on both sides of that conversation.

The United States and Europe are linked by common values and overlapping heritage, an enduring security alliance, and the world’s largest trading relationship.  Europe has become the largest crossroad of the Internet and the transatlantic backbone is the global Internet’s highest capacity route.

[I]

But differences in approaches to the regulation of the privacy of personal information threaten to disrupt the vast flow of information between Europe and the U.S.  These differences have been exacerbated by the Edward Snowden disclosures, especially stories about the PRISM program and eavesdropping on Chancellor Angela Merkel’s cell phone.  The reaction has been profound enough to give momentum to calls for suspension of the “Safe Harbor” agreement that facilitates transfers of data between the U.S. Europe; and Chancellor Merkel, the European Parliament, and other EU leaders who have called for some form of European Internet that would keep data on European citizens inside EU borders.  So it can seem like the U.S. and EU are gazing at each other from trains headed in opposite directions.

My paper went to press before last week’s European Court of Justice ruling that Google must block search results showing that a Spanish citizen had property attached for debt several years ago.  What is most startling about the decision is this information was accurate and had been published in a Spanish newspaper by government mandate but – for these reasons – the newspaper was not obligated to remove the information from its website; nevertheless, Google could be required to remove links to that website from search results in Spain. That is quite different from the way the right to privacy has been applied in America.  The decision’s discussion of search as “profiling” bears out what the paper says about European attitudes toward Google and U.S. Internet companies.  So the decision heightens the differences between the U.S. and Europe.

Nonetheless, it does not have to be so desperate.  In my paper, I look at the issues that have divided the United States and Europe when it comes to data and the things they have in common, the issues currently in play, and some ways the United States can help to steer the conversation in the right direction.

[I] "Europe Emerges as Global Internet Hub," Telegeography, September 18, 2013.


Image Source: © Yves Herman / Reuters
      
 
 




at

Missed Connections: Talking With Europe About Data, Privacy, and Surveillance


The United States exports digital goods worth hundreds of billions of dollars across the Atlantic each year.  And both Silicon Valley and Hollywood do big business with Europe every year.  Differences in approaches to privacy have always made this relationship unsteady but the Snowden disclosures greatly complicated the prospects of a Transatlantic Trade and Investment Partnership.  In this paper Cameron Kerry examines that politics of transatlantic trade and the critical role that U.S. privacy policy plays in these conversations.

Kerry relies on his experience as the U.S.’s chief international negotiator for privacy and data regulation to provide an overview of key proposals related to privacy and data in Europe.  He addresses the possible development of a European Internet and the current regulatory regime known as Safe Harbor. Kerry argues that America and Europe have different approaches to protecting privacy both which have strengths and weaknesses.

To promote transatlantic trade the United states should:

  • Not be defensive about its protection of privacy
  • Provide clear information to the worldwide community about American law enforcement surveillance
  • Strengthen its own privacy protection
  • Focus on the importance of trade to the American and European economies

Downloads

Image Source: © Francois Lenoir / Reuters
      
 
 




at

Threats to the Future of Cloud Computing: Surveillance and Transatlantic Trade


The first instance of “cloud” computing came in 2006, when Amazon released its Elastic Compute Cloud, a service for consumers to lease space on virtual machines to run software. Now, the cloud enables the transfer and storage of data around the world, in an almost seamless fashion. Using cloud services are a seamless experience from the consumer perspective. This ease of use obscures significant regulation from governments on both sides of the Atlantic. The Safe Harbor Principles is a framework that ensures that personal consumer data being transferred from the EU to the US is still subject to a level of security in compliance with the EU’s stricter regulation on data protection. US companies must be certified within this framework, in order to transfer consumer data outside the EU.

A comprehensive data privacy arrangement that satisfies both sides of the Atlantic is necessary to preserve the free flow of data, and the resulting commerce, between the two regions. Speaking at the 2014 Cloud Computing Policy Conference, Cameron F. Kerry suggested that neither side of the Atlantic can afford to partition the Internet. Currently trade negotiators are assessing the viability including an update to Safe Harbor Principles as a part of the Transatlantic Trade and Investment Partnership (TTIP).

