23 Items

Israeli Prime Minister Benjamin Netanyahu gives the opening speech of the 'CyberTech 2014' international conference on January 27, 2014 in Tel-Aviv.

Getty Images

Announcement - Belfer Center for Science and International Affairs, Harvard Kennedy School

Study Group with Dan Meridor on Israel's Defense in the Changing Middle East

October 5, 2015

Join Dan Meridor, former Chairman of the Foreign Affairs and Defense Committee of the Knesset, former Chairman of the committee which wrote the report on the Israel Defense Doctrine, and former Minister of Intelligence and Atomic Energy, for a three-session study group on Israel's Defense in the Changing Middle East in November.

The agricultural fields in active use (dark green) or fallow (brown to tan), are approximately 1 km in diameter. Much of the Saudi Arabia's Wadi As-Sirhan Basin shown here is sandy (light tan to brown surfaces).

Wikimedia CC 2.0

Journal Article - Sustainable Production and Consumption

Food Security Amidst Water Scarcity: Insights on Sustainable Food Production from Saudi Arabia

Water, energy, and food security are of critical concern as rising population growth and rapid urbanization place greater pressure on our natural resources. This study evaluates the growing internationalization of food production in water-scarce countries using the case of Saudi Arabia as a microcosm to illustrate the tradeoffs in resource consumption associated with crop selection and farming practices.

Analysis & Opinions - The Huffington Post

Is Cybersecurity Like Arms Control?

| May 18, 2015

"In little more than a generation, the Internet has become the substrate of the global economy and governance worldwide. Several billion more human users will be added in the next decade, as will tens of billions of devices, ranging from thermostats to industrial control systems (the 'Internet of Things'). All of this burgeoning interdependence implies vulnerabilities that governments and non-governmental actors can exploit. At the same time, we are only beginning to come to terms with the national-security implications of this. Strategic studies of the cyber domain resemble nuclear strategy in the 1950s: analysts are still not clear about the meaning of offense, defense, deterrence, escalation, norms, and arms control."

A water tank truck in Jordan, April 1, 2010. Future water availability in arid regions may be assessed by considering key projects that have been identified or planned by regional experts, such as desalination plants.

Xavi Talleda Photo CC

Paper - Massachusetts Institute of Technology

Assessing Future Water Availability in Arid Regions Using Composition and Salience of Decision Criteria

| March 2014

Water resources development options are usually selected on a least-cost basis. While economic considerations are dominant in choosing projects, there are also a mix of other factors including social demands, political expediency, social equity, and environmental considerations that impact final decisions and development of water supply systems. Understanding local priorities in water resource management decisions can allow for forming expectations of future regional water availability. In this research, the authors propose that future water availability in arid regions may be assessed by considering key projects that have been identified or planned by regional experts.

March 8, 2012: Norwich University student Adam Marenna, of Belair, Md.  Deep in the bowels of a building on the campus of the nation's oldest private military academy, students from across the globe are being taught to fight the war of the future.

AP Photo/Toby Talbot

Journal Article - Quarterly Journal: International Security

The Meaning of the Cyber Revolution: Perils to Theory and Statecraft

| Fall 2013

While decisionmakers warn about the cyber threat constantly, there is little systematic analysis of the issue from an international security studies perspective. Cyberweapons are expanding the range of possible harm between the concepts of war and peace, and give rise to enormous defense complications and dangers to strategic stability. It is detrimental to the intellectual progress and policy relevance of the security studies field to continue to avoid the cyber revolution's central questions.

Analysis & Opinions - The Mark News

By Way of Power

| August 26, 2013

"As for the perceived loss of America's much-vaunted superpower status, we simply need to come to terms with the changing reality of international relations, and accept that the United States will have to work with others to achieve its global aims. The changes of a global information age mean that even the world's only superpower can't go it alone."

Running Out of Time on Iran, and All Out of Options

Wikimedia Commons CC

Newspaper Article - The Times of Israel

Running Out of Time on Iran, and All Out of Options

    Author:
  • David Horovitz
| June 19, 2013

"...[Y]es, I think Stuxnet had a few down sides. One of those down sides was that the actual attack code became publicly available. As far as I can tell the attack code was supposed to die and not get out onto the Internet, but apparently the same way it got into Natanz [Iranian nuclear enrichment facility], it got out...."

Analysis & Opinions - The Australian

The Information Revolution Gets Political

| February 11, 2013

"Beneath the Arab political revolutions lies a deeper and longer process of radical change that is sometimes called the information revolution. We cannot yet fully grasp its implications, but it is fundamentally transforming the nature of power in the twenty-first century, in which all states exist in an environment that even the most powerful authorities cannot control as they did in the past."

Magazine Article - Reuters Magazine

Running Al Qaeda

| June 2012

"Getting second-rung leadership right is important for any enterprise, and for al Qaeda that meant assuring the brand and building network capacity for terror. Bin Laden was careful about deciding who would be anointed with two powerful gifts—his blessing of leadership, and formal affiliation of groups to al Qaeda central (a term he heard used by the media and, amazingly, appropriated)."