y

The United States Forgot Its Strategy for Winning Cold Wars

Stephen Walt writes that arguments against U.S. offshore balancing misunderstand history. The strategy that worked against the Soviet Union can work against China.




y

Maxwell Taylor's Cold War: From Berlin to Vietnam

Nathaniel Moir reviews Maxwell Taylor's Cold War: From Berlin to Vietnam by Ingo Trauschweizer.




y

The Economic Gains of Cloud Computing: An Address by Federal Chief Information Officer Vivek Kundra

Event Information

April 7, 2010
9:00 AM - 11:00 AM EDT

Falk Auditorium
The Brookings Institution
1775 Massachusetts Ave., NW
Washington, DC

Register for the Event

Cloud computing services over the Internet have the potential to spur a significant increase in government efficiency and decrease technology costs, as well as to create incentives and online platforms for innovation. Adoption of cloud computing technologies could lead to new, efficient ways of governing.

On April 7, the Brookings Institution hosted a policy forum that examines the economic benefits of cloud computing for local, state, and federal government. Federal Chief Information Officer Vivek Kundra delivered a keynote address on the role of the government in developing and promoting cloud computing. Brookings Vice President Darrell West moderated a panel of experts and detailed the findings in his paper, "Saving Money through Cloud Computing," which analyzes its governmental cost-savings potential.

After the program, panelists took audience questions.

Video

Audio

Transcript

Event Materials

     
 
 




y

Privacy and Security in the Cloud Computing Age


Event Information

October 26, 2010
10:00 AM - 11:30 AM EDT

Falk Auditorium
The Brookings Institution
1775 Massachusetts Ave., NW
Washington, DC

Register for the Event

Although research suggests that considerable efficiencies can be gained from cloud computing technology, concerns over privacy and security continue to deter government and private-sector firms from migrating to the cloud. By its very nature, storing information or accessing services through remote providers would seem to raise the level of privacy and security risks. But is such apprehension warranted? What are the real security threats posed to individuals, business and government by cloud computing technologies? Do the cost-saving benefits outweigh the dangers?

On October 26, the Brookings Institution hosted a policy forum on the privacy and security challenges raised by cloud computing. Governance Studies Director Darrell West moderated a panel of technology industry experts examining how cloud computing systems can generate innovation and cost savings without sacrificing privacy and security. West will also present findings from his forthcoming paper “Privacy, Security, and Innovation in Cloud Computing.”

After the program, panelists took audience questions.

Transcript

Event Materials

     
 
 




y

Privacy and Security in Cloud Computing


Executive Summary

Cloud computing can mean different things to different people, and obviously the privacy and security concerns will differ between a consumer using a public cloud application, a medium-sized enterprise using a customized suite of business applications on a cloud platform, and a government agency with a private cloud for internal database sharing (Whitten, 2010). The shift of each category of user to cloud systems brings a different package of benefits and risks.

What remains constant, though, is the tangible and intangible value that the user seeks to protect. For an individual, the value at risk can range from loss of civil liberties to the contents of bank accounts. For a business, the value runs from core trade secrets to continuity of business operations and public reputation. Much of this is hard to estimate and translate into standard metrics of value (Lev, 2003) The task in this transition is to compare the opportunities of cloud adoption with the risks. The benefits of cloud have been discussed elsewhere, to the individual to the enterprise, and to the government (West, 2010a, 2010b).

This document explores how to think about privacy and security on the cloud. It is not intended to be a catalog of cloud threats (see ENISA (2009) for an example of rigorous exploration of the risks of cloud adoption to specific groups). We frame the set of concerns for the cloud and highlight what is new and what is not. We analyze a set of policy issues that represent systematic concerns deserving the attention of policy-makers. We argue that the weak link in security generally is the human factor and surrounding institutions and incentives matter more than the platform itself. As long as we learn the lessons of past breakdowns, cloud computing has the potential to generate innovation without sacrificing privacy and security (Amoroso, 2006; Benioff, 2009).

Downloads

Image Source: Jupiterimages
     
 
 




y

The Terms They Are A-Changin'...: Watching Cloud Computing Contracts Take Shape


EXECUTIVE SUMMARY

Many web services are examples of cloud computing, from storage and backup sites such as Flickr and Dropbox to online business productivity services such as Google Docs and Salesforce.com. Cloud computing offers a potentially attractive solution to customers keen to acquire computing infrastructure without large up-front investment, particularly in cases where their demand may be variable and unpredictable, as a means of achieving financial savings, productivity improvements and the wider flexibility that accompanies Internet-hosting of data and applications.

The greater flexibility of a cloud computing service as compared with a traditional outsourcing contract may be offset by reduced certainty for the customer in terms of the location of data placed into the cloud and the legal foundations of any contract with the provider. There may be unforeseen costs and risks hidden in the terms and conditions of such services.

This document reports on a detailed survey and analysis of the terms and conditions offered by cloud computing providers.

The survey formed part of the Cloud Legal Project at the Centre for Commercial Law Studies (CCLS), within the School of Law at Queen Mary, University of London, UK. Funded by a donation from Microsoft, but academically independent, the project is examining a wide range of legal and regulatory issues arising from cloud computing. The project's survey of 31 cloud computing contracts from 27 different providers, based on their standard terms of service as offered to customers in the E.U. and U.K., found that many include clauses that could have a significant impact, often negative, on the rights and interests of customers. The ease and convenience with which cloud computing arrangements can be set up may lull customers into overlooking the significant issues that can arise when key data and processes are entrusted to cloud service providers. The main lesson to be drawn from the Cloud Legal Project’s survey is that customers should review the terms and conditions of a cloud service carefully before signing up to it.

The survey found that some contracts, for instance, have clauses disclaiming responsibility for keeping the user’s data secure or intact. Others reserve the right to terminate accounts for apparent lack of use (potentially important if they are used for occasional backup or disaster recovery purposes), for violation of the provider’s Acceptable Use Policy, or indeed for any or no reason at all. Furthermore, whilst some providers promise only to hand over customer data if served with a court order, others state that they will do so on much wider grounds, including it simply being in their own business interests to disclose the data. Cloud providers also often exclude liability for loss of data, or strictly limit the damages that can be claimed against them – damages that might otherwise be substantial if a failure brought down an e-commerce web site.