TTIP and the Future of Trade

The NSA revelations last year have only increased support for further regulation over the transfer of personal data in the cloud, especially in the European Union (EU). The revelations have also brought to light significant differences in the European and US conceptions of privacy. The ruling by the European Court of Justice on the “right to be forgotten” is a recent example of this transatlantic divide. In EU countries, citizens can now request Google to take down links from search results that lead users to potentially damaging information.

There are several disputes that negotiators must first resolve. Europeans would prefer that American regulators take a more active role in cases where US firms are violating the Safe Harbor principles. EU officials have also indicated they would like to include a mechanism to send an alert if data were improperly shared with US law enforcement officials. The expansion of the codes of conduct within the cloud would serve as a major step towards finalizing TTIP. A European Commission Analysis finds that TTIP would inject about $130 billion into the US economy. Ultimately both the EU and the US have so much to gain that both nations must find a way to resolve these thorny issues.

 

Kevin Risser contributed to this post.

Authors

Image Source: © Fabrizio Bensch / Reuters
      
 
 




at

Getting IT Right? How State Governments are Approaching Cloud Computing


Cloud computing is becoming omnipresent in the private sector as companies latch on to this innovation as a way to manage scalability, improve flexibility, and reduce cost. Analysts at IDC predict that, over the next six years, nearly 90 percent of new spending on Internet and communications technology will be on cloud-based platforms. Apple, Google, Amazon, Microsoft, and hundreds of smaller companies are positioning themselves to dominate the estimated $5 trillion worldwide market. While few companies will provide numbers, it is estimated that Amazon and Google may run as many as 10 million servers while Microsoft runs close to one million. In short, it is an innovation that makes a mockery out of Moore’s law.

But, like all innovations, cloud computing has potential pitfalls. Public sector organizations in particular have had difficulty taking advantage of new technologies. The Heritage Foundation keeps a list over 50 examples of government ineptitude including $34 billion in fraudulent Homeland Security contracts, National Institutes of Health renting a lab that it neither needs nor can use for $1.3 million per month, and the Department of Agriculture wasting $2.5 billion in stimulus money on broadband internet. Technological ineptitude received special attention with the failed launch of the Healthcare.gov, the release of classified data from Edward Snowden, and the costly FBI virtual case file debacle.

Cloud computing is far more than just a simple technology change and requires a close examination of governance, sourcing, and security. We sought to understand how well state government is prepared to address the challenges of cloud computing.

The Approach

We have gathered and started to do a content analysis of the IT strategic plans for each state. For each plan, we performed a content analysis, which is looking for certain phrases or text within the IT strategic plan in order to have a structured way to understand the data. Details for our approach can be seen in our previous blog post.

How States Are Implementing the Cloud

We were not surprised to see a number of states preparing to study or embark on cloud computing.

While some states don’t mention it (e.g. Alabama), most states are eagerly exploring it. For example, North Dakota’s plan talks about cloud computing as an integral part of the future and seven of its thirteen major IT initiatives are centered on preparation for transitioning to the cloud “where and when it makes sense”.

Vermont puts itself squarely in the studying period. The plan describes that, “While the risks of enterprise-wide and cloud-based IT must be carefully managed, trends continue to just larger-scale operations.” Wisconsin also clearly lays out its view on cloud computing, writing that, “Flexibility and responsiveness (also) guide Wisconsin’s approach toward adoption of cloud services” and suggests that its version of a private cloud “…offers advanced security and service availability tailored for business needs.” West Virginia provides an equally balanced approach by requiring that only services with an acceptably low risk and cost-effective footprint will be moved to the cloud.

In short, all of the states that are considering cloud computing are taking a thoughtful and balanced approach.

The Good

One of the most critical aspects of cloud computing is security and, without question, states understand the importance of good security. A good example of this is Colorado who designates security as one of its four “wildly important goals” and sets the target of “10 percent reduction in information security risk for Colorado agencies by close of FY15”.

South Carolina echoed the same theme by asserting that security and confidentiality are “overriding priorities at every stage of development and deployment.” Connecticut’s plans explain the need to “continuously improve the security and safeguards over agency data and information technology assets”.

