v Letter from London on the coronavirus: An order to stay apart brought us together By feedproxy.google.com Published On :: Apr 2, 2020 Apr 2, 2020Dear America, In London there is much talk of a new “spirit of the Blitz” in the face of another deadly threat to us all. But 80 years on, that spirit is expressing itself very differently. When the Luftwaffe bombs fell, to continue with normal life was an act of patriotic defiance. Now as COVID-19 spreads, to continue with normal life is an act of punishable deviance. Full Article
v Oil Markets Provide a Glimpse of the Post-Pandemic Future By feedproxy.google.com Published On :: Apr 7, 2020 Apr 7, 2020Henry Kissinger warns that many existing domestic and international institutions that have helped govern the past decades will not survive the Covid-19 crisis. He is surely correct. Full Article
v Selective Wilsonianism: Material Interests and the West's Support for Democracy By feedproxy.google.com Published On :: Apr 9, 2020 Apr 9, 2020Analysis of the West's differing responses to Ukrainian and Armenian mass movements reveal that, contrary to the popular Wilsonian narrative, the West assists democratic movements only when that assistance coincides with its material interests. Full Article
v Transatlantic Dialogue: The Missing Link in Europe’s Post-Covid-19 Green Deal? By feedproxy.google.com Published On :: Apr 10, 2020 Apr 10, 2020This policy brief emphasizes that the European Green Deal's effectiveness in a post Covid-19 world will require the involvement of strategic partners, especially the US. In the context of a potential US withdrawal from the Paris Agreement and the consequential vacuum, it will be even more important to engage the US in implementing the GD. In light of divergence between the US and the EU during past climate negotiations (e.g. Kyoto, Copenhagen, and Paris), we suggest a gradual approach to US engagement with GD initiatives and objectives. Full Article
v No, COVID-19 Isn’t Turning Europe Pro-China (Yet) By feedproxy.google.com Published On :: Apr 15, 2020 Apr 15, 2020Ever since the World Health Organization declared Europe the new epicenter of the coronavirus pandemic on March 13, China has seized the opportunity to provide relief to some of the worst-hit European countries as part of a concerted PR offensive aiming at polishing up the Communist Party’s image internationally and — above all — domestically. Although China’s aid offers have generally been welcomed by those leaders struggling to contain the outbreak, it is still far too early to conclude that Beijing is actually winning over any European hearts and minds. Full Article
v No, the Coronavirus Will Not Change the Global Order By feedproxy.google.com Published On :: Apr 16, 2020 Apr 16, 2020Joseph Nye advises skepticism toward claims that the pandemic changes everything. China won't benefit, and the United States will remain preeminent. Full Article
v The Global Pandemic Has Spawned New Forms of Activism — and They're Flourishing By feedproxy.google.com Published On :: Apr 20, 2020 Apr 20, 2020The authors have identified nearly 100 distinct methods of nonviolent action that include physical, virtual and hybrid actions. Full Article
v How COVID-19 is Testing American Leadership By feedproxy.google.com Published On :: Apr 26, 2020 Apr 26, 2020Joseph Nye suggests that a new U.S. administration might take a leaf from the success of the post-1945 American presidents that are described in Do Morals Matter? Presidents and Foreign Policy from FDR to Trump. The United States could launch a massive COVID-19 aid program like the Marshall Plan. Full Article
v What Caused the COVID-19 Testing Deficit? By feedproxy.google.com Published On :: Apr 30, 2020 Apr 30, 2020As the divergent experiences of the US and South Korea show, testing can be the difference between disease containment and catastrophe. Rather than relying on national governments to ensure the rapid development, production, and deployment of diagnostics during outbreaks, the world needs a global coordinating platform. Full Article
v Africa in the news: Tunisia and Mozambique vote, Nigeria closes borders, and Kenya opens new railway By webfeeds.brookings.edu Published On :: Sat, 19 Oct 2019 12:45:43 +0000 Tunisia and Mozambique vote: On Sunday, October 13, Tunisians participated in their run-off presidential elections between conservative former law professor Kais Saied and media magnate Nabil Karoui. Saied, known as “Robocop” for his serious presentation, won with 72.7 percent of the vote. Notably, Saied himself does not belong to a party, but is supported by… Full Article
v No going back: How America and the Middle East can turn the page to a productive future By webfeeds.brookings.edu Published On :: Wed, 23 Oct 2019 14:32:36 +0000 Ever since President Trump abruptly decided to withdraw troops from northern Syria, there’s been growing debate about the role of America in the Middle East. And there should be. This is a region that about 400 million souls call home. And it’s right on Europe’s doorstep. If we’ve learned anything since 9/11, it should be… Full Article
v COVID in the Maghreb: Responses and impacts By webfeeds.brookings.edu Published On :: Tue, 21 Apr 2020 13:05:34 +0000 Full Article
v The Overwhelming Case for No First Use By feedproxy.google.com Published On :: Jan 13, 2020 Jan 13, 2020The arguments in favor of the United States' declaring that the only purpose of its nuclear weapons is to deter others who possess them from using theirs — in other words, that in no circumstances will this country use nuclear weapons first — are far stronger than the arguments against this stance. It must be hoped that the next US administration will take this no-first-use step promptly. Full Article
v Accumulating Evidence Using Crowdsourcing and Machine Learning: A Living Bibliography about Existential Risk and Global Catastrophic Risk By feedproxy.google.com Published On :: Feb 3, 2020 Feb 3, 2020The study of existential risk — the risk of human extinction or the collapse of human civilization — has only recently emerged as an integrated field of research, and yet an overwhelming volume of relevant research has already been published. To provide an evidence base for policy and risk analysis, this research should be systematically reviewed. In a systematic review, one of many time-consuming tasks is to read the titles and abstracts of research publications, to see if they meet the inclusion criteria. The authors show how this task can be shared between multiple people (using crowdsourcing) and partially automated (using machine learning), as methods of handling an overwhelming volume of research. Full Article
v The Need for Creative and Effective Nuclear Security Vulnerability Assessment and Testing By feedproxy.google.com Published On :: Feb 10, 2020 Feb 10, 2020Realistic, creative vulnerability assessment and testing are critical to finding and fixing nuclear security weaknesses and avoiding over-confidence. Both vulnerability assessment and realistic testing are needed to ensure that nuclear security systems are providing the level of protection required. Systems must be challenged by experts thinking like adversaries, trying to find ways to overcome them. Effective vulnerability assessment and realistic testing are more difficult in the case of insider threats, and special attention is needed. Organizations need to find ways to give people the mission and the incentives to find nuclear security weaknesses and suggest ways they might be fixed. With the right approaches and incentives in place, effective vulnerability assessment and testing can be a key part of achieving and sustaining high levels of nuclear security. Full Article
v The Past and Potential Role of Civil Society in Nuclear Security By feedproxy.google.com Published On :: Feb 10, 2020 Feb 10, 2020Civil society has played a very important role in nuclear security over the years, and its role could be strengthened in the future. Some nuclear organizations react against the very idea of civil society involvement, thinking of only one societal role—protesting. In fact, however, civil society has played quite a number of critical roles in nuclear security over the years, including highlighting the dangers of nuclear terrorism; providing research and ideas; nudging governments to act; tracking progress and holding governments and operators accountable; educating the public and other stakeholders; promoting dialogue and partnerships; helping with nuclear security implementation; funding initial steps; and more. Funding organizations (both government and non-government) should consider ways to support civil society work and expertise focused on nuclear security in additional countries. Rather than simply protesting and opposing, civil society organizations can help build more effective nuclear security practices around the world. Full Article