Although in some U.S. states, in E.U. countries and in various other jurisdictions the validity of such terms may be challenged under consumer protection laws, users of cloud services may face practical obstacles to bringing a claim for data loss or privacy breach against a provider that seems local online but is, in fact, based in another continent. Indeed, service providers usually claim that their contracts are subject to the laws of the place where they have their main place of business. In many cases this is a US state, with a stipulation that any dispute must be heard in the provider’s local courts, regardless of the customer’s location.

Perhaps the most disconcerting discovery of the Cloud Legal Project’s survey was that many providers claimed to be able to amend their contracts unilaterally, simply by posting an updated version on the web. In effect, customers are put on notice to download lengthy and complex contracts, on a regular basis, and to compare them against their own copies of earlier versions to look for changes.

The cloud computing market is still developing rapidly, and potential cloud customers should be aware that there may be a mismatch between their expectations and the reality of cloud providers' service terms, and be alive to the possibility of unexpected changes to the terms.

Downloads

Authors

  • Simon Bradshaw
  • Christopher Millard
  • Ian Walden
Image Source: Natalie Racioppa
     
 
 




y

Technology and the Federal Government: Recommendations for the Innovation Advisory Board


Our former Brookings colleague Rebecca Blank, now at the Commerce Department, is today leading the first meeting of the Obama Administration’s Innovation Advisory Board, looking at the innovative capacity and economic competitiveness of the United States.

I applaud the effort.  Nothing is more important to America’s longterm competitiveness than emphasizing innovation.  As the council looks to the private sector and global markets, I urge it to examine how the U.S. government can lead innovation and contribute to economic growth.  The best place to look is new and emerging digital technologies that can make government more accessible, accountable, responsive and efficient for the people who use government services every day.

Here are some of the recommendations I made in a recent paper I wrote with colleagues here at Brookings as part of our “Growth Through Innovation” initiative:

  • Save money and gain efficiency by moving federal IT functions “to the cloud,” i.e., using advances in cloud computing to put software, hardware, services and data storage through remote file servers.

  • Continue to prioritize the Obama administration’s existing efforts to put unparalleled amounts of data online at Data.gov and other federal sites, making it easier and cheaper for citizens and businesses to access the information they need.

  • Use social media networks to deliver information to the public and to solicit feedback to improve government performance.

  • Integrate ideas and operations with state and local organizations, where much of government innovation is taking place today. 

  • Apply the methods of private-sector business planning to the public sector to produce region-specific business plans that are low cost and high impact.

These improvements in government services innovations in the digital age can help spur innovation and support a robust business climate.  And, as a sorely needed side benefit, they can also serve to eliminate some of the current distrust and even contempt for government that has brought public approval of the performance of the federal government to near historic lows.  



Authors

Image Source: © Mario Anzuoni / Reuters
     
 
 




y

A Crime Wave in Cyberspace

Listen to the chatter from top officials, and you’d think that World War III was about to break out on the Internet. The defense secretary is warning about a digital “Pearl Harbor.” Former director of national intelligence Mike McConnell declares that the United States is “fighting a cyber war, and we’re losing.” Every new hack brings more pronouncements of network doom.

The scare talk, however, is misplaced. Yes, we’re facing enormous cybersecurity problems — just look at the high-profile penetrations of such companies as Sony and Lockheed or the millions of Americans whose personal information has been stolen online.

But these aren’t signs of some impending cataclysmic showdown as I explain in my new cybersecurity paper for The Brookings Institution. They’re markers of a rising tide of online crime that, in its own way, could be more dangerous than a cyberwar. According to the British government, online thieves, scammers and industrial spies cost U.K. businesses an estimated $43.5 billion in the past year alone. Crooks-for-hire will infect a thousand computers for $7 — that’s how simple it’s become. Sixty thousand new malicious software variants are detected every day. Forget “Pearl Harbor”; if we’re not careful, the Internet could be in danger of looking like the South Bronx circa 1989 – a place where crooks hold such sway that honest people find it hard to live or work there.

Could there be some online conflict in the future? Maybe. But crooks are draining billions from the legitimate global economy right now. Even the Pentagon’s specialists are worried, noting in their new cybersecurity strategy that “the tools and techniques developed by cyber criminals are increasing in sophistication at an incredible rate.”

Those tools also are becoming easier to use. The latest crimeware makes stealing passwords about as simple as setting up Web pages. One gang, recently arrested, used it to drain $9.5 million in just three months.

Read the full article at washingtonpost.com >>

Authors

Publication: The Washington Post
      
 
 




y

New Federal Government CIO is Key to Improving Government Performance


The appointment of new federal chief information officer Steven VanRoekel comes at a challenging time for President Barack Obama. The national economy continues to be weak. Congress plans to cut trillions from the federal budget. And in the time leading up to the 2012 election, American voters remain cynical about the ability of the government to address important policy problems in an effective manner.

In an era of deficit reduction and public cynicism, the tasks facing federal officials are to determine how to do more with less and persuade voters the government can become smarter and more effective. There are going to be fewer dollars for virtually every federal program so it is important to figure how ways to innovate and perform more efficiently.

Former CIO Vivek Kundra sought to do this through encouraging agencies to move software applications to the cloud, consolidating federal data centers, improving transparency, and improving the information technology procurement process. It is important to continue this progress even as agencies are forced to downsize their operations.

As shown in the private sector, government administrators should use technology to cut costs, improve worker productivity, and streamline operations. This is not just a matter of using technology in more innovative ways, but changing the operations and culture of the public sector. Public officials must improve its data mining activities to identify fraud and abuse in Medicare, Medicaid, the Defense Department, and other domestic programs.

New software gives managers better tools to evaluate how money is being spent and whether it is fulfilling intended goals. If it is not, programs need to be modified or eliminated. The most important weapon in Mr. VanRoekel’s arsenal may be the scalpel as he goes through the federal government’s $80 billion IT budget.

Authors

Image Source: © Hyungwon Kang / Reuters
      
 
 




y

Bridging Transatlantic Differences on Data and Privacy After Snowden


“Missed connections” is the personals ads category for people whose encounters are too fleeting to form any union – a lost-and-found for relationships.  I gave that title to my paper on the conversation between the United States and for Europe on data, privacy, and surveillance because I thought it provides an apt metaphor for the hopes and frustrations on both sides of that conversation.

