b

An Abysmal Failure of Leadership

During times of crisis, the most effective leaders are those who can build solidarity by educating the public about its own interests. Sadly, in the case of COVID-19, the leaders of the world's two largest economies have gone in the opposite direction, all but ensuring that the crisis will deepen.




b

Africa in the news: Tunisia and Mozambique vote, Nigeria closes borders, and Kenya opens new railway

Tunisia and Mozambique vote: On Sunday, October 13, Tunisians participated in their run-off presidential elections between conservative former law professor Kais Saied and media magnate Nabil Karoui. Saied, known as “Robocop” for his serious presentation, won with 72.7 percent of the vote. Notably, Saied himself does not belong to a party, but is supported by…

       




b

No going back: How America and the Middle East can turn the page to a productive future

Ever since President Trump abruptly decided to withdraw troops from northern Syria, there’s been growing debate about the role of America in the Middle East. And there should be. This is a region that about 400 million souls call home. And it’s right on Europe’s doorstep. If we’ve learned anything since 9/11, it should be…

       




b

COVID in the Maghreb: Responses and impacts

       




b

Stepping Back from the Brink on Iran

Neither the United States nor Iran wants to go to war. That’s the good news. The bad news is that in the fog of crisis — similar in many ways to the fog of war — the danger of inadvertently stumbling into war is dangerously high.




b

Why is the United States So Bad at Foreign Policy?

Stephen Walt writes that the United States' unusual historical experience, geographic isolation, large domestic market, and general ignorance have weakened its ability to make viable foreign-policy strategies.




b

The Low-Yield Nuclear Warhead: A Dangerous Weapon Based on Bad Strategic Thinking

In the unintuitive world of nuclear weapons strategy, it’s often difficult to identify which decisions can serve to decrease the risk of a devastating nuclear conflict and which might instead increase it. Such complexity stems from the very foundation of the field: Nuclear weapons are widely seen as bombs built never to be used. Historically, granular—even seemingly mundane—decisions about force structure, research efforts, or communicated strategy have confounded planners, sometimes causing the opposite of the intended effect.




b

Accumulating Evidence Using Crowdsourcing and Machine Learning: A Living Bibliography about Existential Risk and Global Catastrophic Risk

The study of existential risk — the risk of human extinction or the collapse of human civilization — has only recently emerged as an integrated field of research, and yet an overwhelming volume of relevant research has already been published. To provide an evidence base for policy and risk analysis, this research should be systematically reviewed. In a systematic review, one of many time-consuming tasks is to read the titles and abstracts of research publications, to see if they meet the inclusion criteria. The authors show how this task can be shared between multiple people (using crowdsourcing) and partially automated (using machine learning), as methods of handling an overwhelming volume of research.




b

The Need for Creative and Effective Nuclear Security Vulnerability Assessment and Testing

Realistic, creative vulnerability assessment and testing are critical to finding and fixing nuclear security weaknesses and avoiding over-confidence. Both vulnerability assessment and realistic testing are needed to ensure that nuclear security systems are providing the level of protection required. Systems must be challenged by experts thinking like adversaries, trying to find ways to overcome them. Effective vulnerability assessment and realistic testing are more difficult in the case of insider threats, and special attention is needed. Organizations need to find ways to give people the mission and the incentives to find nuclear security weaknesses and suggest ways they might be fixed. With the right approaches and incentives in place, effective vulnerability assessment and testing can be a key part of achieving and sustaining high levels of nuclear security.




b

Secrecy, Public Relations and the British Nuclear Debate

The opening of the British archives has seen historians uncover the secrets of the UK's nuclear weapons programme since the 1990s. While a growing number have sought to expose these former secrets, there has been less effort to consider government secrecy itself. What was kept a secret, when and why? And how and why, notably from the 1980s, did the British government decide to officially disclose greater information about the British nuclear weapons programme to Members of Parliament, journalists, defence academics and the tax-paying general public. 




b

Budapest Memorandum at 25: Between Past and Future

On December 5, 1994, leaders of the United States, the United Kingdom, and the Russian Federation met in Budapest, Hungary, to pledge security assurances to Ukraine in connection with its accession to the Treaty on the Nonproliferation of Nuclear Weapons (NPT) as a non-nuclear-weapons state. The signature of the so-called Budapest Memorandum concluded arduous negotiations that resulted in Ukraine’s agreement to relinquish the world’s third-largest nuclear arsenal, which the country inherited from the collapsed Soviet Union, and transfer all nuclear warheads to Russia for dismantlement. The signatories of the memorandum pledged to respect Ukraine’s territorial integrity and inviolability of its borders, and to refrain from the use or threat of military force. Russia breached these commitments with its annexation of Crimea in 2014 and aggression in eastern Ukraine, bringing the meaning and value of security assurance pledged in the Memorandum under renewed scrutiny.