v Arms Control Agreement With Russia Should Cover More Than Nuclear Weapons By feedproxy.google.com Published On :: Feb 23, 2020 Feb 23, 2020With the Russia investigation and impeachment behind him, President Trump finally may feel empowered to engage with Russian President Vladimir Putin and pursue an arms control deal. Full Article
v Public Testimony on Trump Administration Funding for Nuclear Theft Preventing Programs By feedproxy.google.com Published On :: Mar 31, 2020 Mar 31, 2020A nuclear explosion detonated anywhere by a terrorist group would be a global humanitarian, economic, and political catastrophe. The current COVID-19 pandemic reminds us not to ignore prevention of and preparation for low-probability, high-consequence disasters. For nuclear terrorism, while preparation is important, prevention must be the top priority. The most effective strategy for keeping nuclear weapons out of the hands of terrorists is to ensure that nuclear materials and facilities around the world have strong and sustainable security. Every president for more than two decades has made strengthening nuclear security around the globe a priority. This includes the Trump administration, whose 2018 Nuclear Posture Review states: “[n]uclear terrorism remains among the most significant threats to the security of the United States, allies, and partners.” Full Article
v Living with Uncertainty: Modeling China's Nuclear Survivability By feedproxy.google.com Published On :: Apr 11, 2020 Apr 11, 2020A simplified nuclear exchange model demonstrates that China’s ability to launch a successful nuclear retaliatory strike in response to an adversary’s nuclear first strike has been and remains far from assured. This study suggests that China’s criterion for effective nuclear deterrence is very low. Full Article
v Maxwell Taylor's Cold War: From Berlin to Vietnam By feedproxy.google.com Published On :: May 6, 2020 May 6, 2020Nathaniel Moir reviews Maxwell Taylor's Cold War: From Berlin to Vietnam by Ingo Trauschweizer. Full Article
v Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance By feedproxy.google.com Published On :: Mar 25, 2020 Mar 25, 2020Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance Full Article
v Breaking Down the Huawei v. Pentagon Dispute By feedproxy.google.com Published On :: Mar 26, 2020 Mar 26, 2020If nothing else, the long-running Huawei situation shows the importance of considering the supply chain when it comes to cybersecurity. Huawei being the Chinese telecommunications equipment maker basically banned by the federal government. Bruce Schneier joins Host Tom Temin on Federal Drive. Full Article
v COVID-19's Painful Lesson About Strategy and Power By feedproxy.google.com Published On :: Mar 26, 2020 Mar 26, 2020Joseph Nye writes that while trade wars have set back economic globalization, the environmental globalization represented by pandemics and climate change is unstoppable. Borders are becoming more porous to everything from drugs to infectious diseases to cyber terrorism, and the United States must use its soft power of attraction to develop networks and institutions that address these new threats. Full Article
v An Interview with Bruce Schneier, Renowned Security Technologist By feedproxy.google.com Published On :: Apr 1, 2020 Apr 1, 2020Bruce Schneier discusses current security technology concerns with The Politic's Eric Wallach. Full Article
v Spies Are Fighting a Shadow War Against the Coronavirus By feedproxy.google.com Published On :: Apr 3, 2020 Apr 3, 2020Calder Walton describes four ways how intelligence services are certain to contribute to defeating COVID-19 and why pandemic intelligence will become a central part of future U.S. national security. Full Article
v No, the Coronavirus Will Not Change the Global Order By feedproxy.google.com Published On :: Apr 16, 2020 Apr 16, 2020Joseph Nye advises skepticism toward claims that the pandemic changes everything. China won't benefit, and the United States will remain preeminent. Full Article
v Getting Smart on Pandemics: Intelligence in the Wake of COVID-19 By feedproxy.google.com Published On :: Apr 17, 2020 Apr 17, 2020This episode of Horns of a Dilemma touches on whether the failure to properly anticipate and warn about the novel coronavirus constitutes an intelligence failure, what changes might be required in the intelligence community in the wake of the pandemic, and what type of investigation or inquiry might be appropriate in order to learn lessons and incorporate changes for both the intelligence community and the whole of government moving forward. Full Article
v This Virus Is Tough, but History Provides Perspective: The 1968 Pandemic and the Vietnam War By feedproxy.google.com Published On :: Apr 24, 2020 Apr 24, 2020Nathaniel L. Moir recounts the events of 1968: The war in Vietnam and extensive civil unrest in the United States — and yet another big problem that made life harder. In 1968, the H3N2 pandemic killed more individuals in the United States than the combined total number of American fatalities during both the Vietnam and Korean Wars. Full Article
v Maxwell Taylor's Cold War: From Berlin to Vietnam By feedproxy.google.com Published On :: May 6, 2020 May 6, 2020Nathaniel Moir reviews Maxwell Taylor's Cold War: From Berlin to Vietnam by Ingo Trauschweizer. Full Article
v The Economic Gains of Cloud Computing: An Address by Federal Chief Information Officer Vivek Kundra By webfeeds.brookings.edu Published On :: Wed, 07 Apr 2010 09:00:00 -0400 Event Information April 7, 20109:00 AM - 11:00 AM EDTFalk AuditoriumThe Brookings Institution1775 Massachusetts Ave., NWWashington, DC Register for the EventCloud computing services over the Internet have the potential to spur a significant increase in government efficiency and decrease technology costs, as well as to create incentives and online platforms for innovation. Adoption of cloud computing technologies could lead to new, efficient ways of governing.On April 7, the Brookings Institution hosted a policy forum that examines the economic benefits of cloud computing for local, state, and federal government. Federal Chief Information Officer Vivek Kundra delivered a keynote address on the role of the government in developing and promoting cloud computing. Brookings Vice President Darrell West moderated a panel of experts and detailed the findings in his paper, "Saving Money through Cloud Computing," which analyzes its governmental cost-savings potential. After the program, panelists took audience questions. Video Cloud Computing a Fiscally Smart MoveCloud Computing Saves Money, Makes Government More OpenCloud Computing Will Fundamentally Change Government OperationsGovernment on Cloud Will Yield Cost-Effective System Audio The Economic Gains of Cloud Computing Transcript Uncorrected Transcript (.pdf) Event Materials 20100407_cloud_computing0407_cloud_computing_kundra_remarks0407_cloud_computing_kundra_presentation Full Article