The United States and Europe are linked by common values and overlapping heritage, an enduring security alliance, and the world’s largest trading relationship.  Europe has become the largest crossroad of the Internet and the transatlantic backbone is the global Internet’s highest capacity route.

[I]

But differences in approaches to the regulation of the privacy of personal information threaten to disrupt the vast flow of information between Europe and the U.S.  These differences have been exacerbated by the Edward Snowden disclosures, especially stories about the PRISM program and eavesdropping on Chancellor Angela Merkel’s cell phone.  The reaction has been profound enough to give momentum to calls for suspension of the “Safe Harbor” agreement that facilitates transfers of data between the U.S. Europe; and Chancellor Merkel, the European Parliament, and other EU leaders who have called for some form of European Internet that would keep data on European citizens inside EU borders.  So it can seem like the U.S. and EU are gazing at each other from trains headed in opposite directions.

My paper went to press before last week’s European Court of Justice ruling that Google must block search results showing that a Spanish citizen had property attached for debt several years ago.  What is most startling about the decision is this information was accurate and had been published in a Spanish newspaper by government mandate but – for these reasons – the newspaper was not obligated to remove the information from its website; nevertheless, Google could be required to remove links to that website from search results in Spain. That is quite different from the way the right to privacy has been applied in America.  The decision’s discussion of search as “profiling” bears out what the paper says about European attitudes toward Google and U.S. Internet companies.  So the decision heightens the differences between the U.S. and Europe.

Nonetheless, it does not have to be so desperate.  In my paper, I look at the issues that have divided the United States and Europe when it comes to data and the things they have in common, the issues currently in play, and some ways the United States can help to steer the conversation in the right direction.

[I] "Europe Emerges as Global Internet Hub," Telegeography, September 18, 2013.


Image Source: © Yves Herman / Reuters
      
 
 




y

Missed Connections: Talking With Europe About Data, Privacy, and Surveillance


The United States exports digital goods worth hundreds of billions of dollars across the Atlantic each year.  And both Silicon Valley and Hollywood do big business with Europe every year.  Differences in approaches to privacy have always made this relationship unsteady but the Snowden disclosures greatly complicated the prospects of a Transatlantic Trade and Investment Partnership.  In this paper Cameron Kerry examines that politics of transatlantic trade and the critical role that U.S. privacy policy plays in these conversations.

Kerry relies on his experience as the U.S.’s chief international negotiator for privacy and data regulation to provide an overview of key proposals related to privacy and data in Europe.  He addresses the possible development of a European Internet and the current regulatory regime known as Safe Harbor. Kerry argues that America and Europe have different approaches to protecting privacy both which have strengths and weaknesses.

To promote transatlantic trade the United states should:

  • Not be defensive about its protection of privacy
  • Provide clear information to the worldwide community about American law enforcement surveillance
  • Strengthen its own privacy protection
  • Focus on the importance of trade to the American and European economies

Downloads

Image Source: © Francois Lenoir / Reuters
      
 
 




y

Analyzing the Federal Government's Use of the Cloud


Since 2009 the federal government started the process of replacing local computers with cloud platforms. A recent report from the Congressional Research Service (CRS) provides an interesting view into the progress of these investments. It reveals the benefits that public agencies gain when using cloud services and the barriers they face when making the transition.

Advantages of Cloud Computing

Cloud computers are superior to locally-run data centers for a variety of reasons. The CRS report identifies six specific cloud benefits:

  • Cost- Cloud computer platforms use resources more efficiently than local servers. An organization that uses local Information Technology (IT) must invest in the infrastructure to support computer systems at times of peak demand. However, most times companies or government agencies require only a fraction of that computing power. Cloud computing allows organizations to pay for all of the resources they need and avoid costly investments in rarely used local IT systems.
  • Energy Efficiency- Cloud computing data centers benefit from economies of scale to run more efficiently than local servers. In some cases this can result in huge energy savings. For a large cloud computing center it also makes economic sense to invest in green energy sources like wind or solar for power.
  • Availability- Cloud computing systems make it easy for any device with an Internet connection to access files or software. However, if a facility temporarily loses Internet access the files on cloud system are inaccessible. Alternatively, a locally administered IT system could function without Internet connectivity.
  • Agility- Cloud systems can make it easier to upgrade operating systems and applications. The available computing power also means that memory intensive software packages are cost effective.
  • Security- Cloud providing companies also have the financial resources to purchase the tools necessary to ensure that networks remain safe.
  • Reliability- Cloud systems can save data onto multiple servers. If a single server goes down due to a cyberattack or another issue, the data is available on another server.

Government Investments in the Cloud

Determining the exact size of government cloud computing expenditures is difficult. Government spending on IT has increased every year from 2001 to 2013 when it reached a peak of $81 billion. In the three subsequent years it has decreased. Cloud computing expenditures likely represent a tiny fraction of that total. Market research firms have estimated that the federal government spends between $1.4 billion and $7 billion on cloud computers annually.

Trends in Total Federal Investment in Information Technology


Source: Congressional Research Service

Challenges for Migrating to the Cloud

The federal government has encountered several barriers in its plan to shift more functions to cloud platforms:

  • High Federal Security Requirements- The government faces new advanced persistent threats routinely. System-wide security updates are necessary more often than for private sector organizations. The short update cycle provides a unique challenge to cloud providers.
  • Adopting New Technologies- Government agencies have ingrained cultures that are slow to change. This shift from locally-based servers to the cloud can be slow and tedious for this reason.
  • Ancillary Technologies- Cloud technologies are known for their flexibility. However, government agencies may lack the necessary IT infrastructure or speedy Internet connections that leverage the maximum potential of the cloud.
  • Technical Know How- Cloud platforms require specialized knowledge to administer. Many government agencies lack the necessary experts to oversee a migration to the cloud.
  • IT Expenditure- Migration to the cloud can involve expensive initial costs. Additional funding is necessary to facilitate the shift to the cloud.

The Future of the Government Cloud

An analysis of the costs and benefits of cloud migration uncover a few specific barriers that the federal government must overcome to earn the full value from new technologies. First, lawmakers must be willing to spend more now to save money later. Cloud systems are cheaper to run than local administered servers but the initial transition costs are high. Current funding levels, which are trending down, are too low to finance such a change. Privacy and security are also major challenges. Government servers host troves of data that Americans expect to remain private. Converting these systems to the cloud will require the government’s full confidence that cloud systems are at least as secure. New legislation is likely necessary to achieve the complimentary goals of privacy and security.