On the occasion of the 25th anniversary of the memorandum’s signature, the Project on Managing the Atom at the Belfer Center for Science & International Affairs at the Harvard Kennedy School, with the support of the Center for U.S.-Ukrainian Relations and the Harvard Ukrainian Research Institute, hosted a conference to revisit the history of the Budapest Memorandum, consider the repercussions of its violation for international security and the broader nonproliferation regime, and draw lessons for the future. The conference brought together academics, practitioners, and experts who have contributed to developing U.S. policy toward post-Soviet nuclear disarmament, participated in the negotiations of the Budapest Memorandum, and dealt with the repercussions of its breach in 2014. The conference highlighted five key lessons learned from the experience of Ukraine’s disarmament, highlighted at the conference.




b

Public Testimony on Trump Administration Funding for Nuclear Theft Preventing Programs

A nuclear explosion detonated anywhere by a terrorist group would be a global humanitarian, economic, and political catastrophe. The current COVID-19 pandemic reminds us not to ignore prevention of and preparation for low-probability, high-consequence disasters. For nuclear terrorism, while preparation is important, prevention must be the top priority. The most effective strategy for keeping nuclear weapons out of the hands of terrorists is to ensure that nuclear materials and facilities around the world have strong and sustainable security. Every president for more than two decades has made strengthening nuclear security around the globe a priority. This includes the Trump administration, whose 2018 Nuclear Posture Review states: “[n]uclear terrorism remains among the most significant threats to the security of the United States, allies, and partners.”




b

Living with Uncertainty: Modeling China's Nuclear Survivability

A simplified nuclear exchange model demonstrates that China’s ability to launch a successful nuclear retaliatory strike in response to an adversary’s nuclear first strike has been and remains far from assured. This study suggests that China’s criterion for effective nuclear deterrence is very low.




b

Poll: What the American Public Likes and Hates about Trump's Nuclear Policies

The authors conducted a study which highlights how the U.S. public as a whole and various demographic groups view President Donald Trump's positions on nuclear weapons.




b

Maxwell Taylor's Cold War: From Berlin to Vietnam

Nathaniel Moir reviews Maxwell Taylor's Cold War: From Berlin to Vietnam by Ingo Trauschweizer.




b

Defense Playbook for Campaigns

The 2018 National Defense Strategy (NDS) is predicated on a single organizing principle: America’s military pre-eminence is rapidly eroding. This is not a new concept. For years, experts have warned that the economic and technological advancements of U.S. adversaries, coupled with the 2008 financial crisis and America’s focus on peripheral conflicts, have caused a decline in America’s military dominance. 

In this context, the advances of near-peer competitors such as China and Russia have created plausible “theories of victory” in potential conflicts across Eastern Europe and East Asia. Competitors’ unaddressed improvements in strategic innovation, economic investment, and dual-use technology increases the risk of conflict and strains the U.S. alliance system. It is urgent that the United States reestablish and maintain credible deterrents against these near-peer competitors. After decades of focusing on post-Cold War ‘shaping’ operations, the American military needs to reinvigorate for full spectrum great power competition.

This report is intended as a blueprint on how to begin that process from graduate students at the Belfer Center for Science and International Affairs at Harvard University. Contained inside are 12 memorandums. Each provides a high-level overview and specific recommendations on a key issue of American defense policy. 




b

Breaking Down the Huawei v. Pentagon Dispute

If nothing else, the long-running Huawei situation shows the importance of considering the supply chain when it comes to cybersecurity. Huawei being the Chinese telecommunications equipment maker basically banned by the federal government. Bruce Schneier joins Host Tom Temin on Federal Drive.




b

COVID-19's Painful Lesson About Strategy and Power

Joseph Nye writes that while trade wars have set back economic globalization,  the environmental globalization represented by pandemics and climate change is unstoppable. Borders are becoming more porous to everything from drugs to infectious diseases to cyber terrorism, and the United States must use its soft power of attraction to develop networks and institutions that address these new threats.




b

An Interview with Bruce Schneier, Renowned Security Technologist

Bruce Schneier discusses current security technology concerns with The Politic's Eric Wallach.




b

No, the Coronavirus Will Not Change the Global Order

Joseph Nye advises skepticism toward claims that the pandemic changes everything. China won't benefit, and the United States will remain preeminent.




b

There's No Such Thing as Good Liberal Hegemony

Stephen Walt argues that as democracies falter, it's worth considering whether the United States made the right call in attempting to create a liberal world order.




b

This Virus Is Tough, but History Provides Perspective: The 1968 Pandemic and the Vietnam War

