16 Items

Syrian President Bashar al-Assad  during a meeting with Russian President Vladimir Putin, October 20, 2015.

Kremlin.ru

Analysis & Opinions - Moscow Times

Russia Must Abandon Assad to Fight Terrorism

| November 13, 2015

"The key to a solution to both — the quagmire that has unfolded in Syria and the threat posed by Islamic terrorism — is to deprive the terrorist groups of their main propaganda tools and to form a new Syrian government that excludes Assad (and his foreign Shiite allies) but includes representatives from all of the non-fundamentalist groups involved in the civil war."

Analysis & Opinions - The Huffington Post

Is Cybersecurity Like Arms Control?

| May 18, 2015

"In little more than a generation, the Internet has become the substrate of the global economy and governance worldwide. Several billion more human users will be added in the next decade, as will tens of billions of devices, ranging from thermostats to industrial control systems (the 'Internet of Things'). All of this burgeoning interdependence implies vulnerabilities that governments and non-governmental actors can exploit. At the same time, we are only beginning to come to terms with the national-security implications of this. Strategic studies of the cyber domain resemble nuclear strategy in the 1950s: analysts are still not clear about the meaning of offense, defense, deterrence, escalation, norms, and arms control."

Kurdistan Flag, Germiyan Province, Iraqi Kurdistan, 21 April 2011. The Kurdish areas in the Middle East are mainly divided between Iran, Iraq, Syria, and Turkey. There are also a number of extremist groups throughout these Kurdish areas.

Wikimedia CC

Analysis & Opinions - Belfer Center for Science and International Affairs, Harvard Kennedy School

Do Homework Before Supporting Groups in ISIS Fight

| August 25, 2014

"The United States and several key regional states, including Israel, Iran, Saudi Arabia, and Turkey may have very different interests, but they all have a shared interest in better understanding and working together to stop groups that dislike Americans as much as Jews, Persians, Shi’as, secular Muslims, and the Saudi monarchy. They should refrain from empowering and expressing blind support for a group or entity without fully understanding it first."

Maryam Rajavi,  president-elect of the People's Mujahideen Organisation (MEK)'s political wing, the National Council of Resistance of Iran, December 2006.

Wikimedia CC

Analysis & Opinions - The National Interest

Beware of the MEK

| August 22, 2014

"...[T]o understand the origins of anti-Americanism in pre-revolutionary Iran, look no further. The MEK was responsible for the assassination and failed attempts to kidnap and assassinate Americans in Iran in the 1970s. It was also the MEK that pressured the Islamic revolutionaries to take a stronger stance against the United States. The MEK further supported the 1979 U.S. embassy hostage crisis in Tehran."

Matthew Bunn and William H. Tobey present "The Nuclear Terrorism Threat – And Next Steps to Reduce the Danger"

Shari Nijman

Presentation

The Nuclear Terrorism Threat – And Next Steps to Reduce the Danger

| Oct 7, 2013

Matthew Bunn and Will Tobey spoke with Piet de Klerk, the Dutch Sherpa organizing the 2014 Nuclear Security Summit, on October 7 at a United Nations event sponsored by the Dutch mission to the UN. In these slides, Bunn and Tobey provide an updated summary of the threat of nuclear terrorism and recommendations for next steps to reduce the threat, based in part on the new U.S.-Russian report, Steps to Prevent Nuclear Terrorism.

Presentation

Strengthening Global Approaches to Nuclear Security

| July 5, 2013

Despite substantial progress in improving nuclear security in recent years, there is more to be done.  The threats of nuclear theft and terrorism remain very real. This presentation recommends learning from the much stronger national and international efforts in nuclear safety, and in particular, taking steps to build international understanding of the threat; establish effective performance objectives; assure performance; train and certify needed personnel; build security culture and exchange best practices; reduce the number of sites that need to be protected; and strengthen the international framework and continue the dialogue once leaders are no longer meeting regularly at the summit level. Matthew Bunn presented this talk, based on a recent paper, on July 3rd, 2013 at the International Conference on Nuclear Security in Vienna.

Presentation

Cyber Disorders: Rivalry and Conflict in a Global Information Age

| May 3, 2012

The risks posed by the proliferation of cyber weapons are gaining wide recognition among security planners. Yet the general reaction of scholars of international relations has been to neglect the cyber peril owing to its technical novelties and intricacies. This attitude amounts to either one or both of two claims: the problem is not of sufficient scale to warrant close inspection, or it is not comprehensible to a non-technical observer. This seminar challenged both assertions.

Aug. 23, 2010: Technicians at work in the Bushehr nuclear power plant, Bushehr, Iran. Iran has confirmed that Stuxnet infected several personal laptops of Bushehr employees but that plant systems were unaffected.

AP Photo

Analysis & Opinions - Today's Zaman

Cyber War and Peace

| April 10, 2012

"Cyber war, though only incipient at this stage, is the most dramatic of the potential threats. Major states with elaborate technical and human resources could, in principle, create massive disruption and physical destruction through cyber attacks on military and civilian targets. Responses to cyber war include a form of interstate deterrence through denial and entanglement, offensive capabilities, and designs for rapid network and infrastructure recovery if deterrence fails. At some point, it may be possible to reinforce these steps with certain rudimentary norms and arms control, but the world is at an early stage in this process."