More TechTank posts available here

Authors

Image Source: © Donna Carson / Reuters
      
 
 




y

How Palestinians are Applying Past Lessons to the Current Peace Process

Introduction: Despite the launch of indirect, “proximity” talks between Palestinians and Israelis, Palestinian President Mahmoud Abbas continues to resist a resumption of direct negotiations with Israel absent a full settlement freeze. As chairman of the Palestine Liberation Organization (PLO) and president of the Palestinian Authority (PA), Abbas also insists that any new negotiations pick up where previous talks left off in December 2008 and that the parties spell out ahead of time a clear “endgame,” including a timetable for concluding negotiations. While these may seem like unreasonable preconditions, Palestinian reluctance to dive headfirst into yet another round of negotiations is rooted in some genuine, hard-learned lessons drawn from nearly two decades of repeated failures both at the negotiating table and on the ground.

Not only have negotiations failed to bring Palestinians closer to their national aspirations but the peace process itself has presided over (and in some ways facilitated) a deepening of Israel’s occupation and an unprecedented schism within the Palestinian polity. Such failures have cost the Palestinian leadership dearly in terms of both its domestic legitimacy and its international credibility. While it remains committed to a negotiated settlement with Israel based on a two-state solution, the PLO/PA leadership has been forced to rethink previous approaches to the peace process and to negotiations, as much for its own survival as out of a desire for peace.

Haunted by past failures, Palestinian negotiators are now guided, to varying degrees, by six overlapping and sometimes conflicting lessons:

1. Realities on the ground must move in parallel with negotiations at the table.

2. Don’t engage in negotiations for their own sake.

3. Agreements are meaningless without implementation.

4. Incrementalism does not work.

5. Avoid being blamed at all costs.

6. Don’t go it alone.

Downloads

Authors

     
 
 




y

Assessing the Obstacles and Opportunities in a Future Israeli-Syrian-American Peace Negotiation

Introduction:

In the ebb and flow of Middle East diplomacy, the two interrelated issues of an Israeli-Syrian peace settlement and Washington’s bilateral relationship with Damascus have gone up and down on Washington’s scale of importance. The election of Barack Obama raised expectations that the United States would give the two issues the priority they had not received during the eight years of the George W. Bush administration. Candidate Obama promised to assign a high priority to the resuscitation of the Arab-Israeli peace process, and separately to “engage” with Iran and Syria (as recommended by the Iraq Study Group in 2006).

In May 2009, shortly after assuming office, President Obama sent the assistant secretary of state for Near Eastern affairs, Jeffrey Feltman, and the senior director for the Middle East in the National Security Council, Daniel Shapiro, to Damascus to open a dialogue with Bashar al-Asad’s regime. Several members of Congress also travelled to Syria early in Obama’s first year, including the chairman of the Senate Committee on Foreign Relations, John Kerry, and the chairman of the House Committee on Foreign Affairs, Howard Berman. In addition, when the president appointed George Mitchell as special envoy to the Middle East, Mitchell named as his deputy Fred Hof, a respected expert on Syria and the Israeli-Syrian dispute. Last summer, both Mitchell and Hof visited Damascus and began their give and take with Syria.

And yet, after this apparent auspicious beginning, neither the bilateral relationship between the United States and Syria, nor the effort to revive the Israeli-Syrian negotiation has gained much traction. Damascus must be chagrined by the fact that when the Arab-Israeli peace process is discussed now, it is practically equated with the Israeli-Palestinian track. This paper analyzes the difficulties confronting Washington’s and Jerusalem’s respective Syria policies and offers an approach for dealing with Syria. Many of the recommendations stem from lessons resulting from the past rounds of negotiations, so it is important to understand what occurred.

Downloads

Authors

  • Itamar Rabinovich
     
 
 




y

The Elusive Myth of Democratic Egyptian Elections

INTRODUCTION

Later this month, Egyptians will go to the polls, or attempt to, in order to vote in the country’s parliamentary elections. The elections will unlikely be a democratic affair in the Western sense. In fact, opposition candidates, voters, citizen groups—essentially everyone other than government representatives—are fully expecting the elections to be a violent and rigged episode. For easy reference, one can look to the June elections for the Shura Council, or upper house of Parliament, in which the governing National Democratic Party (NDP) managed to land 80 out of a possible 84 seats. Those elections were marked by violence and allegations of rampant violations.

Elections in Egypt are not generally democratic, they do not necessarily reflect the will of the people, and they will invariably usher in a house in which the NDP has an unshakeable majority. More so, the elected body has very little control over the government and none over the president, who, thanks to some creative constitutional amendments in 2007, can dissolve the Parliament at will. Election results are apparently so preordained that many have questioned the wisdom of participating at all. Opposition groups, among them the National Alliance for Change (NAC), led by former International Atomic Energy Agency (IAEA) head and current political reformer Mohamed ElBaradei, have been calling for a boycott. ElBaradei told reporters at a Ramadan Iftar meeting on September 7 that voting “would go against the national will.” Many political analysts and some members of the opposition have echoed the belief that participation in the elections only gives credence to a fundamentally flawed system and perpetuates the state myth of a democratic nation.

The above argument certainly has its merits, but it misses the point. Elections in Egypt are not about who wins seats—that is usually a foregone conclusion. They are about the “how and the what,” in the sense that they are oases of political activity, demand, and dissension in an otherwise arid climate. In that way, every election fought represents losses and gains for the respective participants in ways that invariably influence the following elections. Also, the ballot boxes can yield surprising results—as in the case of the 2005 elections when the Muslim Brotherhood (MB) gained a jawdropping 88 of 454 seats in the elections for the lower house. This outcome certainly would not have come about if the Brotherhood had not participated. To be sure, there are also significant, detrimental changes that happen as a direct consequence of the elections, among them constitutional amendments designed to hobble the opposition’s ability to field candidates and campaign. Still, for opposition parties and movements, boycotting the elections is the equivalent of throwing away the only political participation they have. It would mean relinquishing any visibility or influence and it would mean admitting to their supporters that they are essentially mere window dressings in the democratic façade. Arguably, this is a reason why these elections have only ever been boycotted once, in 1990. The Egyptian political arena is one where contestants scrabble for the smallest patch of ground. The high moral ground simply does not figure into it.