The Bad

Despite the interest in cloud computing, we were only able to find a single state (Georgia) that explicitly links governance to security and, to us, by extension to cloud computing. In Georgia’s plan, they start with the idea that “strong security programs start with strong governance” and then explicitly describe necessary changes in governance to improve security.

We were, however, impressed with the seriousness that New York, North Carolina and Massachusetts took governance but it was difficult to find many other states that did.

The Ugly

Unfortunately the results on sourcing were dismal. While a few states (e.g. Kansas, Ohio, and Massachusetts) specifically discuss partnerships, most states seemed to ignore the sourcing aspect of cloud computing. The most ominous note comes from Alabama where they make a statement that innovation in the state is being stifled by a lack of strong personnel.

While we have great enthusiasm for government to address cloud computing, some of the non-technical issues are lagging in the discussion. Good government requires that these items be addressed in order to realize the promise of cloud computing.

Authors

Image Source: © Fabrizio Bensch / Reuters
      
 
 




at

Osiraq Redux: A Crisis Simulation of an Israeli Strike on the Iranian Nuclear Program

In December 2009, the Saban Center for Middle East Policy conducted a day-long simulation of the diplomatic and military fallout that could result from an Israeli military strike against the Iranian nuclear program. In this Middle East Memo, Kenneth M. Pollack analyzes the critical decisions each side made during the wargame.

The simulation was conducted as a three-move game with three separate country teams. One team represented a hypothetical American National Security Council, a second team represented a hypothetical Israeli cabinet, and a third team represented a hypothetical Iranian Supreme National Security Council. The U.S. team consisted of approximately ten members, all of whom had served in senior positions in the U.S. government and U.S. military. The Israel team consisted of a half-dozen American experts on Israel with close ties to Israeli decision-makers, and who, in some cases, had spent considerable time in Israel. Some members of the Israel team had also served in the U.S. government. The Iran team consisted of a half-dozen American experts on Iran, some of whom had lived and/or traveled extensively in Iran, are of Iranian extraction, and/or had served in the U.S. government with responsibility for Iran.

Read more »

Downloads

     
 
 




at

Assessing the Obstacles and Opportunities in a Future Israeli-Syrian-American Peace Negotiation

Introduction:

In the ebb and flow of Middle East diplomacy, the two interrelated issues of an Israeli-Syrian peace settlement and Washington’s bilateral relationship with Damascus have gone up and down on Washington’s scale of importance. The election of Barack Obama raised expectations that the United States would give the two issues the priority they had not received during the eight years of the George W. Bush administration. Candidate Obama promised to assign a high priority to the resuscitation of the Arab-Israeli peace process, and separately to “engage” with Iran and Syria (as recommended by the Iraq Study Group in 2006).

In May 2009, shortly after assuming office, President Obama sent the assistant secretary of state for Near Eastern affairs, Jeffrey Feltman, and the senior director for the Middle East in the National Security Council, Daniel Shapiro, to Damascus to open a dialogue with Bashar al-Asad’s regime. Several members of Congress also travelled to Syria early in Obama’s first year, including the chairman of the Senate Committee on Foreign Relations, John Kerry, and the chairman of the House Committee on Foreign Affairs, Howard Berman. In addition, when the president appointed George Mitchell as special envoy to the Middle East, Mitchell named as his deputy Fred Hof, a respected expert on Syria and the Israeli-Syrian dispute. Last summer, both Mitchell and Hof visited Damascus and began their give and take with Syria.

And yet, after this apparent auspicious beginning, neither the bilateral relationship between the United States and Syria, nor the effort to revive the Israeli-Syrian negotiation has gained much traction. Damascus must be chagrined by the fact that when the Arab-Israeli peace process is discussed now, it is practically equated with the Israeli-Palestinian track. This paper analyzes the difficulties confronting Washington’s and Jerusalem’s respective Syria policies and offers an approach for dealing with Syria. Many of the recommendations stem from lessons resulting from the past rounds of negotiations, so it is important to understand what occurred.