Nathaniel L. Moir recounts the events of 1968: The war in Vietnam and extensive civil unrest in the United States — and yet another big problem that made life harder. In 1968, the H3N2 pandemic killed more individuals in the United States than the combined total number of American fatalities during both the Vietnam and Korean Wars.




b

Poll: What the American Public Likes and Hates about Trump's Nuclear Policies

The authors conducted a study which highlights how the U.S. public as a whole and various demographic groups view President Donald Trump's positions on nuclear weapons.




b

Why Bernie Sanders Will Win in 2020, No Matter Who Gets Elected

Stephen Walt writes that even though Bernie Sanders is out of the presidential race, the time has come for many of the policies that he promoted: Universal Healthcare; Democratic Socialism; Income Redistribution; and Foreign Policy.




b

Maxwell Taylor's Cold War: From Berlin to Vietnam

Nathaniel Moir reviews Maxwell Taylor's Cold War: From Berlin to Vietnam by Ingo Trauschweizer.




b

Breaking the Ice: How France and the UK Could Reshape a Credible European Defense and Renew the Transatlantic Partnership

History is replete with irony, but rarely more poignantly than in the summer of 2016 when, on 23 June, the UK voted to leave the European Union and the next day, 24 June, the EU published its Global Strategy document asserting its ambition of “strategic autonomy.” Whither Franco-British defense cooperation in such chaotic circumstances? This paper attempts to provide the outline of an answer to that question.




b

The Economic Gains of Cloud Computing: An Address by Federal Chief Information Officer Vivek Kundra

Event Information

April 7, 2010
9:00 AM - 11:00 AM EDT

Falk Auditorium
The Brookings Institution
1775 Massachusetts Ave., NW
Washington, DC

Register for the Event

Cloud computing services over the Internet have the potential to spur a significant increase in government efficiency and decrease technology costs, as well as to create incentives and online platforms for innovation. Adoption of cloud computing technologies could lead to new, efficient ways of governing.

On April 7, the Brookings Institution hosted a policy forum that examines the economic benefits of cloud computing for local, state, and federal government. Federal Chief Information Officer Vivek Kundra delivered a keynote address on the role of the government in developing and promoting cloud computing. Brookings Vice President Darrell West moderated a panel of experts and detailed the findings in his paper, "Saving Money through Cloud Computing," which analyzes its governmental cost-savings potential.

After the program, panelists took audience questions.

Video

Audio

Transcript

Event Materials

     
 
 




b

Steps to Improve Cloud Computing in the Public Sector


Executive Summary

Government information technology is subject to a variety of rules, regulations, and procurement policies.  Computing is treated differently depending on whether the platform is based on desktops, laptops, mobile devices, or remote file servers known as cloud computing.  There are differences between the executive, legislative, and judicial branches of government, as well as in the level of privacy and security expected for various applications.  

Some people perceive higher security on desktop or laptop computers and lower security with the cloud because the latter’s information is stored remotely through third-party commercial providers.  In reality, though, there are serious security threats to all electronic information regardless of platform, and cloud server providers often take security more seriously than mass consumers or government officials employing weak passwords on their local computers. 

In this paper, I review current federal IT policy and discuss rules, practices, and procedures that limit innovation.  There are a variety of obstacles that make it difficult for policymakers to take full advantage of the technological revolution that has unfolded in recent years.  After outlining these issues, I make recommendations on policy changes required to improve the efficiency and effectiveness of federal computing. 

My specific recommendations include:

  1. Public officials should develop more consistent rules on computing across desktop, laptop, mobile, and cloud platforms.  
  2. The use of video, collaboration, and social networking should be authorized for congressional offices.  This would make legislative branch policy consistent with that of the executive branch.
  3. Judicial branch computing should be modernized, with greater emphasis on cloud computing. 
  4. There should be a more uniform certification process for federal agencies.  Right now, each agency is responsible for certifying its own applications.  It makes sense to have a “joint authorization board” with the power to review management services and certify particular products for use across the government. 
  5. Congress should update the Electronic Communications Privacy Act to change the process by which law enforcement agents obtain electronic information.  Instead of using a prosecutor’s subpoena, legislation should require a “probable cause” search warrant that is approved by a judge.  This would provide greater safeguards in terms of online content, pictures, geolocation data, and e-mails.
  6. Privacy rights should be placed on the same footing regardless of whether a person is using desktop or cloud computing.  It makes little sense to have weaker standards on one platform than another.  Consumers and government decision-makers expect the same level of protection whether they are accessing information on a desktop, laptop, mobile, or cloud storage system. 
  7. Congress should amend the Computer Fraud and Abuse Act to strengthen penalties for unwanted intrusion into computing systems.  The law has inconsistent penalties and prosecutors have found that it is hard to prosecute cyber-crimes. 
  8. Apps.gov represents a big step forward and government use should be expanded because it makes procurement easier and speeds public sector innovation.  It is a model of how the government can reinvent itself through digital technology in ways that improve efficiency and effectiveness.
  9. Countries need to harmonize their laws on cloud computing so as to reduce current inconsistencies in regard to privacy, data storage, security processes, and personnel training,  
  10. There should be mechanisms for data exchange that encourage portability across platforms.  We should avoid vendor lock-in that precludes data exchange.
  11. Data on uptime, downtime, recover time, archiving, and maintenance schedules would help build public trust by providing information on computing performance.