Downloads

     
 
 




y

Recalibrating the Egypt-Israel Relationship


Introduction:

There is an Egyptian proverb that says those who worry about demons will tend to run into them. Like much folk wisdom, it has solid psychological foundations; the likelihood of a problem rearing its head often appears to be exacerbated by constantly fretting about it. Ever since Hosni Mubarak stepped down as president of Egypt on February 11, 2011, the demon named “Now What?” has been keeping the Israeli government up at night. On August 18, it finally leapt up at them.

That day, a group of armed men attacked Israeli buses, as well as civilian and military vehicles north of Eilat, near the Egyptian border. Eight Israelis, both civilians and soldiers, were killed. The Israel Defense Forces (IDF) set off in hot pursuit, shooting at the attackers from a helicopter. The helicopter crew either failed to notice, or ignored, that they were shooting over the Egyptian side of the border. In the pursuit, three Egyptians— an officer and two enlisted men—were killed and another three later died of their wounds. Israeli minister of defense Ehud Barak, while blaming Palestinian groups for the assault, made comments to the effect that the attacks were largely Egypt’s fault as there had been a major security collapse in Egypt since the former regime had been ousted six months earlier.

The way matters unfolded over the next few days pointedly illustrated the answer to a question that had been asked repeatedly both by international media and the Israeli government since Hosni Mubarak’s ouster: What did Egypt’s January 25 Revolution mean for Israel? The simplest answer is that it is no longer business as usual. The relationship between Egypt and Israel has changed and both countries will have to navigate new waters carefully and wisely.

Downloads

Image Source: � Asmaa Waguih / Reuters
     
 
 




y

Saving Syria: Assessing Options for Regime Change


Syria is trapped on a crumbling precipice, and however it might fall will entail significant risks for the United States and for the Syrian people.

The brutal regime of Bashar al-Asad is employing its loyal military forces and sectarian thugs to crush the opposition and reassert its tyranny. Even if Bashar fails, Syria may not be out of the woods: an increasingly likely alternative to the current regime is a bloody civil war similar to what we saw in Lebanon, Bosnia, Congo, and most recently in Iraq. The horrors of such a war might even exceed the brutal reassertion of Asad’s control, and would cause spillover into Syria’s neighbors—Turkey, Iraq, Jordan, Lebanon, and Israel—that could be disastrous for them and for American interests in the Middle East.

But the unrest in Syria, which is now entering its second year, also offers some important opportunities, ones that would come from the fall of the regime of Bashar al-Asad, whose family has ruled the country with an iron grip for over forty years. Syria is Iran’s oldest and most important ally in the Arab world, and the Iranian regime has doubled down on Asad, providing him with financial aid and military support to shore up his regime. Asad’s departure would deal a significant blow to Tehran, further isolating it at a time when it has few friends in the region or the world. In addition, Damascus is steadfast in its hostility toward Israel, and Asad’s regime is also a longtime supporter of terrorist groups like Hizballah and Hamas, and has at times aided al-Qa’ida terrorists and former regime elements in Iraq. The regime’s collapse, therefore, could have significant benefits for the United States and its allies in the region.

Actually ousting Asad, however, will not be easy. Although the Obama administration has for months called for Asad to go, every policy option to remove him is flawed, and some could even make the situation worse—seemingly a recipe for inaction. Doing nothing, however, means standing by while Asad murders his own people, and Syria plunges into civil war and risks becoming a failed state. Already the violence is staggering: as of March 2012, at least 8,000 Syrians have died and thousands more have been arrested and tortured in trying to topple the regime. At the same time, Syria is fragmenting. The Syrian opposition remains divided, and the Free Syrian Army is more a brand than a meaningful, unified force. Al- Qa’ida is urging fighters to join the fray in Syria, and sectarian killings and atrocities are growing. Should the violence continue to intensify, Syria’s neighbors may increase their meddling, and instability could spread, further weakening already-fragile neighbors like Iraq and Lebanon.

So to protect U.S. interests, Asad cannot triumph. But a failed Syria, one wracked by civil war, would be just as bad. Thus, U.S. policy must walk this tightrope, trying to remove Asad, but doing so in a way that keeps Syria an intact state capable of policing its borders and ensuring order at home. At the end of the day, however, removing Asad may not be doable at a price the United States is willing to pay. If so, the U.S. government may be forced to choose between living with a brutal but weakened Asad or getting rid of Asad regardless of the consequences.

This memo lays out six options for the United States to consider to achieve Asad’s overthrow, should it choose to do so:

  1. Removing the regime via diplomacy;
  2. Coercing the regime via sanctions and diplomatic isolation;
  3. Arming the Syrian opposition to overthrow the regime;
  4. Engaging in a Libya-like air campaign to help an opposition army gain victory;
  5. Invading Syria with U.S.-led forces and toppling the regime directly; and
  6. Participating in a multilateral, NATO-led effort to oust Asad and rebuild Syria.
The options are complex, and policymakers will probably try to combine several in an attempt to accentuate the positives and minimize the negatives, which will inevitably be difficult and bring out new complications. But by focusing on discrete approaches, this memo helps expose their relative strengths and weaknesses. For each course of action, this memo describes the strategy inherent to the option and what it would entail in practice. It also assesses the option’s advantages and disadvantages.

This memo does not endorse any particular policy option. Rather, it seeks to explain the risks and benefits of possible courses of action at this moment in time. As conditions change, some options may become more practical or desirable and others less so. The authors mostly agree on the advantages and disadvantages of each approach but weigh the relative rewards and costs differently.

Downloads

Image Source: © Luke MacGregor / Reuters
     
 
 




y

A U.S.-Egyptian Relationship for a Democratic Era


INTRODUCTION

A year after President Hosni Mubarak’s fall, U.S.-Egypt relations are at an all-time low. Not, as many expected, because of the rise of Islamist parties, but because America’s longtime allies in the Egyptian military have whipped up anti-American sentiment at a feverish pace. It may have started as a political ploy, a way to build support on the street and highlight the army’s nationalist credentials, but the generals soon lost control. In January, the Egyptian government announced that sixteen Americans—including the son of a top U.S. official— would be put on trial, facing up to five years in prison. Their apparent crime was working for American nongovernmental organizations (NGOs)—the National Democratic Institute, the International Republican Institute, and Freedom House—that offered support, funding, and election monitoring for Egypt’s uneven transition.