Downloads

Authors

  • Itamar Rabinovich
     
 
 




at

The Elusive Myth of Democratic Egyptian Elections

INTRODUCTION

Later this month, Egyptians will go to the polls, or attempt to, in order to vote in the country’s parliamentary elections. The elections will unlikely be a democratic affair in the Western sense. In fact, opposition candidates, voters, citizen groups—essentially everyone other than government representatives—are fully expecting the elections to be a violent and rigged episode. For easy reference, one can look to the June elections for the Shura Council, or upper house of Parliament, in which the governing National Democratic Party (NDP) managed to land 80 out of a possible 84 seats. Those elections were marked by violence and allegations of rampant violations.

Elections in Egypt are not generally democratic, they do not necessarily reflect the will of the people, and they will invariably usher in a house in which the NDP has an unshakeable majority. More so, the elected body has very little control over the government and none over the president, who, thanks to some creative constitutional amendments in 2007, can dissolve the Parliament at will. Election results are apparently so preordained that many have questioned the wisdom of participating at all. Opposition groups, among them the National Alliance for Change (NAC), led by former International Atomic Energy Agency (IAEA) head and current political reformer Mohamed ElBaradei, have been calling for a boycott. ElBaradei told reporters at a Ramadan Iftar meeting on September 7 that voting “would go against the national will.” Many political analysts and some members of the opposition have echoed the belief that participation in the elections only gives credence to a fundamentally flawed system and perpetuates the state myth of a democratic nation.

The above argument certainly has its merits, but it misses the point. Elections in Egypt are not about who wins seats—that is usually a foregone conclusion. They are about the “how and the what,” in the sense that they are oases of political activity, demand, and dissension in an otherwise arid climate. In that way, every election fought represents losses and gains for the respective participants in ways that invariably influence the following elections. Also, the ballot boxes can yield surprising results—as in the case of the 2005 elections when the Muslim Brotherhood (MB) gained a jawdropping 88 of 454 seats in the elections for the lower house. This outcome certainly would not have come about if the Brotherhood had not participated. To be sure, there are also significant, detrimental changes that happen as a direct consequence of the elections, among them constitutional amendments designed to hobble the opposition’s ability to field candidates and campaign. Still, for opposition parties and movements, boycotting the elections is the equivalent of throwing away the only political participation they have. It would mean relinquishing any visibility or influence and it would mean admitting to their supporters that they are essentially mere window dressings in the democratic façade. Arguably, this is a reason why these elections have only ever been boycotted once, in 1990. The Egyptian political arena is one where contestants scrabble for the smallest patch of ground. The high moral ground simply does not figure into it.

Downloads

     
 
 




at

Recalibrating the Egypt-Israel Relationship


Introduction:

There is an Egyptian proverb that says those who worry about demons will tend to run into them. Like much folk wisdom, it has solid psychological foundations; the likelihood of a problem rearing its head often appears to be exacerbated by constantly fretting about it. Ever since Hosni Mubarak stepped down as president of Egypt on February 11, 2011, the demon named “Now What?” has been keeping the Israeli government up at night. On August 18, it finally leapt up at them.

That day, a group of armed men attacked Israeli buses, as well as civilian and military vehicles north of Eilat, near the Egyptian border. Eight Israelis, both civilians and soldiers, were killed. The Israel Defense Forces (IDF) set off in hot pursuit, shooting at the attackers from a helicopter. The helicopter crew either failed to notice, or ignored, that they were shooting over the Egyptian side of the border. In the pursuit, three Egyptians— an officer and two enlisted men—were killed and another three later died of their wounds. Israeli minister of defense Ehud Barak, while blaming Palestinian groups for the assault, made comments to the effect that the attacks were largely Egypt’s fault as there had been a major security collapse in Egypt since the former regime had been ousted six months earlier.

The way matters unfolded over the next few days pointedly illustrated the answer to a question that had been asked repeatedly both by international media and the Israeli government since Hosni Mubarak’s ouster: What did Egypt’s January 25 Revolution mean for Israel? The simplest answer is that it is no longer business as usual. The relationship between Egypt and Israel has changed and both countries will have to navigate new waters carefully and wisely.