Downloads

Authors

Image Source: Martin Barraud
     
 
 




b

Moving to the Cloud: How the Public Sector Can Leverage the Power of Cloud Computing

Event Information

July 21, 2010
10:00 AM - 12:00 PM EDT

Falk Auditorium
The Brookings Institution
1775 Massachusetts Ave., NW
Washington, DC

Register for the Event

The U.S. government spends billions of dollars each year on computer hardware, software and file servers that may no longer be necessary. Currently, the public sector makes relatively little use of cloud computing, even though studies suggest substantial government savings from a migration to more Internet-based computing with shared resources.

On July 21, the Center for Technology Innovation at Brookings hosted a policy forum on steps to enhance public sector adoption of cloud computing innovations. Brookings Vice President Darrell West moderated a panel of experts, including David McClure of the General Services Administration, Dawn Leaf of the National Institute for Standards and Technology, and Katie Ratte of the Federal Trade Commission. West released a paper detailing the policy changes required to improve the efficiency and effectiveness of federal computing.

Audio

Transcript

Event Materials

     
 
 




b

Technology and the Federal Government: Recommendations for the Innovation Advisory Board


Our former Brookings colleague Rebecca Blank, now at the Commerce Department, is today leading the first meeting of the Obama Administration’s Innovation Advisory Board, looking at the innovative capacity and economic competitiveness of the United States.

I applaud the effort.  Nothing is more important to America’s longterm competitiveness than emphasizing innovation.  As the council looks to the private sector and global markets, I urge it to examine how the U.S. government can lead innovation and contribute to economic growth.  The best place to look is new and emerging digital technologies that can make government more accessible, accountable, responsive and efficient for the people who use government services every day.

Here are some of the recommendations I made in a recent paper I wrote with colleagues here at Brookings as part of our “Growth Through Innovation” initiative:

  • Save money and gain efficiency by moving federal IT functions “to the cloud,” i.e., using advances in cloud computing to put software, hardware, services and data storage through remote file servers.

  • Continue to prioritize the Obama administration’s existing efforts to put unparalleled amounts of data online at Data.gov and other federal sites, making it easier and cheaper for citizens and businesses to access the information they need.

  • Use social media networks to deliver information to the public and to solicit feedback to improve government performance.

  • Integrate ideas and operations with state and local organizations, where much of government innovation is taking place today. 

  • Apply the methods of private-sector business planning to the public sector to produce region-specific business plans that are low cost and high impact.

These improvements in government services innovations in the digital age can help spur innovation and support a robust business climate.  And, as a sorely needed side benefit, they can also serve to eliminate some of the current distrust and even contempt for government that has brought public approval of the performance of the federal government to near historic lows.  



Authors

Image Source: © Mario Anzuoni / Reuters
     
 
 




b

A Crime Wave in Cyberspace

Listen to the chatter from top officials, and you’d think that World War III was about to break out on the Internet. The defense secretary is warning about a digital “Pearl Harbor.” Former director of national intelligence Mike McConnell declares that the United States is “fighting a cyber war, and we’re losing.” Every new hack brings more pronouncements of network doom.

The scare talk, however, is misplaced. Yes, we’re facing enormous cybersecurity problems — just look at the high-profile penetrations of such companies as Sony and Lockheed or the millions of Americans whose personal information has been stolen online.

But these aren’t signs of some impending cataclysmic showdown as I explain in my new cybersecurity paper for The Brookings Institution. They’re markers of a rising tide of online crime that, in its own way, could be more dangerous than a cyberwar. According to the British government, online thieves, scammers and industrial spies cost U.K. businesses an estimated $43.5 billion in the past year alone. Crooks-for-hire will infect a thousand computers for $7 — that’s how simple it’s become. Sixty thousand new malicious software variants are detected every day. Forget “Pearl Harbor”; if we’re not careful, the Internet could be in danger of looking like the South Bronx circa 1989 – a place where crooks hold such sway that honest people find it hard to live or work there.

Could there be some online conflict in the future? Maybe. But crooks are draining billions from the legitimate global economy right now. Even the Pentagon’s specialists are worried, noting in their new cybersecurity strategy that “the tools and techniques developed by cyber criminals are increasing in sophistication at an incredible rate.”