v Innovating through Cloud Computing By webfeeds.brookings.edu Published On :: Fri, 07 May 2010 00:00:00 -0400 Technology offers the greatest source for innovation in the public sector and one of the best examples falls within the area of cloud computing. As I noted in a recent paper, the U.S. federal government spends nearly $76 billion each year on information technology, and $20 billion of that is devoted to hardware, software, and file servers. Traditionally, computing services have been delivered through desktops or laptops operated by proprietary software. But new advances in cloud computing have made it possible for public sector agencies alike to access software, services, and data storage through remote file servers.I looked at possible cost savings a federal agency might expect from migrating to the cloud. After undertaking case studies of government agencies that made the move, I found that the agencies generally saw between 25 and 50 percent savings in moving to the cloud. Public officials can save money by reducing the number of file servers they need to purchase, cutting software costs, relying on fewer information technology specialists, and improving the efficiency of their data storage utilization. In 2008, Washington, D.C. city government shifted many of its 38,000 employee email services across 86 agencies to the cloud, and the migration saved 48 percent on email expenditures. In 2009, the city of Los Angeles moved email service for its 30,000 employees to the cloud. An analysis undertaken by City Administrative Officer Miguel Santana for the City Council found that the five-year costs of running the new Google system would be $17,556,484, which was 23.6 percent less than the $22,996,242 for operating GroupWise during that same period. And in terms of personnel savings, the city needed nine fewer people in its information technology department. The U.S. Air Force 45th Space Wing is responsible for launching and tracking unmanned space vehicles from Cape Canaveral Air Force Station and employs more than 10,000 workers. The Wing had 60 distinct file servers, but found that it utilized only 10 percent of central processing unit capacity. Commanders modernized their system and saved $180,000 per year in annual computing costs. In addition, the unit saved money by not buying new hardware or deploying new software. These are just some of the ways the government is using technology to save money and increase efficiency of its operations. Authors Darrell M. West Image Source: © HANNIBAL HANSCHKE / Reuters Full Article
v Steps to Improve Cloud Computing in the Public Sector By webfeeds.brookings.edu Published On :: Wed, 21 Jul 2010 09:58:00 -0400 Executive SummaryGovernment information technology is subject to a variety of rules, regulations, and procurement policies. Computing is treated differently depending on whether the platform is based on desktops, laptops, mobile devices, or remote file servers known as cloud computing. There are differences between the executive, legislative, and judicial branches of government, as well as in the level of privacy and security expected for various applications. Some people perceive higher security on desktop or laptop computers and lower security with the cloud because the latter’s information is stored remotely through third-party commercial providers. In reality, though, there are serious security threats to all electronic information regardless of platform, and cloud server providers often take security more seriously than mass consumers or government officials employing weak passwords on their local computers. In this paper, I review current federal IT policy and discuss rules, practices, and procedures that limit innovation. There are a variety of obstacles that make it difficult for policymakers to take full advantage of the technological revolution that has unfolded in recent years. After outlining these issues, I make recommendations on policy changes required to improve the efficiency and effectiveness of federal computing. My specific recommendations include: Public officials should develop more consistent rules on computing across desktop, laptop, mobile, and cloud platforms. The use of video, collaboration, and social networking should be authorized for congressional offices. This would make legislative branch policy consistent with that of the executive branch. Judicial branch computing should be modernized, with greater emphasis on cloud computing. There should be a more uniform certification process for federal agencies. Right now, each agency is responsible for certifying its own applications. It makes sense to have a “joint authorization board” with the power to review management services and certify particular products for use across the government. Congress should update the Electronic Communications Privacy Act to change the process by which law enforcement agents obtain electronic information. Instead of using a prosecutor’s subpoena, legislation should require a “probable cause” search warrant that is approved by a judge. This would provide greater safeguards in terms of online content, pictures, geolocation data, and e-mails. Privacy rights should be placed on the same footing regardless of whether a person is using desktop or cloud computing. It makes little sense to have weaker standards on one platform than another. Consumers and government decision-makers expect the same level of protection whether they are accessing information on a desktop, laptop, mobile, or cloud storage system. Congress should amend the Computer Fraud and Abuse Act to strengthen penalties for unwanted intrusion into computing systems. The law has inconsistent penalties and prosecutors have found that it is hard to prosecute cyber-crimes. Apps.gov represents a big step forward and government use should be expanded because it makes procurement easier and speeds public sector innovation. It is a model of how the government can reinvent itself through digital technology in ways that improve efficiency and effectiveness. Countries need to harmonize their laws on cloud computing so as to reduce current inconsistencies in regard to privacy, data storage, security processes, and personnel training, There should be mechanisms for data exchange that encourage portability across platforms. We should avoid vendor lock-in that precludes data exchange. Data on uptime, downtime, recover time, archiving, and maintenance schedules would help build public trust by providing information on computing performance. Downloads Download the Full Paper Authors Darrell M. West Image Source: Martin Barraud Full Article
v Moving to the Cloud: How the Public Sector Can Leverage the Power of Cloud Computing By webfeeds.brookings.edu Published On :: Wed, 21 Jul 2010 10:00:00 -0400 Event Information July 21, 201010:00 AM - 12:00 PM EDTFalk AuditoriumThe Brookings Institution1775 Massachusetts Ave., NWWashington, DC Register for the EventThe U.S. government spends billions of dollars each year on computer hardware, software and file servers that may no longer be necessary. Currently, the public sector makes relatively little use of cloud computing, even though studies suggest substantial government savings from a migration to more Internet-based computing with shared resources.On July 21, the Center for Technology Innovation at Brookings hosted a policy forum on steps to enhance public sector adoption of cloud computing innovations. Brookings Vice President Darrell West moderated a panel of experts, including David McClure of the General Services Administration, Dawn Leaf of the National Institute for Standards and Technology, and Katie Ratte of the Federal Trade Commission. West released a paper detailing the policy changes required to improve the efficiency and effectiveness of federal computing. Audio Moving to the Cloud: How the Public Sector Can Leverage the Power of Cloud Computing Transcript Uncorrected Transcript (.pdf)Download Dawn Leaf's PowerPoint Presentation (.pdf)Download David McClure's PowerPoint Presentation (.pdf) Event Materials 20100721_cloud_computing0721_cloud_computing_leaf0721_cloud_computing_mcclure Full Article
v Privacy and Security in the Cloud Computing Age By webfeeds.brookings.edu Published On :: Tue, 26 Oct 2010 10:00:00 -0400 Event Information October 26, 201010:00 AM - 11:30 AM EDTFalk AuditoriumThe Brookings Institution1775 Massachusetts Ave., NWWashington, DC Register for the EventAlthough research suggests that considerable efficiencies can be gained from cloud computing technology, concerns over privacy and security continue to deter government and private-sector firms from migrating to the cloud. By its very nature, storing information or accessing services through remote providers would seem to raise the level of privacy and security risks. But is such apprehension warranted? What are the real security threats posed to individuals, business and government by cloud computing technologies? Do the cost-saving benefits outweigh the dangers?On October 26, the Brookings Institution hosted a policy forum on the privacy and security challenges raised by cloud computing. Governance Studies Director Darrell West moderated a panel of technology industry experts examining how cloud computing systems can generate innovation and cost savings without sacrificing privacy and security. West will also present findings from his forthcoming paper “Privacy, Security, and Innovation in Cloud Computing.” After the program, panelists took audience questions. Transcript Uncorrected Transcript (.pdf) Event Materials 20101026_cloud_computing Full Article