Downloads

Image Source: � Asmaa Waguih / Reuters
     
 
 




at

A U.S.-Egyptian Relationship for a Democratic Era


INTRODUCTION

A year after President Hosni Mubarak’s fall, U.S.-Egypt relations are at an all-time low. Not, as many expected, because of the rise of Islamist parties, but because America’s longtime allies in the Egyptian military have whipped up anti-American sentiment at a feverish pace. It may have started as a political ploy, a way to build support on the street and highlight the army’s nationalist credentials, but the generals soon lost control. In January, the Egyptian government announced that sixteen Americans—including the son of a top U.S. official— would be put on trial, facing up to five years in prison. Their apparent crime was working for American nongovernmental organizations (NGOs)—the National Democratic Institute, the International Republican Institute, and Freedom House—that offered support, funding, and election monitoring for Egypt’s uneven transition.

On March 1, the Egyptian government lifted the travel ban on seven Americans who were still in Egypt, allowing them to leave the country. A major diplomatic breach was avoided, giving the impression that the crisis had been resolved. This appears to be the interpretation of the Obama administration, which waived congressional conditions on military aid, citing the importance of maintaining a “strategic partnership” with Egypt.2 However, the charges against the Americans remain, and there is no sign that the American NGOs in question will be able to reopen anytime soon. More importantly, the vast majority of affected NGOs—which are Egyptian rather than American—still find themselves on trial and under attack.

The NGO episode, however worrying it is on its own, reflects something larger and more troubling: the slow descent from the national unity of the revolution to a fog of paranoia, distrust, and conspiracy theorizing. Who is with the revolution, and who isn’t? The roots of the problem lie in the uncertainly inherent in Egypt’s muddled transition. Unlike in Tunisia, where the Higher Committee for the Achievement of Revolutionary Objectives (HCARO)—accepted as legitimate by all of the country’s main political forces—was responsible for managing the transition, Egypt has featured various competing actors claiming their own distinct sources of power. The struggle for legitimacy between the Supreme Council of the Armed Forces (SCAF), the Muslim Brotherhood-dominated parliament, and the protest movement has created a fragmented political scene. Everyone wants to lead the transition, but no one wants to take full responsibility for the results.

Downloads

Authors

Image Source: © Mohamed Abd El Ghany / Reuters
     
 
 




at

A Series of Unfortunate Events: A Crisis Simulation of a U.S.-Iranian Confrontation


The potential for confrontation between the United States and Iran, stemming from ongoing tensions over Iran’s nuclear program and western covert actions intended to delay or degrade it, remains a pressing concern for U.S. policymakers. The Saban Center for Middle East Policy hosted a one-day crisis simulation in September that explored different scenarios should a confrontation occur.

The Saban Center's new Middle East Memo, A Series of Unfortunate Events: A Crisis Simulation of a U.S.-Iranian Confrontation, authored by senior fellow Kenneth M. Pollack, presents lessons and observations from the exercise.

Key findings include:

• Growing tensions are significantly reducing the “margin of error” between the two sides, increasing the potential for miscalculations to escalate to a conflict between the two countries.

• Should Iran make significant progress in enriching fissile material, both sides would have a powerful incentive to think short-term rather than long-term, in turn reinforcing the propensity for rapid escalation.

• U.S. policymakers must recognize the possibility that Iranian rhetoric about how the Islamic Republic would react in various situations may prove consistent with actual Iranian actions.

Download » (PDF)

Downloads

Image Source: © Fars News / Reuters
      
 
 




at

Thinking the Unthinkable: The Gulf States and The Prospect of A Nuclear Iran


Introduction

The issue of Iran has become a central preoccupation for the international community in recent months, thanks to the intersection of the historic changes in the region, an American presidential election, sharpening rhetoric from Israel, and Tehran’s relentless determination to advance its nuclear capabilities. The focus of policymakers in Washington and around the world remains fixed on the options for forestalling Iran’s determined march toward a nuclear weapons capability. This is the appropriate objective; the best possible outcome for maintaining peace and security in the Gulf and avoiding a deeply destabilizing nuclear arms race remains a credible, durable solution that curtails Iran’s nuclear ambitions. And while achieving such an outcome remains profoundly problematic, largely as a result of Tehran’s intransigence, preventing Iran from crossing the nuclear weapons threshold—either through persuasion, coercion, or some combination of the two—remains fully and unambiguously within the capabilities of the international community.