Those tools also are becoming easier to use. The latest crimeware makes stealing passwords about as simple as setting up Web pages. One gang, recently arrested, used it to drain $9.5 million in just three months.

Read the full article at washingtonpost.com >>

Authors

Publication: The Washington Post
      
 
 




b

Riding the Mobile Wave: The Future of Mobile Computing


Event Information

October 5, 2012
10:00 AM - 11:30 AM EDT

Falk Auditorium
Brookings Institution
1775 Massachusetts Avenue NW
Washington, DC 20036

Register for the Event

In his new book The Mobile Wave: How Mobile Intelligence Will Change Everything (Vanguard Press, 2012), CEO of MicroStrategy Michael Saylor examines the transformative possibilities of mobile computing on business, society, economies and everyday life. Saylor argues that mobile technologies such as smartphones and tablet computers – “the fifth wave of computer technology” – will be indispensible tools for modern life and completely alter how we live.

On October 5, the Center for Technology Innovation at Brookings hosted a forum on mobile computing and its monumental impact on our future. Moderated by Vice President Darrell West, Michael Saylor discussed key highlights from his book and offered insights as to what sort of change we can expect from the macro level down to the most mundane of everyday humans tasks.

 

Audio

Transcript

Event Materials

      
 
 




b

Bridging Transatlantic Differences on Data and Privacy After Snowden


“Missed connections” is the personals ads category for people whose encounters are too fleeting to form any union – a lost-and-found for relationships.  I gave that title to my paper on the conversation between the United States and for Europe on data, privacy, and surveillance because I thought it provides an apt metaphor for the hopes and frustrations on both sides of that conversation.

The United States and Europe are linked by common values and overlapping heritage, an enduring security alliance, and the world’s largest trading relationship.  Europe has become the largest crossroad of the Internet and the transatlantic backbone is the global Internet’s highest capacity route.

[I]

But differences in approaches to the regulation of the privacy of personal information threaten to disrupt the vast flow of information between Europe and the U.S.  These differences have been exacerbated by the Edward Snowden disclosures, especially stories about the PRISM program and eavesdropping on Chancellor Angela Merkel’s cell phone.  The reaction has been profound enough to give momentum to calls for suspension of the “Safe Harbor” agreement that facilitates transfers of data between the U.S. Europe; and Chancellor Merkel, the European Parliament, and other EU leaders who have called for some form of European Internet that would keep data on European citizens inside EU borders.  So it can seem like the U.S. and EU are gazing at each other from trains headed in opposite directions.

My paper went to press before last week’s European Court of Justice ruling that Google must block search results showing that a Spanish citizen had property attached for debt several years ago.  What is most startling about the decision is this information was accurate and had been published in a Spanish newspaper by government mandate but – for these reasons – the newspaper was not obligated to remove the information from its website; nevertheless, Google could be required to remove links to that website from search results in Spain. That is quite different from the way the right to privacy has been applied in America.  The decision’s discussion of search as “profiling” bears out what the paper says about European attitudes toward Google and U.S. Internet companies.  So the decision heightens the differences between the U.S. and Europe.

Nonetheless, it does not have to be so desperate.  In my paper, I look at the issues that have divided the United States and Europe when it comes to data and the things they have in common, the issues currently in play, and some ways the United States can help to steer the conversation in the right direction.

[I] "Europe Emerges as Global Internet Hub," Telegeography, September 18, 2013.


Image Source: © Yves Herman / Reuters
      
 
 




b

Missed Connections: Talking With Europe About Data, Privacy, and Surveillance


The United States exports digital goods worth hundreds of billions of dollars across the Atlantic each year.  And both Silicon Valley and Hollywood do big business with Europe every year.  Differences in approaches to privacy have always made this relationship unsteady but the Snowden disclosures greatly complicated the prospects of a Transatlantic Trade and Investment Partnership.  In this paper Cameron Kerry examines that politics of transatlantic trade and the critical role that U.S. privacy policy plays in these conversations.

Kerry relies on his experience as the U.S.’s chief international negotiator for privacy and data regulation to provide an overview of key proposals related to privacy and data in Europe.  He addresses the possible development of a European Internet and the current regulatory regime known as Safe Harbor. Kerry argues that America and Europe have different approaches to protecting privacy both which have strengths and weaknesses.