v Privacy and Security in Cloud Computing By webfeeds.brookings.edu Published On :: Tue, 26 Oct 2010 11:50:00 -0400 Executive Summary Cloud computing can mean different things to different people, and obviously the privacy and security concerns will differ between a consumer using a public cloud application, a medium-sized enterprise using a customized suite of business applications on a cloud platform, and a government agency with a private cloud for internal database sharing (Whitten, 2010). The shift of each category of user to cloud systems brings a different package of benefits and risks. What remains constant, though, is the tangible and intangible value that the user seeks to protect. For an individual, the value at risk can range from loss of civil liberties to the contents of bank accounts. For a business, the value runs from core trade secrets to continuity of business operations and public reputation. Much of this is hard to estimate and translate into standard metrics of value (Lev, 2003) The task in this transition is to compare the opportunities of cloud adoption with the risks. The benefits of cloud have been discussed elsewhere, to the individual to the enterprise, and to the government (West, 2010a, 2010b). This document explores how to think about privacy and security on the cloud. It is not intended to be a catalog of cloud threats (see ENISA (2009) for an example of rigorous exploration of the risks of cloud adoption to specific groups). We frame the set of concerns for the cloud and highlight what is new and what is not. We analyze a set of policy issues that represent systematic concerns deserving the attention of policy-makers. We argue that the weak link in security generally is the human factor and surrounding institutions and incentives matter more than the platform itself. As long as we learn the lessons of past breakdowns, cloud computing has the potential to generate innovation without sacrificing privacy and security (Amoroso, 2006; Benioff, 2009). Downloads Download the Full Paper Authors Allan A. FriedmanDarrell M. West Image Source: Jupiterimages Full Article
v Technology and the Federal Government: Recommendations for the Innovation Advisory Board By webfeeds.brookings.edu Published On :: Mon, 06 Jun 2011 15:14:00 -0400 Our former Brookings colleague Rebecca Blank, now at the Commerce Department, is today leading the first meeting of the Obama Administration’s Innovation Advisory Board, looking at the innovative capacity and economic competitiveness of the United States.I applaud the effort. Nothing is more important to America’s longterm competitiveness than emphasizing innovation. As the council looks to the private sector and global markets, I urge it to examine how the U.S. government can lead innovation and contribute to economic growth. The best place to look is new and emerging digital technologies that can make government more accessible, accountable, responsive and efficient for the people who use government services every day. Here are some of the recommendations I made in a recent paper I wrote with colleagues here at Brookings as part of our “Growth Through Innovation” initiative: Save money and gain efficiency by moving federal IT functions “to the cloud,” i.e., using advances in cloud computing to put software, hardware, services and data storage through remote file servers. Continue to prioritize the Obama administration’s existing efforts to put unparalleled amounts of data online at Data.gov and other federal sites, making it easier and cheaper for citizens and businesses to access the information they need. Use social media networks to deliver information to the public and to solicit feedback to improve government performance. Integrate ideas and operations with state and local organizations, where much of government innovation is taking place today. Apply the methods of private-sector business planning to the public sector to produce region-specific business plans that are low cost and high impact. These improvements in government services innovations in the digital age can help spur innovation and support a robust business climate. And, as a sorely needed side benefit, they can also serve to eliminate some of the current distrust and even contempt for government that has brought public approval of the performance of the federal government to near historic lows. Authors Darrell M. West Image Source: © Mario Anzuoni / Reuters Full Article
v Evaluating the Cloud Computing Act of 2011 By webfeeds.brookings.edu Published On :: Thu, 16 Jun 2011 12:00:00 -0400 Event Information June 16, 201112:00 PM - 1:30 PM EDTRoom SVC-209U.S. Capitol Visitor's CenterU.S. CapitolWashington, DC While research suggests that considerable efficiencies can be gained from cloud computing technology, concerns over privacy and security continue to deter governments and private-sector firms from migrating to the cloud. Senator Amy Klobuchar (D-Minn.) has advanced discussion of the “Cloud Computing Act of 2011,” draft legislation that would address these challenges by encouraging the U.S. government to negotiate with other countries to establish consistent laws related to online security and cloud computing. The bill also creates new enforcement tools for investigating and prosecuting those who violate online privacy and security laws.On June 16, the Brookings Institution hosted a forum on the policy proposals in the Cloud Computing Act of 2011. Discussion included an overview of the international policy implications as governments and firms adjust to a coherent legal framework, changes and innovations in public procurement, and challenges for private industry as it balances consumer needs and compliance with these proposed cloud computing safeguards. After the program, panelists took audience questions. Transcript Uncorrected Transcript (.pdf) Event Materials 20110616_cloud_computing Full Article
v A Crime Wave in Cyberspace By webfeeds.brookings.edu Published On :: Fri, 22 Jul 2011 00:00:00 -0400 Listen to the chatter from top officials, and you’d think that World War III was about to break out on the Internet. The defense secretary is warning about a digital “Pearl Harbor.” Former director of national intelligence Mike McConnell declares that the United States is “fighting a cyber war, and we’re losing.” Every new hack brings more pronouncements of network doom.The scare talk, however, is misplaced. Yes, we’re facing enormous cybersecurity problems — just look at the high-profile penetrations of such companies as Sony and Lockheed or the millions of Americans whose personal information has been stolen online. But these aren’t signs of some impending cataclysmic showdown as I explain in my new cybersecurity paper for The Brookings Institution. They’re markers of a rising tide of online crime that, in its own way, could be more dangerous than a cyberwar. According to the British government, online thieves, scammers and industrial spies cost U.K. businesses an estimated $43.5 billion in the past year alone. Crooks-for-hire will infect a thousand computers for $7 — that’s how simple it’s become. Sixty thousand new malicious software variants are detected every day. Forget “Pearl Harbor”; if we’re not careful, the Internet could be in danger of looking like the South Bronx circa 1989 – a place where crooks hold such sway that honest people find it hard to live or work there. Could there be some online conflict in the future? Maybe. But crooks are draining billions from the legitimate global economy right now. Even the Pentagon’s specialists are worried, noting in their new cybersecurity strategy that “the tools and techniques developed by cyber criminals are increasing in sophistication at an incredible rate.” Those tools also are becoming easier to use. The latest crimeware makes stealing passwords about as simple as setting up Web pages. One gang, recently arrested, used it to drain $9.5 million in just three months. Read the full article at washingtonpost.com >> Authors Noah Shachtman Publication: The Washington Post Full Article