The shadow cast by Tehran has created a particularly intense sense of existential anxiety for the smaller Gulf states, including Kuwait, Bahrain, the United Arab Emirates, Qatar, and Oman. After all, these are the same states whose civil orders were repeatedly disrupted by Iranian subversion and sponsorship of terrorism during the first decade after Iran’s Islamic revolution, and whose thriving economies rely on unimpeded access to the global commons. The events of the past decade have only exacerbated the smaller Gulf states’ endemic sense of insecurity. Iran has achieved a synergistic, sometimes even parasitic, relationship with the leadership of post-Saddam Iraq that, together with Tehran’s longstanding relationships with Syria and Lebanese Hizballah, greatly enables its bid for predominance in the heart of the Middle East. Today, the uncertainties surrounding the implications of regional flux have left Tehran simultaneously weakened and emboldened—a particularly dangerous combination for this particular array of Iranian leaders.

With Iran’s nuclear program advancing by the month and its efforts to tilt the regional balance in its favor growing more forceful, the small states of the Persian Gulf must face the distinct dilemma of preparing for the possible worst-case scenario of the nuclearization of their neighborhood, while participating ever more robustly in the international efforts to preclude that very possibility. In some respects, the Gulf states’ situation is unique. Unlike Israel, another small state that perceives an existential threat from Iran, the Gulf states cannot fall back upon either a presumptive nuclear deterrent or a primordial bond to the body politic of the world’s only remaining superpower. And in contrast to Iran’s other neighbors, the vast resources and history of ideological and territorial disputes between the Gulf states and Tehran significantly intensify the stakes. Even before the Gulf became the vital transportation corridor for global energy, the fault line in the regional balance of power had always run between the northern states and their southern rivals. The mere possibility that the north may gain a nuclear advantage is reshaping the security environment for Iran’s neighbors in the Gulf.

Because the threat of Iran looms large, the exigency of considering the widest possible array of alternative prospects for the evolution of this protracted crisis is important. This paper tackles the scenarios that successive American presidents have deemed unacceptable—an Iranian development or acquisition of a nuclear weapons capability or of nuclear weapons themselves—and the implications that such scenarios would have for the global nonproliferation regime and regional security, with a particular focus on the special challenges faced by Iran’s southern neighbors. To protect against threats along their borders, the Gulf states have traditionally hedged their bets by seeking balanced relations with their more powerful neighbors while cultivating extra-regional allies. That formula is already changing, as evidenced by a new assertiveness in Gulf states’ postures toward Tehran and a new creativity in deploying strategies for deterring and mitigating Iran’s efforts to extend its influence and/or destabilize its neighbors. The Gulf states must transform this tactical innovation into a full-fledged new hedging policy: one that deploys every possible tool to prevent a nuclear Iran while taking every possible step to prepare for such an eventuality.

Download » (PDF)

Downloads

Authors

Image Source: © Morteza Nikoubazl / Reuters
      
 
 




at

Hard Road to Damascus: A Crisis Simulation of U.S.-Iranian Confrontation Over Syria


Last September, as part of its annual conference with the United States Central Command, the Saban Center for Middle East Policy at the Brookings Institution conducted a day-long simulation of a confrontation between the United States and Iran arising from a hypothetical scenario in which the Syrian opposition had made significant gains in its civil war and was on the verge of crushing the Assad regime.  

The simulation suggested that, even in the wake of President Rouhani’s ascension to power and the changed atmosphere between Tehran and Washington, there is still a risk of misunderstanding and miscalculation between the two sides.

This new Middle East Memo examines the possible U.S. foreign policy lessons that emerged from this crisis simulation, and stresses the importance of communication, understanding the Saudi-Iran conflict and the difficulty in limited interventions. 

Downloads

Image Source: © Stringer . / Reuters
      
 
 




at

The End of Sykes-Picot? Reflections on the Prospects of the Arab State System


During much of the past three years, the Syrian civil war has been the most prominent item on the Middle Eastern political agenda and has dominated the political-diplomatic discourse in the region and among policy makers, analysts and pundits interested in its affairs. 