To promote transatlantic trade the United states should:

  • Not be defensive about its protection of privacy
  • Provide clear information to the worldwide community about American law enforcement surveillance
  • Strengthen its own privacy protection
  • Focus on the importance of trade to the American and European economies

Downloads

Image Source: © Francois Lenoir / Reuters
      
 
 




b

Assessing the Obstacles and Opportunities in a Future Israeli-Syrian-American Peace Negotiation

Introduction:

In the ebb and flow of Middle East diplomacy, the two interrelated issues of an Israeli-Syrian peace settlement and Washington’s bilateral relationship with Damascus have gone up and down on Washington’s scale of importance. The election of Barack Obama raised expectations that the United States would give the two issues the priority they had not received during the eight years of the George W. Bush administration. Candidate Obama promised to assign a high priority to the resuscitation of the Arab-Israeli peace process, and separately to “engage” with Iran and Syria (as recommended by the Iraq Study Group in 2006).

In May 2009, shortly after assuming office, President Obama sent the assistant secretary of state for Near Eastern affairs, Jeffrey Feltman, and the senior director for the Middle East in the National Security Council, Daniel Shapiro, to Damascus to open a dialogue with Bashar al-Asad’s regime. Several members of Congress also travelled to Syria early in Obama’s first year, including the chairman of the Senate Committee on Foreign Relations, John Kerry, and the chairman of the House Committee on Foreign Affairs, Howard Berman. In addition, when the president appointed George Mitchell as special envoy to the Middle East, Mitchell named as his deputy Fred Hof, a respected expert on Syria and the Israeli-Syrian dispute. Last summer, both Mitchell and Hof visited Damascus and began their give and take with Syria.

And yet, after this apparent auspicious beginning, neither the bilateral relationship between the United States and Syria, nor the effort to revive the Israeli-Syrian negotiation has gained much traction. Damascus must be chagrined by the fact that when the Arab-Israeli peace process is discussed now, it is practically equated with the Israeli-Palestinian track. This paper analyzes the difficulties confronting Washington’s and Jerusalem’s respective Syria policies and offers an approach for dealing with Syria. Many of the recommendations stem from lessons resulting from the past rounds of negotiations, so it is important to understand what occurred.

Downloads

Authors

  • Itamar Rabinovich
     
 
 




b

Recalibrating the Egypt-Israel Relationship


Introduction:

There is an Egyptian proverb that says those who worry about demons will tend to run into them. Like much folk wisdom, it has solid psychological foundations; the likelihood of a problem rearing its head often appears to be exacerbated by constantly fretting about it. Ever since Hosni Mubarak stepped down as president of Egypt on February 11, 2011, the demon named “Now What?” has been keeping the Israeli government up at night. On August 18, it finally leapt up at them.

That day, a group of armed men attacked Israeli buses, as well as civilian and military vehicles north of Eilat, near the Egyptian border. Eight Israelis, both civilians and soldiers, were killed. The Israel Defense Forces (IDF) set off in hot pursuit, shooting at the attackers from a helicopter. The helicopter crew either failed to notice, or ignored, that they were shooting over the Egyptian side of the border. In the pursuit, three Egyptians— an officer and two enlisted men—were killed and another three later died of their wounds. Israeli minister of defense Ehud Barak, while blaming Palestinian groups for the assault, made comments to the effect that the attacks were largely Egypt’s fault as there had been a major security collapse in Egypt since the former regime had been ousted six months earlier.

The way matters unfolded over the next few days pointedly illustrated the answer to a question that had been asked repeatedly both by international media and the Israeli government since Hosni Mubarak’s ouster: What did Egypt’s January 25 Revolution mean for Israel? The simplest answer is that it is no longer business as usual. The relationship between Egypt and Israel has changed and both countries will have to navigate new waters carefully and wisely.

Downloads

Image Source: � Asmaa Waguih / Reuters
     
 
 




b

Thinking the Unthinkable: The Gulf States and The Prospect of A Nuclear Iran


Introduction

The issue of Iran has become a central preoccupation for the international community in recent months, thanks to the intersection of the historic changes in the region, an American presidential election, sharpening rhetoric from Israel, and Tehran’s relentless determination to advance its nuclear capabilities. The focus of policymakers in Washington and around the world remains fixed on the options for forestalling Iran’s determined march toward a nuclear weapons capability. This is the appropriate objective; the best possible outcome for maintaining peace and security in the Gulf and avoiding a deeply destabilizing nuclear arms race remains a credible, durable solution that curtails Iran’s nuclear ambitions. And while achieving such an outcome remains profoundly problematic, largely as a result of Tehran’s intransigence, preventing Iran from crossing the nuclear weapons threshold—either through persuasion, coercion, or some combination of the two—remains fully and unambiguously within the capabilities of the international community.