v New Federal Government CIO is Key to Improving Government Performance By webfeeds.brookings.edu Published On :: Tue, 09 Aug 2011 12:47:00 -0400 The appointment of new federal chief information officer Steven VanRoekel comes at a challenging time for President Barack Obama. The national economy continues to be weak. Congress plans to cut trillions from the federal budget. And in the time leading up to the 2012 election, American voters remain cynical about the ability of the government to address important policy problems in an effective manner.In an era of deficit reduction and public cynicism, the tasks facing federal officials are to determine how to do more with less and persuade voters the government can become smarter and more effective. There are going to be fewer dollars for virtually every federal program so it is important to figure how ways to innovate and perform more efficiently. Former CIO Vivek Kundra sought to do this through encouraging agencies to move software applications to the cloud, consolidating federal data centers, improving transparency, and improving the information technology procurement process. It is important to continue this progress even as agencies are forced to downsize their operations. As shown in the private sector, government administrators should use technology to cut costs, improve worker productivity, and streamline operations. This is not just a matter of using technology in more innovative ways, but changing the operations and culture of the public sector. Public officials must improve its data mining activities to identify fraud and abuse in Medicare, Medicaid, the Defense Department, and other domestic programs. New software gives managers better tools to evaluate how money is being spent and whether it is fulfilling intended goals. If it is not, programs need to be modified or eliminated. The most important weapon in Mr. VanRoekel’s arsenal may be the scalpel as he goes through the federal government’s $80 billion IT budget. Authors Darrell M. West Image Source: © Hyungwon Kang / Reuters Full Article
v Riding the Mobile Wave: The Future of Mobile Computing By webfeeds.brookings.edu Published On :: Fri, 05 Oct 2012 10:00:00 -0400 Event Information October 5, 201210:00 AM - 11:30 AM EDTFalk AuditoriumBrookings Institution1775 Massachusetts Avenue NWWashington, DC 20036 Register for the EventIn his new book The Mobile Wave: How Mobile Intelligence Will Change Everything (Vanguard Press, 2012), CEO of MicroStrategy Michael Saylor examines the transformative possibilities of mobile computing on business, society, economies and everyday life. Saylor argues that mobile technologies such as smartphones and tablet computers – “the fifth wave of computer technology” – will be indispensible tools for modern life and completely alter how we live. On October 5, the Center for Technology Innovation at Brookings hosted a forum on mobile computing and its monumental impact on our future. Moderated by Vice President Darrell West, Michael Saylor discussed key highlights from his book and offered insights as to what sort of change we can expect from the macro level down to the most mundane of everyday humans tasks. Audio Riding the Mobile Wave: The Future of Mobile Computing Transcript Transcript (.pdf) Event Materials 20121005_mobile_wave Full Article
v Bridging Transatlantic Differences on Data and Privacy After Snowden By webfeeds.brookings.edu Published On :: Tue, 20 May 2014 07:30:00 -0400 “Missed connections” is the personals ads category for people whose encounters are too fleeting to form any union – a lost-and-found for relationships. I gave that title to my paper on the conversation between the United States and for Europe on data, privacy, and surveillance because I thought it provides an apt metaphor for the hopes and frustrations on both sides of that conversation. The United States and Europe are linked by common values and overlapping heritage, an enduring security alliance, and the world’s largest trading relationship. Europe has become the largest crossroad of the Internet and the transatlantic backbone is the global Internet’s highest capacity route. [I] But differences in approaches to the regulation of the privacy of personal information threaten to disrupt the vast flow of information between Europe and the U.S. These differences have been exacerbated by the Edward Snowden disclosures, especially stories about the PRISM program and eavesdropping on Chancellor Angela Merkel’s cell phone. The reaction has been profound enough to give momentum to calls for suspension of the “Safe Harbor” agreement that facilitates transfers of data between the U.S. Europe; and Chancellor Merkel, the European Parliament, and other EU leaders who have called for some form of European Internet that would keep data on European citizens inside EU borders. So it can seem like the U.S. and EU are gazing at each other from trains headed in opposite directions. My paper went to press before last week’s European Court of Justice ruling that Google must block search results showing that a Spanish citizen had property attached for debt several years ago. What is most startling about the decision is this information was accurate and had been published in a Spanish newspaper by government mandate but – for these reasons – the newspaper was not obligated to remove the information from its website; nevertheless, Google could be required to remove links to that website from search results in Spain. That is quite different from the way the right to privacy has been applied in America. The decision’s discussion of search as “profiling” bears out what the paper says about European attitudes toward Google and U.S. Internet companies. So the decision heightens the differences between the U.S. and Europe. Nonetheless, it does not have to be so desperate. In my paper, I look at the issues that have divided the United States and Europe when it comes to data and the things they have in common, the issues currently in play, and some ways the United States can help to steer the conversation in the right direction. [I] "Europe Emerges as Global Internet Hub," Telegeography, September 18, 2013. Authors Cameron F. Kerry Image Source: © Yves Herman / Reuters Full Article
v Missed Connections: Talking With Europe About Data, Privacy, and Surveillance By webfeeds.brookings.edu Published On :: Tue, 20 May 2014 11:57:00 -0400 The United States exports digital goods worth hundreds of billions of dollars across the Atlantic each year. And both Silicon Valley and Hollywood do big business with Europe every year. Differences in approaches to privacy have always made this relationship unsteady but the Snowden disclosures greatly complicated the prospects of a Transatlantic Trade and Investment Partnership. In this paper Cameron Kerry examines that politics of transatlantic trade and the critical role that U.S. privacy policy plays in these conversations. Kerry relies on his experience as the U.S.’s chief international negotiator for privacy and data regulation to provide an overview of key proposals related to privacy and data in Europe. He addresses the possible development of a European Internet and the current regulatory regime known as Safe Harbor. Kerry argues that America and Europe have different approaches to protecting privacy both which have strengths and weaknesses. To promote transatlantic trade the United states should: Not be defensive about its protection of privacy Provide clear information to the worldwide community about American law enforcement surveillance Strengthen its own privacy protection Focus on the importance of trade to the American and European economies Downloads Download the paper Authors Cameron F. Kerry Image Source: © Francois Lenoir / Reuters Full Article