Preoccupation with the Syrian crisis has derived from the sense, apparent since its early phases, that it was much more than a domestic issue. It has, indeed, become a conflict by-proxy between Iran and its regional rivals and the arena of American-Russian competition. It has also had a spillover effect on several neighboring countries and has been a bellwether for the state of the Arab Spring.

As the conflict festered it also prompted a broader discussion and debate over the future of the Arab State system. The collapse of Syria, the ongoing fighting in Iraq, and the general instability in the Middle East has led some observers to question whether the very geography of the region will be changed. Robin Wright, a journalist and scholar at the Woodrow Wilson International Center for Scholars, argues that “the map of the modern Middle East, a political and economic pivot in the international order, is in tatters.” Wright also warns that competing groups and ideologies are pulling the region apart: “A different map would be a strategic game changer for just about everybody, potentially reconfiguring alliances, security challenges, trade and energy flows for much of the world, too.”  Similarly, Parag Khanna, a senior fellow at the New America Foundation, argues, “Nowhere is a rethinking of “the state” more necessary than in the Middle East.” He contends that “The Arab world will not be resurrected to its old glory until its map is redrawn to resemble a collection of autonomous national oases linked by Silk Roads of commerce.” Lt. Colonel Joel Rayburn, writing from the Hoover Institution, points out that the alternative may not be new states but rather simply collapse. “If watching the fall or near-fall of half a dozen regimes in the Arab Spring has taught us anything, it should be that the Arab states that appeared serenely stable to outsiders for the past half century were more brittle than we have understood,” warning darkly, “This conflict could very well touch us all, perhaps becoming an engine of jihad that spews forth attackers bent on bombing western embassies and cities or disrupting Persian Gulf oil markets long before the fire burns out.” 

This discussion touches on a key question: Will the collapse of one or several other Arab states produce a new order in the region? 

The regional order has been threatened before, but today’s challenge is unique. Syria is what has prompted the latest reevaluation of the Skyes-Picot borders, but many of the problems predated the Syrian civil war. Ambitious monarchs in the 1930s and 1940s challenged the order after the colonial period. The doctrine of Pan-Arab Nationalism and Gamal Abd al-Nasir’s messianic leadership in the 1950s and by Saddam Hussein in 1990 again posed a threat. Now it is now challenged not by a powerful state or a sweeping ideology but by the weakness of several Arab states that seem to be on the verge of implosion or disintegration.

This paper assesses the situation in Syria, with an emphasis on what might lead to its de facto partition or lasting collapse. It then examines Syria’s neighbors and their prospects for stability. The paper concludes by exploring how the United States, Israel and Iran might affect this tenuous balance.

Downloads

Image Source: © Muzaffar Salman / Reuters
      
 
 




at

On April 13, 2020, Suzanne Maloney discussed “Why the Middle East Matters” via video conference with IHS Markit.  

On April 13, 2020, Suzanne Maloney discussed "Why the Middle East Matters" via video conference with IHS Markit.

       




at

NATO and outer space: Now what?

At the North Atlantic Treaty Organization’s (NATO) December 2019 Leader’s Summit in London, leaders acknowledged that technology is rapidly changing the international security environment, stating: “To stay secure, we must look to the future together. We are addressing the breadth and scale of new technologies to maintain our technological edge.”  Leaders also identified outer space…

       




at

Webinar: What role will the Army play in great power competition after COVID-19?

Two years after the National Defense Strategy was published, it’s time to take stock of where the Army stands. On an immediate level, the age of COVID-19 presents the Army with an unprecedented set of challenges. From ensuring high levels of readiness to keeping up recruitment, the pandemic has forced the Army to adapt quickly…

       




at

Webinar: A conversation with Secretary of Defense Mark T. Esper

The COVID-19 pandemic is among the most serious challenges confronting the globe since World War II. Its projected human and economic costs are devastating. While the armed forces of the United States will rise to this challenge as they have others, the Department of Defense will not stop planning for long-term threats to America's security,…