The shadow cast by Tehran has created a particularly intense sense of existential anxiety for the smaller Gulf states, including Kuwait, Bahrain, the United Arab Emirates, Qatar, and Oman. After all, these are the same states whose civil orders were repeatedly disrupted by Iranian subversion and sponsorship of terrorism during the first decade after Iran’s Islamic revolution, and whose thriving economies rely on unimpeded access to the global commons. The events of the past decade have only exacerbated the smaller Gulf states’ endemic sense of insecurity. Iran has achieved a synergistic, sometimes even parasitic, relationship with the leadership of post-Saddam Iraq that, together with Tehran’s longstanding relationships with Syria and Lebanese Hizballah, greatly enables its bid for predominance in the heart of the Middle East. Today, the uncertainties surrounding the implications of regional flux have left Tehran simultaneously weakened and emboldened—a particularly dangerous combination for this particular array of Iranian leaders.

With Iran’s nuclear program advancing by the month and its efforts to tilt the regional balance in its favor growing more forceful, the small states of the Persian Gulf must face the distinct dilemma of preparing for the possible worst-case scenario of the nuclearization of their neighborhood, while participating ever more robustly in the international efforts to preclude that very possibility. In some respects, the Gulf states’ situation is unique. Unlike Israel, another small state that perceives an existential threat from Iran, the Gulf states cannot fall back upon either a presumptive nuclear deterrent or a primordial bond to the body politic of the world’s only remaining superpower. And in contrast to Iran’s other neighbors, the vast resources and history of ideological and territorial disputes between the Gulf states and Tehran significantly intensify the stakes. Even before the Gulf became the vital transportation corridor for global energy, the fault line in the regional balance of power had always run between the northern states and their southern rivals. The mere possibility that the north may gain a nuclear advantage is reshaping the security environment for Iran’s neighbors in the Gulf.

Because the threat of Iran looms large, the exigency of considering the widest possible array of alternative prospects for the evolution of this protracted crisis is important. This paper tackles the scenarios that successive American presidents have deemed unacceptable—an Iranian development or acquisition of a nuclear weapons capability or of nuclear weapons themselves—and the implications that such scenarios would have for the global nonproliferation regime and regional security, with a particular focus on the special challenges faced by Iran’s southern neighbors. To protect against threats along their borders, the Gulf states have traditionally hedged their bets by seeking balanced relations with their more powerful neighbors while cultivating extra-regional allies. That formula is already changing, as evidenced by a new assertiveness in Gulf states’ postures toward Tehran and a new creativity in deploying strategies for deterring and mitigating Iran’s efforts to extend its influence and/or destabilize its neighbors. The Gulf states must transform this tactical innovation into a full-fledged new hedging policy: one that deploys every possible tool to prevent a nuclear Iran while taking every possible step to prepare for such an eventuality.

Download » (PDF)

Downloads

Authors

Image Source: © Morteza Nikoubazl / Reuters
      
 
 




b

The End of Sykes-Picot? Reflections on the Prospects of the Arab State System


During much of the past three years, the Syrian civil war has been the most prominent item on the Middle Eastern political agenda and has dominated the political-diplomatic discourse in the region and among policy makers, analysts and pundits interested in its affairs. 

Preoccupation with the Syrian crisis has derived from the sense, apparent since its early phases, that it was much more than a domestic issue. It has, indeed, become a conflict by-proxy between Iran and its regional rivals and the arena of American-Russian competition. It has also had a spillover effect on several neighboring countries and has been a bellwether for the state of the Arab Spring.

As the conflict festered it also prompted a broader discussion and debate over the future of the Arab State system. The collapse of Syria, the ongoing fighting in Iraq, and the general instability in the Middle East has led some observers to question whether the very geography of the region will be changed. Robin Wright, a journalist and scholar at the Woodrow Wilson International Center for Scholars, argues that “the map of the modern Middle East, a political and economic pivot in the international order, is in tatters.” Wright also warns that competing groups and ideologies are pulling the region apart: “A different map would be a strategic game changer for just about everybody, potentially reconfiguring alliances, security challenges, trade and energy flows for much of the world, too.”  Similarly, Parag Khanna, a senior fellow at the New America Foundation, argues, “Nowhere is a rethinking of “the state” more necessary than in the Middle East.” He contends that “The Arab world will not be resurrected to its old glory until its map is redrawn to resemble a collection of autonomous national oases linked by Silk Roads of commerce.” Lt. Colonel Joel Rayburn, writing from the Hoover Institution, points out that the alternative may not be new states but rather simply collapse. “If watching the fall or near-fall of half a dozen regimes in the Arab Spring has taught us anything, it should be that the Arab states that appeared serenely stable to outsiders for the past half century were more brittle than we have understood,” warning darkly, “This conflict could very well touch us all, perhaps becoming an engine of jihad that spews forth attackers bent on bombing western embassies and cities or disrupting Persian Gulf oil markets long before the fire burns out.” 