On March 1, the Egyptian government lifted the travel ban on seven Americans who were still in Egypt, allowing them to leave the country. A major diplomatic breach was avoided, giving the impression that the crisis had been resolved. This appears to be the interpretation of the Obama administration, which waived congressional conditions on military aid, citing the importance of maintaining a “strategic partnership” with Egypt.2 However, the charges against the Americans remain, and there is no sign that the American NGOs in question will be able to reopen anytime soon. More importantly, the vast majority of affected NGOs—which are Egyptian rather than American—still find themselves on trial and under attack.

The NGO episode, however worrying it is on its own, reflects something larger and more troubling: the slow descent from the national unity of the revolution to a fog of paranoia, distrust, and conspiracy theorizing. Who is with the revolution, and who isn’t? The roots of the problem lie in the uncertainly inherent in Egypt’s muddled transition. Unlike in Tunisia, where the Higher Committee for the Achievement of Revolutionary Objectives (HCARO)—accepted as legitimate by all of the country’s main political forces—was responsible for managing the transition, Egypt has featured various competing actors claiming their own distinct sources of power. The struggle for legitimacy between the Supreme Council of the Armed Forces (SCAF), the Muslim Brotherhood-dominated parliament, and the protest movement has created a fragmented political scene. Everyone wants to lead the transition, but no one wants to take full responsibility for the results.

Downloads

Authors

Image Source: © Mohamed Abd El Ghany / Reuters
     
 
 




y

The Lesser of Two Evils: The Salafi Turn to Party Politics in Egypt


Last winter, Salafi parties in Egypt proved themselves a formidable political force, winning a quarter of the vote in the country’s first elections in the post-Mubarak era. For many in Washington, the unexpected strength of Egypt’s conservative religious groups raised unsettling questions about the future of U.S.-Egyptian relations and America’s security interests in the region.

 

Will the political success of Salafis turn Egypt into an anti-American power and strengthen jihadist groups like al-Qa’ida that are bent on using violence against the United States and its allies?

In the Saban Center Middle East Memo, William McCants, a Middle East specialist at CNA and adjunct faculty at Johns Hopkins University, examines the implications of the Salafis’ turn to, and success in, electoral politics. McCants argues that while political participation may not moderate Salafis’ positions on social issues, it will likely erode the strength of their most extreme and violent affiliates. For this reason, America’s interests may be best served when Salafis play a role in post-revolution politics.

Downloads

Authors

  • William McCants
Image Source: Mohamed Abd El Ghany / Reuters
     
 
 




y

Security in the Persian Gulf: New Frameworks for the Twenty-first Century


In the wake of the U.S. military departure from Iraq and in the midst of Iran’s continued defiance of the international community over its nuclear program, is a new security arrangement for the Gulf in order? If so, is the Gulf Cooperation Council (GCC) capable of such a task, or should other institutions be considered?

In the Saban Center’s newest Middle East Memo, Security in the Persian Gulf: New Frameworks for the Twenty-First Century, Saban Center Senior Fellow Kenneth Pollack examines the possibility of developing a new security architecture for the region.

Pollack analyzes security arrangements in other parts of the world and focuses on two options:  expanding the GCC and turning it into a formal military alliance and creating an arrangement modeled on the Commission on Security and Cooperation in Europe. In weighing each option, Pollack finds that the latter can better furnish a path toward peace and security.

Downloads

Image Source: © Fars News / Reuters
     
 
 




y

Unraveling the Syria Mess


The Saban Center for Middle East Policy joined with the American Enterprise Institute and the Institute for the Study of War in June 2012 to host a one-day crisis simulation that explored the implications of spillover from the ongoing violence in Syria. The simulation examined how the United States and its allies might address worsening instability in Lebanon, Iraq, Jordan, Turkey, and elsewhere in the Middle East as a result of the internecine conflict in Syria.

The Saban Center’s Middle East Memo, “Unraveling the Syria Mess: A Crisis Simulation of Spillover from the Syrian Civil War,” authored by simulation conveners Kenneth M. Pollack, Frederick W. Kagan, Kimberly Kagan, and Marisa C. Sullivan, presents key lessons and observations from the exercise.

Among the key findings:

  • A humanitarian crisis alone is unlikely to spur the international community to take action in Syria.
     
  • Turkey is a linchpin in any effort to end the fighting in Syria, but Washington and Ankara may not see eye-to-eye on what the end game should be.
     
  • U.S. history in Iraq and Lebanon make intervention there unlikely, even if spillover causes a renewal of large-scale violence.

The simulation suggested a tension between U.S. political antipathy toward greater involvement in Syria and the potential strategic desirability of early action.

Unraveling the Syria Mess

Downloads

Video

Authors

Image Source: © Stringer . / Reuters
      
 
 




y

The View From a Distance: Egypt’s Contentious New Constitution


With violent protests following the second anniversary of the Egyptian revolution, and calls for a new unified government amid dire comments about the stability of Egypt, the world’s attention is again on President Morsi and his country. This follows a tumultuous period last month, when Egyptians went to the polls and ratified a new constitution. The document, criticized as hurried, incomplete, and lacking in consensus is enormously contentious.

In the Saban Center’s newest Middle East Memo, The View From a Distance: Egypt’s Contentious New Constitution, nonresident fellow Mirette F. Mabrouk gives a broad overview of the new constitution, and provides context and analysis for specific sections.

Mabrouk outlines several ways in which, she argues, the document is shaky on the protection of freedoms and rights, particularly those of women, some religious minorities and minors. Mabrouk also encourages analysts to stop viewing this situation as an Islamist/ secular divide, arguing that idea is too simplistic, and lacks the context for greater understanding of Egypt’s domestic politics.

Download » (PDF)

Downloads

Image Source: © Stringer Egypt / Reuters
      
 
 




y

The Military Dynamics of the Syrian Civil War and Options for Limited U.S. Intervention


The crisis in Syria continues with no end in sight, and in the Saban Center's latest Middle East Memo, Breaking the Stalemate: The Military Dynamics of the Syrian Civil War and Options for Limited U.S. Intervention, Saban Center Senior Fellow Kenneth Pollack argues that until there is a breakthrough on the battlefield, there will be no breakthroughs at the negotiating table.