v FedRAMP to Monitor Cloud Service Providers By webfeeds.brookings.edu Published On :: Thu, 05 Jun 2014 08:30:00 -0400 As of today, the federal government will require that all cloud service providers have Federal Risk and Authorization Program (FedRAMP) approval. FedRAMP is a program meant to standardize the security of cloud services, thus reducing the time and effort that independent cloud providers would need to spend ensuring cloud security. According to a 2013 annual report by the General Services Administration, agencies that use FedRAMP could save 50 percent on staffing and $200,000 in costs overall. FedRAMP will operate under similar rules as the Federal Information Security Management Act (FISMA), which helps maintain security of federal IT systems, applications and databases. Both FISMA and FedRAMP will provide enhanced protection and scrutiny for federal and independent agencies. To learn more about cloud computing, read Darrell West’s papers Saving Money Through Cloud Computing and Steps to Improve Cloud Computing in the Public Sector. Visit the FedRAMP website here. MaryCate Most contributed to this post. Authors Hillary Schaub Image Source: © Navesh Chitrakar / Reuters Full Article
v Threats to the Future of Cloud Computing: Surveillance and Transatlantic Trade By webfeeds.brookings.edu Published On :: Thu, 17 Jul 2014 07:30:00 -0400 The first instance of “cloud” computing came in 2006, when Amazon released its Elastic Compute Cloud, a service for consumers to lease space on virtual machines to run software. Now, the cloud enables the transfer and storage of data around the world, in an almost seamless fashion. Using cloud services are a seamless experience from the consumer perspective. This ease of use obscures significant regulation from governments on both sides of the Atlantic. The Safe Harbor Principles is a framework that ensures that personal consumer data being transferred from the EU to the US is still subject to a level of security in compliance with the EU’s stricter regulation on data protection. US companies must be certified within this framework, in order to transfer consumer data outside the EU. A comprehensive data privacy arrangement that satisfies both sides of the Atlantic is necessary to preserve the free flow of data, and the resulting commerce, between the two regions. Speaking at the 2014 Cloud Computing Policy Conference, Cameron F. Kerry suggested that neither side of the Atlantic can afford to partition the Internet. Currently trade negotiators are assessing the viability including an update to Safe Harbor Principles as a part of the Transatlantic Trade and Investment Partnership (TTIP). TTIP and the Future of Trade The NSA revelations last year have only increased support for further regulation over the transfer of personal data in the cloud, especially in the European Union (EU). The revelations have also brought to light significant differences in the European and US conceptions of privacy. The ruling by the European Court of Justice on the “right to be forgotten” is a recent example of this transatlantic divide. In EU countries, citizens can now request Google to take down links from search results that lead users to potentially damaging information. There are several disputes that negotiators must first resolve. Europeans would prefer that American regulators take a more active role in cases where US firms are violating the Safe Harbor principles. EU officials have also indicated they would like to include a mechanism to send an alert if data were improperly shared with US law enforcement officials. The expansion of the codes of conduct within the cloud would serve as a major step towards finalizing TTIP. A European Commission Analysis finds that TTIP would inject about $130 billion into the US economy. Ultimately both the EU and the US have so much to gain that both nations must find a way to resolve these thorny issues. Kevin Risser contributed to this post. Authors Joshua BleibergDarrell M. West Image Source: © Fabrizio Bensch / Reuters Full Article
v Getting IT Right? How State Governments are Approaching Cloud Computing By webfeeds.brookings.edu Published On :: Tue, 20 Jan 2015 07:30:00 -0500 Cloud computing is becoming omnipresent in the private sector as companies latch on to this innovation as a way to manage scalability, improve flexibility, and reduce cost. Analysts at IDC predict that, over the next six years, nearly 90 percent of new spending on Internet and communications technology will be on cloud-based platforms. Apple, Google, Amazon, Microsoft, and hundreds of smaller companies are positioning themselves to dominate the estimated $5 trillion worldwide market. While few companies will provide numbers, it is estimated that Amazon and Google may run as many as 10 million servers while Microsoft runs close to one million. In short, it is an innovation that makes a mockery out of Moore’s law. But, like all innovations, cloud computing has potential pitfalls. Public sector organizations in particular have had difficulty taking advantage of new technologies. The Heritage Foundation keeps a list over 50 examples of government ineptitude including $34 billion in fraudulent Homeland Security contracts, National Institutes of Health renting a lab that it neither needs nor can use for $1.3 million per month, and the Department of Agriculture wasting $2.5 billion in stimulus money on broadband internet. Technological ineptitude received special attention with the failed launch of the Healthcare.gov, the release of classified data from Edward Snowden, and the costly FBI virtual case file debacle. Cloud computing is far more than just a simple technology change and requires a close examination of governance, sourcing, and security. We sought to understand how well state government is prepared to address the challenges of cloud computing. The Approach We have gathered and started to do a content analysis of the IT strategic plans for each state. For each plan, we performed a content analysis, which is looking for certain phrases or text within the IT strategic plan in order to have a structured way to understand the data. Details for our approach can be seen in our previous blog post. How States Are Implementing the Cloud We were not surprised to see a number of states preparing to study or embark on cloud computing. While some states don’t mention it (e.g. Alabama), most states are eagerly exploring it. For example, North Dakota’s plan talks about cloud computing as an integral part of the future and seven of its thirteen major IT initiatives are centered on preparation for transitioning to the cloud “where and when it makes sense”. Vermont puts itself squarely in the studying period. The plan describes that, “While the risks of enterprise-wide and cloud-based IT must be carefully managed, trends continue to just larger-scale operations.” Wisconsin also clearly lays out its view on cloud computing, writing that, “Flexibility and responsiveness (also) guide Wisconsin’s approach toward adoption of cloud services” and suggests that its version of a private cloud “…offers advanced security and service availability tailored for business needs.” West Virginia provides an equally balanced approach by requiring that only services with an acceptably low risk and cost-effective footprint will be moved to the cloud. In short, all of the states that are considering cloud computing are taking a thoughtful and balanced approach. The Good One of the most critical aspects of cloud computing is security and, without question, states understand the importance of good security. A good example of this is Colorado who designates security as one of its four “wildly important goals” and sets the target of “10 percent reduction in information security risk for Colorado agencies by close of FY15”. South Carolina echoed the same theme by asserting that security and confidentiality are “overriding priorities at every stage of development and deployment.” Connecticut’s plans explain the need to “continuously improve the security and safeguards over agency data and information technology assets”. The Bad Despite the interest in cloud computing, we were only able to find a single state (Georgia) that explicitly links governance to security and, to us, by extension to cloud computing. In Georgia’s plan, they start with the idea that “strong security programs start with strong governance” and then explicitly describe necessary changes in governance to improve security. We were, however, impressed with the seriousness that New York, North Carolina and Massachusetts took governance but it was difficult to find many other states that did. The Ugly Unfortunately the results on sourcing were dismal. While a few states (e.g. Kansas, Ohio, and Massachusetts) specifically discuss partnerships, most states seemed to ignore the sourcing aspect of cloud computing. The most ominous note comes from Alabama where they make a statement that innovation in the state is being stifled by a lack of strong personnel. While we have great enthusiasm for government to address cloud computing, some of the non-technical issues are lagging in the discussion. Good government requires that these items be addressed in order to realize the promise of cloud computing. Authors Kevin C. DesouzaGregory Dawson Image Source: © Fabrizio Bensch / Reuters Full Article