This discussion touches on a key question: Will the collapse of one or several other Arab states produce a new order in the region? 

The regional order has been threatened before, but today’s challenge is unique. Syria is what has prompted the latest reevaluation of the Skyes-Picot borders, but many of the problems predated the Syrian civil war. Ambitious monarchs in the 1930s and 1940s challenged the order after the colonial period. The doctrine of Pan-Arab Nationalism and Gamal Abd al-Nasir’s messianic leadership in the 1950s and by Saddam Hussein in 1990 again posed a threat. Now it is now challenged not by a powerful state or a sweeping ideology but by the weakness of several Arab states that seem to be on the verge of implosion or disintegration.

This paper assesses the situation in Syria, with an emphasis on what might lead to its de facto partition or lasting collapse. It then examines Syria’s neighbors and their prospects for stability. The paper concludes by exploring how the United States, Israel and Iran might affect this tenuous balance.

Downloads

Image Source: © Muzaffar Salman / Reuters
      
 
 




b

Webinar: What role will the Army play in great power competition after COVID-19?

Two years after the National Defense Strategy was published, it’s time to take stock of where the Army stands. On an immediate level, the age of COVID-19 presents the Army with an unprecedented set of challenges. From ensuring high levels of readiness to keeping up recruitment, the pandemic has forced the Army to adapt quickly…

       




b

Webinar: A conversation with Secretary of Defense Mark T. Esper

The COVID-19 pandemic is among the most serious challenges confronting the globe since World War II. Its projected human and economic costs are devastating. While the armed forces of the United States will rise to this challenge as they have others, the Department of Defense will not stop planning for long-term threats to America's security,…

       




b

Webinar: Space junk—Addressing the orbital debris challenge

Decades of space activity have littered Earth’s orbit with orbital debris, popularly known as space junk. Objects in orbit include spent rocket bodies, inactive satellites, a wrench, and even a toothbrush. The current quantity and density of man-made debris significantly increases the odds of future collisions either as debris damages space systems or as colliding…

       




b

Webinar: Policing in the era of COVID-19

The consequences of the novel coronavirus pandemic stretch across the entirety of government services. Major police agencies have reported absentee rates as high as 20% due to officers who are either themselves afflicted with the virus or in need of self-quarantine. Reported crimes are generally down in America’s cities as a result of the many…

       




b

Figure of the week: Poverty and health care SDG projections in sub-Saharan Africa

On January 8, the Africa Growth Initiative at Brookings released its annual Foresight Africa publication. This year’s special edition focuses on six key priorities for the next decade. The first chapter, Achieving the Sustainable Development Goals: The state of play and policy options, highlights recent progress and challenges facing the continent in achieving Agenda 2030. In his essay,…

       




b

Who gained from global growth last decade—and who will benefit by 2030?

Around the world, household final consumption expenditure rose by $18.2 trillion in 2011 PPP terms between 2010 and 2020, from $46.5 trillion to $64.8 trillion. This growth, averaging about 3.3 percent per year, was the same as the average growth over the previous forty years—a bit better than growth in the first decade of this…

       




b

The World Bank steps up on fragility and conflict: Is it asking the right questions?

At the beginning of this century, about one in four of the world's extreme poor lived in fragile and conflict affected situations (FCS). By the end of this year, FCS will be home to the majority of the world's extreme poor. Increasingly, we live in a "two-speed world." This is the key finding of a…

       




b

To end global poverty, invest in peace

Most of the world is experiencing a decrease in extreme poverty, but one group of countries is bucking this trend: Poverty is becoming concentrated in countries marked by conflict and fragility. New World Bank estimates show that on the current trajectory by 2030, up to two-thirds of the extreme poor worldwide will be living in…

       




b

What do we know about poverty in North Korea?

       




b

Turning back the Poverty Clock: How will COVID-19 impact the world’s poorest people?

The release of the IMF’s World Economic Outlook provides an initial country-by-country assessment of what might happen to the world economy in 2020 and 2021. Using the methods described in the World Poverty Clock, we ask what will happen to the number of poor people in the world—those living in households with less than $1.90…

       




b

Webinar: The impact of COVID-19 on prisons

Across America, incarcerated people are being hit hard by COVID-19. The infection rate in Washington, D.C., jails is 14 times higher than the general population of the city. In one Michigan correctional facility, more than 600 incarcerated people have tested positive — almost 50% of the prison's total population. In Arkansas, about 40% of the…

       




b

Destroying trust in the media, science, and government has left America vulnerable to disaster

For America to minimize the damage from the current pandemic, the media must inform, science must innovate, and our government must administer like never before. Yet decades of politically-motivated attacks discrediting all three institutions, taken to a new level by President Trump, leave the American public in a vulnerable position. Trump has consistently vilified the…