In his paper, Pollack lays out the military advantages and disadvantages of both the opposition and the regime's forces, and looks at how different opportunities for U.S. intervention can affect those critical dynamics. This analysis provides a much-needed counterpoint to the debate over the possible cost of U.S. options in Syria with an analysis of their likely impact on the conflict.

Highlights include:

  • The strengths and weaknesses of the opposition, including: greater numbers, a history of deprivation of political power, the aid of Islamist militias affiliated with the Muslim Brotherhood and Salafist groups, and support from Arab and Western countries.
     
  • The strengths and weaknesses of the regime, including: motivation to defend against a determined majority, a geographic advantage, the remnants of the Syrian armed forces, help of foreign contingents like Hizballah, and the support of foreign countries like Iran and reportedly Russia and China.
     
  • Options for U.S. interventions to break the stalemate, including:
    • Training and equipping the opposition.
    • Stopping the resupply of the regime in order to diminish its ability to generate firepower.
    • Attacking regime infrastructure targets, such as military bases, power-generation plants and transportation choke points like bridges.
    • Establishing and maintaining a no-fly zone.
    • Engaging in a tactical air campaign against regime ground forces.

Downloads

Image Source: © George Ourfalian / Reuters
      
 
 




y

Hard Road to Damascus: A Crisis Simulation of U.S.-Iranian Confrontation Over Syria


Last September, as part of its annual conference with the United States Central Command, the Saban Center for Middle East Policy at the Brookings Institution conducted a day-long simulation of a confrontation between the United States and Iran arising from a hypothetical scenario in which the Syrian opposition had made significant gains in its civil war and was on the verge of crushing the Assad regime.  

The simulation suggested that, even in the wake of President Rouhani’s ascension to power and the changed atmosphere between Tehran and Washington, there is still a risk of misunderstanding and miscalculation between the two sides.

This new Middle East Memo examines the possible U.S. foreign policy lessons that emerged from this crisis simulation, and stresses the importance of communication, understanding the Saudi-Iran conflict and the difficulty in limited interventions. 

Downloads

Image Source: © Stringer . / Reuters
      
 
 




y

The End of Sykes-Picot? Reflections on the Prospects of the Arab State System


During much of the past three years, the Syrian civil war has been the most prominent item on the Middle Eastern political agenda and has dominated the political-diplomatic discourse in the region and among policy makers, analysts and pundits interested in its affairs. 

Preoccupation with the Syrian crisis has derived from the sense, apparent since its early phases, that it was much more than a domestic issue. It has, indeed, become a conflict by-proxy between Iran and its regional rivals and the arena of American-Russian competition. It has also had a spillover effect on several neighboring countries and has been a bellwether for the state of the Arab Spring.

As the conflict festered it also prompted a broader discussion and debate over the future of the Arab State system. The collapse of Syria, the ongoing fighting in Iraq, and the general instability in the Middle East has led some observers to question whether the very geography of the region will be changed. Robin Wright, a journalist and scholar at the Woodrow Wilson International Center for Scholars, argues that “the map of the modern Middle East, a political and economic pivot in the international order, is in tatters.” Wright also warns that competing groups and ideologies are pulling the region apart: “A different map would be a strategic game changer for just about everybody, potentially reconfiguring alliances, security challenges, trade and energy flows for much of the world, too.”  Similarly, Parag Khanna, a senior fellow at the New America Foundation, argues, “Nowhere is a rethinking of “the state” more necessary than in the Middle East.” He contends that “The Arab world will not be resurrected to its old glory until its map is redrawn to resemble a collection of autonomous national oases linked by Silk Roads of commerce.” Lt. Colonel Joel Rayburn, writing from the Hoover Institution, points out that the alternative may not be new states but rather simply collapse. “If watching the fall or near-fall of half a dozen regimes in the Arab Spring has taught us anything, it should be that the Arab states that appeared serenely stable to outsiders for the past half century were more brittle than we have understood,” warning darkly, “This conflict could very well touch us all, perhaps becoming an engine of jihad that spews forth attackers bent on bombing western embassies and cities or disrupting Persian Gulf oil markets long before the fire burns out.” 

This discussion touches on a key question: Will the collapse of one or several other Arab states produce a new order in the region? 

The regional order has been threatened before, but today’s challenge is unique. Syria is what has prompted the latest reevaluation of the Skyes-Picot borders, but many of the problems predated the Syrian civil war. Ambitious monarchs in the 1930s and 1940s challenged the order after the colonial period. The doctrine of Pan-Arab Nationalism and Gamal Abd al-Nasir’s messianic leadership in the 1950s and by Saddam Hussein in 1990 again posed a threat. Now it is now challenged not by a powerful state or a sweeping ideology but by the weakness of several Arab states that seem to be on the verge of implosion or disintegration.

This paper assesses the situation in Syria, with an emphasis on what might lead to its de facto partition or lasting collapse. It then examines Syria’s neighbors and their prospects for stability. The paper concludes by exploring how the United States, Israel and Iran might affect this tenuous balance.

Downloads

Image Source: © Muzaffar Salman / Reuters
      
 
 




y

On April 13, 2020, Suzanne Maloney discussed “Why the Middle East Matters” via video conference with IHS Markit.  

On April 13, 2020, Suzanne Maloney discussed "Why the Middle East Matters" via video conference with IHS Markit.

       




y

Extending soldiers’ assignments may help the military maintain readiness

Following President Trump’s mid-March declaration that the COVID-19 outbreak constituted a “national emergency,” the Department of Defense (DoD) moved swiftly to implement travel restrictions for DoD employees intended to “preserve force readiness, limit the continuing spread of the virus, and preserve the health and welfare” of military service members, their families and DoD civilians. In…

       




y

COVID-19 and military readiness: Preparing for the long game

With the saga over the U.S.S. Teddy Roosevelt aircraft carrier starting to fade from the headlines, a larger question about the American armed forces and COVID-19 remains. How will we keep our military combat-ready, and thus fully capable of deterrence globally, until a vaccine is available to our troops? It will also be crucial to…

       




y

Webinar: What role will the Army play in great power competition after COVID-19?