v Analyzing the Federal Government's Use of the Cloud By webfeeds.brookings.edu Published On :: Mon, 09 Feb 2015 07:30:00 -0500 Since 2009 the federal government started the process of replacing local computers with cloud platforms. A recent report from the Congressional Research Service (CRS) provides an interesting view into the progress of these investments. It reveals the benefits that public agencies gain when using cloud services and the barriers they face when making the transition. Advantages of Cloud Computing Cloud computers are superior to locally-run data centers for a variety of reasons. The CRS report identifies six specific cloud benefits: Cost- Cloud computer platforms use resources more efficiently than local servers. An organization that uses local Information Technology (IT) must invest in the infrastructure to support computer systems at times of peak demand. However, most times companies or government agencies require only a fraction of that computing power. Cloud computing allows organizations to pay for all of the resources they need and avoid costly investments in rarely used local IT systems. Energy Efficiency- Cloud computing data centers benefit from economies of scale to run more efficiently than local servers. In some cases this can result in huge energy savings. For a large cloud computing center it also makes economic sense to invest in green energy sources like wind or solar for power. Availability- Cloud computing systems make it easy for any device with an Internet connection to access files or software. However, if a facility temporarily loses Internet access the files on cloud system are inaccessible. Alternatively, a locally administered IT system could function without Internet connectivity. Agility- Cloud systems can make it easier to upgrade operating systems and applications. The available computing power also means that memory intensive software packages are cost effective. Security- Cloud providing companies also have the financial resources to purchase the tools necessary to ensure that networks remain safe. Reliability- Cloud systems can save data onto multiple servers. If a single server goes down due to a cyberattack or another issue, the data is available on another server. Government Investments in the Cloud Determining the exact size of government cloud computing expenditures is difficult. Government spending on IT has increased every year from 2001 to 2013 when it reached a peak of $81 billion. In the three subsequent years it has decreased. Cloud computing expenditures likely represent a tiny fraction of that total. Market research firms have estimated that the federal government spends between $1.4 billion and $7 billion on cloud computers annually. Trends in Total Federal Investment in Information Technology Source: Congressional Research Service Challenges for Migrating to the Cloud The federal government has encountered several barriers in its plan to shift more functions to cloud platforms: High Federal Security Requirements- The government faces new advanced persistent threats routinely. System-wide security updates are necessary more often than for private sector organizations. The short update cycle provides a unique challenge to cloud providers. Adopting New Technologies- Government agencies have ingrained cultures that are slow to change. This shift from locally-based servers to the cloud can be slow and tedious for this reason. Ancillary Technologies- Cloud technologies are known for their flexibility. However, government agencies may lack the necessary IT infrastructure or speedy Internet connections that leverage the maximum potential of the cloud. Technical Know How- Cloud platforms require specialized knowledge to administer. Many government agencies lack the necessary experts to oversee a migration to the cloud. IT Expenditure- Migration to the cloud can involve expensive initial costs. Additional funding is necessary to facilitate the shift to the cloud. The Future of the Government Cloud An analysis of the costs and benefits of cloud migration uncover a few specific barriers that the federal government must overcome to earn the full value from new technologies. First, lawmakers must be willing to spend more now to save money later. Cloud systems are cheaper to run than local administered servers but the initial transition costs are high. Current funding levels, which are trending down, are too low to finance such a change. Privacy and security are also major challenges. Government servers host troves of data that Americans expect to remain private. Converting these systems to the cloud will require the government’s full confidence that cloud systems are at least as secure. New legislation is likely necessary to achieve the complimentary goals of privacy and security. More TechTank posts available here Authors Joshua BleibergDarrell M. West Image Source: © Donna Carson / Reuters Full Article
v The Elusive Myth of Democratic Egyptian Elections By webfeeds.brookings.edu Published On :: Mon, 08 Nov 2010 13:04:00 -0500 INTRODUCTION Later this month, Egyptians will go to the polls, or attempt to, in order to vote in the country’s parliamentary elections. The elections will unlikely be a democratic affair in the Western sense. In fact, opposition candidates, voters, citizen groups—essentially everyone other than government representatives—are fully expecting the elections to be a violent and rigged episode. For easy reference, one can look to the June elections for the Shura Council, or upper house of Parliament, in which the governing National Democratic Party (NDP) managed to land 80 out of a possible 84 seats. Those elections were marked by violence and allegations of rampant violations.Elections in Egypt are not generally democratic, they do not necessarily reflect the will of the people, and they will invariably usher in a house in which the NDP has an unshakeable majority. More so, the elected body has very little control over the government and none over the president, who, thanks to some creative constitutional amendments in 2007, can dissolve the Parliament at will. Election results are apparently so preordained that many have questioned the wisdom of participating at all. Opposition groups, among them the National Alliance for Change (NAC), led by former International Atomic Energy Agency (IAEA) head and current political reformer Mohamed ElBaradei, have been calling for a boycott. ElBaradei told reporters at a Ramadan Iftar meeting on September 7 that voting “would go against the national will.” Many political analysts and some members of the opposition have echoed the belief that participation in the elections only gives credence to a fundamentally flawed system and perpetuates the state myth of a democratic nation. The above argument certainly has its merits, but it misses the point. Elections in Egypt are not about who wins seats—that is usually a foregone conclusion. They are about the “how and the what,” in the sense that they are oases of political activity, demand, and dissension in an otherwise arid climate. In that way, every election fought represents losses and gains for the respective participants in ways that invariably influence the following elections. Also, the ballot boxes can yield surprising results—as in the case of the 2005 elections when the Muslim Brotherhood (MB) gained a jawdropping 88 of 454 seats in the elections for the lower house. This outcome certainly would not have come about if the Brotherhood had not participated. To be sure, there are also significant, detrimental changes that happen as a direct consequence of the elections, among them constitutional amendments designed to hobble the opposition’s ability to field candidates and campaign. Still, for opposition parties and movements, boycotting the elections is the equivalent of throwing away the only political participation they have. It would mean relinquishing any visibility or influence and it would mean admitting to their supporters that they are essentially mere window dressings in the democratic façade. Arguably, this is a reason why these elections have only ever been boycotted once, in 1990. The Egyptian political arena is one where contestants scrabble for the smallest patch of ground. The high moral ground simply does not figure into it. Downloads Download Full Report - English Authors Mirette F. Mabrouk Full Article
