International Security & Defense

65 Items

Prince Mohammed Bin Salman of Saudi Arabia

Wikimedia Commons

Analysis & Opinions - The Washington Post

A 30-Year-Old Saudi Prince Could Jump-Start The Kingdom - Or Drive It Off A Cliff

| June 28, 2016

The tensions unsettling the Saudi royal family became clear in September, when Joseph Westphal, the U.S. ambassador to Riyadh, flew to Jiddah to meet Crown Prince Mohammed bin Nayef, nominally the heir to the throne. But when he arrived, he was told that the deputy crown prince, a brash 30-year-old named Mohammed bin Salman, wanted to see him urgently. Senior Fellow, David Ignatius, discusses Mohammed bin Salman opportunity to transform Saudi Arabia.

teaser image

News

Ukrainian Finance Minister On Making Change Happen In Ukraine

Sep. 30, 2015

Finance Minister of Ukraine and HKS alumna, Natalie A. Jaresko MPP 1989, participated in a conversation with Future of Diplomacy Project Faculty Director R. Nicholas Burns titled “Ukraine: Making Change Happen” on September 23. Minister Jaresko commented on the current state of economic reforms and debt restructuring in Ukraine, pairing her incisive analysis with descriptions of personal experiences working at a high-level in governments in both the US and Ukraine.

- Belfer Center for Science and International Affairs, Harvard Kennedy School Belfer Center Newsletter

International Council Members Debate Critical Issues

Summer 2013

The Belfer Center launched its annual International Council meeting on April 9 with animated discussions of, among others, U.S. energy politics, the links between economic policy and national security, cybersecurity, and the rise of China. Participants included members of the Center's International Council and Board of Directors as well as faculty and senior fellows.

Paper

The Need for the Next Special Operations Forces' Mobility Aircraft

| June 2012

The proliferation of threat systems and Anti-Access, Area Denial (A2/AD) strategies make performing special operations forces' (SOF) air mobility missions increasingly complicated and limit the capability to defeat air defenses and penetrate into denied airspace. Combined with an aging inventory, ill suited to evading these threats, Air Force Special Operations Command (AFSOC) and the United States Special Operations Command (USSOCOM) must look to technology to defeat the more modern threat systems and anti-access strategies. The best answer to penetrate future, denied regions is in stealth or low observable (LO) technology.

Customers shop for vegetables at a supermarket in Hangzhou, China, 14 Oct. 2011. China’s inflation eased somewhat in September, but food costs, a major force behind price rises, remained stubbornly high by jumping 13.4 percent, the same as in August.

AP Photo

Policy Brief - Quarterly Journal: International Security

To Stay Ahead of China, Stay Engaged in Asia

| January 2012

"China narrowed the gap in terms of gross domestic product (GDP) and will likely overtake the United States as the world's largest economy sometime between 2015 and 2040. What matters for national power, however, is not gross wealth, but net wealth—the wealth left over after people are clothed and fed. China's 1.3 billion people produce a large volume of output, but they also consume most of it immediately, leaving little left over for national purposes."

In this Sept. 24, 2010, file photo the National Cybersecurity & Communications Integration Center (NCCIC) prepares for the Cyber Storm III exercise at its operations center in Arlington, Va.

AP Photo

Magazine Article - Bulletin of the American Academy of Arts and Sciences

The Future of Power

| Spring 2011

"The conventional wisdom among those who looked at the Middle East used to be that you had a choice either of supporting the autocrat or being stuck with the religious extremists. The extraordinary diffusion of information created in Egypt and other Middle Eastern countries reveals a strong middle that we weren't fully aware of. What is more, new technologies allow this new middle to coordinate in ways unseen before Twitter, Facebook, and so forth, and this could lead to a very different politics of the Middle East. This introduces a new complexity to our government's dealings with the region."

Analysis & Opinions - The Washington Post

The Cybersecurity Changes We Need

| May 29, 2010

"There is widespread agreement that this long-term trend of grabbing the economic gains from information technology advances and ignoring their security costs has reached a crisis point," write Melissa Hathaway and Jack Goldsmith. "As we progress digitally, we must also adopt and embed sometimes-costly security solutions into our core infrastructures and enterprises and stop playing the game of chance."