Two years after the National Defense Strategy was published, it’s time to take stock of where the Army stands. On an immediate level, the age of COVID-19 presents the Army with an unprecedented set of challenges. From ensuring high levels of readiness to keeping up recruitment, the pandemic has forced the Army to adapt quickly…

       




y

Webinar: A conversation with Secretary of Defense Mark T. Esper

The COVID-19 pandemic is among the most serious challenges confronting the globe since World War II. Its projected human and economic costs are devastating. While the armed forces of the United States will rise to this challenge as they have others, the Department of Defense will not stop planning for long-term threats to America's security,…

       




y

Why the AI revolution hasn’t swept the military

In games such as chess and Go, artificial intelligence has repeatedly demonstrated its ability to outwit the experts. Ad networks and recommendation engines are getting eerily good at predicting what consumers want to buy next. Artificial intelligence, it seems, is changing many aspects of our lives, especially on the internet. But what has been described…

       




y

Women warriors: The ongoing story of integrating and diversifying the American armed forces

How have the experiences, representation, and recognition of women in the military transformed, a century after the ratification of the 19th Amendment to the U.S. Constitution? As Brookings President and retired Marine Corps General John Allen has pointed out, at times, the U.S. military has been one of America’s most progressive institutions, as with racial…

       




y

Figure of the week: Poverty and health care SDG projections in sub-Saharan Africa

On January 8, the Africa Growth Initiative at Brookings released its annual Foresight Africa publication. This year’s special edition focuses on six key priorities for the next decade. The first chapter, Achieving the Sustainable Development Goals: The state of play and policy options, highlights recent progress and challenges facing the continent in achieving Agenda 2030. In his essay,…

       




y

Who gained from global growth last decade—and who will benefit by 2030?

Around the world, household final consumption expenditure rose by $18.2 trillion in 2011 PPP terms between 2010 and 2020, from $46.5 trillion to $64.8 trillion. This growth, averaging about 3.3 percent per year, was the same as the average growth over the previous forty years—a bit better than growth in the first decade of this…

       




y

To move the needle on ending extreme poverty, focus on rural areas

The considerable gains made worldwide in poverty reduction over the last 10 years have been widely recognized. And indeed, in a year when China aspires to complete its 40-year project of lifting some 770 million people across the poverty line, it is clear that a greater proportion of the human population is wealthier today than…

       




y

The World Bank steps up on fragility and conflict: Is it asking the right questions?

At the beginning of this century, about one in four of the world's extreme poor lived in fragile and conflict affected situations (FCS). By the end of this year, FCS will be home to the majority of the world's extreme poor. Increasingly, we live in a "two-speed world." This is the key finding of a…

       




y

To end global poverty, invest in peace

Most of the world is experiencing a decrease in extreme poverty, but one group of countries is bucking this trend: Poverty is becoming concentrated in countries marked by conflict and fragility. New World Bank estimates show that on the current trajectory by 2030, up to two-thirds of the extreme poor worldwide will be living in…

       




y

What do we know about poverty in North Korea?

       




y

Turning back the Poverty Clock: How will COVID-19 impact the world’s poorest people?

The release of the IMF’s World Economic Outlook provides an initial country-by-country assessment of what might happen to the world economy in 2020 and 2021. Using the methods described in the World Poverty Clock, we ask what will happen to the number of poor people in the world—those living in households with less than $1.90…

       




y

Destroying trust in the media, science, and government has left America vulnerable to disaster

For America to minimize the damage from the current pandemic, the media must inform, science must innovate, and our government must administer like never before. Yet decades of politically-motivated attacks discrediting all three institutions, taken to a new level by President Trump, leave the American public in a vulnerable position. Trump has consistently vilified the…

       




y

How to fix the Paycheck Protection Program: Make sure it actually protects paychecks

Amid the finger-pointing and blame-throwing about the mess that is the Paycheck Protection Program, the U.S. Treasury and Small Business Administration seem to have forgotten why Congress enacted it: so businesses would keep people on payroll instead of laying them off. The PPP idea is simple: rather than have businesses lay off tens of millions…

       




y

Leaving all to younger hands: Why the history of the women’s suffragist movement matters

The campaign to win passage of the 19th Amendment guaranteeing women the right to vote stands as one of the most significant and wide-ranging moments of political mobilization in all of American history. Among other outcomes, it produced the largest one-time increase in voters ever. As important as the goal of suffrage was, the struggle…

       




y

How instability and high turnover on the Trump staff hindered the response to COVID-19

On Jan. 14, 2017, the Obama White House hosted 30 incoming staff members of the Trump team for a role-playing scenario. A readout of the event said, “The exercise provided a high-level perspective on a series of challenges that the next administration may face and introduced the key authorities, policies, capabilities, and structures that are…

       




y

Why not Janet?

       




y

In the Republican Party establishment, Trump finds tepid support

For the past three years the Republican Party leadership have stood by the president through thick and thin. Previous harsh critics and opponents in the race for the Republican nomination like Senator Lindsey Graham and Senator Ted Cruz fell in line, declining to say anything negative about the president even while, at times, taking action…

       




y

Why the AI revolution hasn’t swept the military

In games such as chess and Go, artificial intelligence has repeatedly demonstrated its ability to outwit the experts. Ad networks and recommendation engines are getting eerily good at predicting what consumers want to buy next. Artificial intelligence, it seems, is changing many aspects of our lives, especially on the internet. But what has been described…

       




y

Removing regulatory barriers to telehealth before and after COVID-19

Introduction A combination of escalating costs, an aging population, and rising chronic health-care conditions that account for 75% of the nation’s health-care costs paint a bleak picture of the current state of American health care.1 In 2018, national health expenditures grew to $3.6 trillion and accounted for 17.7% of GDP.2 Under current laws, national health…

       




y

How to increase financial support during COVID-19 by investing in worker training

It took just two weeks to exhaust one of the largest bailout packages in American history. Even the most generous financial support has limits in a recession. However, I am optimistic that a pandemic-fueled recession and mass underemployment could be an important opportunity to upskill the American workforce through loans for vocational training. Financially supporting…

       




y

Why AI systems should disclose that they’re not human

       




y

Introducing Techstream: Where technology and policy intersect

On this episode, a discussion about a new Brookings resource called Techstream, a publication site on brookings.edu that puts technologists and policymakers in conversation. Chris Meserole, a fellow in Foreign Policy and deputy director of the Artificial Intelligence and Emerging Technology Initiative, explains what Techstream is and some of the issues it covers. Also on…