v Saving Syria: Assessing Options for Regime Change By webfeeds.brookings.edu Published On :: Thu, 15 Mar 2012 10:19:00 -0400 Syria is trapped on a crumbling precipice, and however it might fall will entail significant risks for the United States and for the Syrian people. The brutal regime of Bashar al-Asad is employing its loyal military forces and sectarian thugs to crush the opposition and reassert its tyranny. Even if Bashar fails, Syria may not be out of the woods: an increasingly likely alternative to the current regime is a bloody civil war similar to what we saw in Lebanon, Bosnia, Congo, and most recently in Iraq. The horrors of such a war might even exceed the brutal reassertion of Asad’s control, and would cause spillover into Syria’s neighbors—Turkey, Iraq, Jordan, Lebanon, and Israel—that could be disastrous for them and for American interests in the Middle East. But the unrest in Syria, which is now entering its second year, also offers some important opportunities, ones that would come from the fall of the regime of Bashar al-Asad, whose family has ruled the country with an iron grip for over forty years. Syria is Iran’s oldest and most important ally in the Arab world, and the Iranian regime has doubled down on Asad, providing him with financial aid and military support to shore up his regime. Asad’s departure would deal a significant blow to Tehran, further isolating it at a time when it has few friends in the region or the world. In addition, Damascus is steadfast in its hostility toward Israel, and Asad’s regime is also a longtime supporter of terrorist groups like Hizballah and Hamas, and has at times aided al-Qa’ida terrorists and former regime elements in Iraq. The regime’s collapse, therefore, could have significant benefits for the United States and its allies in the region. Actually ousting Asad, however, will not be easy. Although the Obama administration has for months called for Asad to go, every policy option to remove him is flawed, and some could even make the situation worse—seemingly a recipe for inaction. Doing nothing, however, means standing by while Asad murders his own people, and Syria plunges into civil war and risks becoming a failed state. Already the violence is staggering: as of March 2012, at least 8,000 Syrians have died and thousands more have been arrested and tortured in trying to topple the regime. At the same time, Syria is fragmenting. The Syrian opposition remains divided, and the Free Syrian Army is more a brand than a meaningful, unified force. Al- Qa’ida is urging fighters to join the fray in Syria, and sectarian killings and atrocities are growing. Should the violence continue to intensify, Syria’s neighbors may increase their meddling, and instability could spread, further weakening already-fragile neighbors like Iraq and Lebanon. So to protect U.S. interests, Asad cannot triumph. But a failed Syria, one wracked by civil war, would be just as bad. Thus, U.S. policy must walk this tightrope, trying to remove Asad, but doing so in a way that keeps Syria an intact state capable of policing its borders and ensuring order at home. At the end of the day, however, removing Asad may not be doable at a price the United States is willing to pay. If so, the U.S. government may be forced to choose between living with a brutal but weakened Asad or getting rid of Asad regardless of the consequences. This memo lays out six options for the United States to consider to achieve Asad’s overthrow, should it choose to do so: Removing the regime via diplomacy; Coercing the regime via sanctions and diplomatic isolation; Arming the Syrian opposition to overthrow the regime; Engaging in a Libya-like air campaign to help an opposition army gain victory; Invading Syria with U.S.-led forces and toppling the regime directly; and Participating in a multilateral, NATO-led effort to oust Asad and rebuild Syria. The options are complex, and policymakers will probably try to combine several in an attempt to accentuate the positives and minimize the negatives, which will inevitably be difficult and bring out new complications. But by focusing on discrete approaches, this memo helps expose their relative strengths and weaknesses. For each course of action, this memo describes the strategy inherent to the option and what it would entail in practice. It also assesses the option’s advantages and disadvantages. This memo does not endorse any particular policy option. Rather, it seeks to explain the risks and benefits of possible courses of action at this moment in time. As conditions change, some options may become more practical or desirable and others less so. The authors mostly agree on the advantages and disadvantages of each approach but weigh the relative rewards and costs differently. Downloads Read the full paper Authors Daniel L. BymanMichael DoranKenneth M. PollackSalman Shaikh Image Source: © Luke MacGregor / Reuters Full Article
v The Lesser of Two Evils: The Salafi Turn to Party Politics in Egypt By webfeeds.brookings.edu Published On :: Tue, 01 May 2012 00:00:00 -0400 Last winter, Salafi parties in Egypt proved themselves a formidable political force, winning a quarter of the vote in the country’s first elections in the post-Mubarak era. For many in Washington, the unexpected strength of Egypt’s conservative religious groups raised unsettling questions about the future of U.S.-Egyptian relations and America’s security interests in the region. Will the political success of Salafis turn Egypt into an anti-American power and strengthen jihadist groups like al-Qa’ida that are bent on using violence against the United States and its allies? In the Saban Center Middle East Memo, William McCants, a Middle East specialist at CNA and adjunct faculty at Johns Hopkins University, examines the implications of the Salafis’ turn to, and success in, electoral politics. McCants argues that while political participation may not moderate Salafis’ positions on social issues, it will likely erode the strength of their most extreme and violent affiliates. For this reason, America’s interests may be best served when Salafis play a role in post-revolution politics. Downloads The Lesser of Two Evils: The Salafi Turn to Party Politics in Egypt Authors William McCants Image Source: Mohamed Abd El Ghany / Reuters Full Article
v Unraveling the Syria Mess By webfeeds.brookings.edu Published On :: Wed, 08 Aug 2012 00:00:00 -0400 The Saban Center for Middle East Policy joined with the American Enterprise Institute and the Institute for the Study of War in June 2012 to host a one-day crisis simulation that explored the implications of spillover from the ongoing violence in Syria. The simulation examined how the United States and its allies might address worsening instability in Lebanon, Iraq, Jordan, Turkey, and elsewhere in the Middle East as a result of the internecine conflict in Syria. The Saban Center’s Middle East Memo, “Unraveling the Syria Mess: A Crisis Simulation of Spillover from the Syrian Civil War,” authored by simulation conveners Kenneth M. Pollack, Frederick W. Kagan, Kimberly Kagan, and Marisa C. Sullivan, presents key lessons and observations from the exercise. Among the key findings: A humanitarian crisis alone is unlikely to spur the international community to take action in Syria. Turkey is a linchpin in any effort to end the fighting in Syria, but Washington and Ankara may not see eye-to-eye on what the end game should be. U.S. history in Iraq and Lebanon make intervention there unlikely, even if spillover causes a renewal of large-scale violence. The simulation suggested a tension between U.S. political antipathy toward greater involvement in Syria and the potential strategic desirability of early action. Unraveling the Syria Mess Downloads Download the paper Video Unraveling the Syria Mess Authors Kenneth M. PollackFrederick W. KaganKimberly KaganMarisa C. Sullivan Image Source: © Stringer . / Reuters Full Article