Middle East & North Africa

16 Items

Israeli Prime Minister Benjamin Netanyahu gives the opening speech of the 'CyberTech 2014' international conference on January 27, 2014 in Tel-Aviv.

Getty Images

Announcement - Belfer Center for Science and International Affairs, Harvard Kennedy School

Study Group with Dan Meridor on Israel's Defense in the Changing Middle East

October 5, 2015

Join Dan Meridor, former Chairman of the Foreign Affairs and Defense Committee of the Knesset, former Chairman of the committee which wrote the report on the Israel Defense Doctrine, and former Minister of Intelligence and Atomic Energy, for a three-session study group on Israel's Defense in the Changing Middle East in November.

Analysis & Opinions - The Huffington Post

Is Cybersecurity Like Arms Control?

| May 18, 2015

"In little more than a generation, the Internet has become the substrate of the global economy and governance worldwide. Several billion more human users will be added in the next decade, as will tens of billions of devices, ranging from thermostats to industrial control systems (the 'Internet of Things'). All of this burgeoning interdependence implies vulnerabilities that governments and non-governmental actors can exploit. At the same time, we are only beginning to come to terms with the national-security implications of this. Strategic studies of the cyber domain resemble nuclear strategy in the 1950s: analysts are still not clear about the meaning of offense, defense, deterrence, escalation, norms, and arms control."

News - Managing the Atom Project, Belfer Center

Fresh Ideas for the Future: Symposium on the NPT Nuclear Disarmament, Non-proliferation, and Energy

Apr. 30, 2015

On April 28, the Project on Managing the Atom joined the James Martin Center for Nonproliferation Studies at the Middlebury Institute of International Studies at Monterey, The Netherlands government, and the United Nations Office for Disarmament Affairs (UNODA) in convening nuclear nonproliferation experts from around the world at the United Nations to participate in a Symposium on the 2015 Nonproliferation Treaty (NPT) Review Conference.

Afreen Siddiqi (3rd from left) visits a self-contained solar/hydroponic system in Jordan.

Jade Salhab

- Belfer Center Newsletter

Center Multidisciplinary Team Tackles Energy and Water Challenges

Spring 2014

With a team of scientists, engineers, and political scientists, the Center’s Science, Technology, and Public Policy Program (STPP) and Energy Technology Innovation Policy group (ETIP) are tackling critical global issues related to energy challenges and water-energy connections. During the past few months, STPP/ETIP faculty, fellows, and visiting scholars have conducted research, made presentations, and held high-level discussions in the U.S., China, and the Gulf region.The work is a joint effort of STPP and the Belfer Center’s Environment and Natural Resources Program (ENRP) along with Harvard Kennedy School’s Sustainability Science Program.

March 8, 2012: Norwich University student Adam Marenna, of Belair, Md.  Deep in the bowels of a building on the campus of the nation's oldest private military academy, students from across the globe are being taught to fight the war of the future.

AP Photo/Toby Talbot

Journal Article - Quarterly Journal: International Security

The Meaning of the Cyber Revolution: Perils to Theory and Statecraft

| Fall 2013

While decisionmakers warn about the cyber threat constantly, there is little systematic analysis of the issue from an international security studies perspective. Cyberweapons are expanding the range of possible harm between the concepts of war and peace, and give rise to enormous defense complications and dangers to strategic stability. It is detrimental to the intellectual progress and policy relevance of the security studies field to continue to avoid the cyber revolution's central questions.

Running Out of Time on Iran, and All Out of Options

Wikimedia Commons CC

Newspaper Article - The Times of Israel

Running Out of Time on Iran, and All Out of Options

    Author:
  • David Horovitz
| June 19, 2013

"...[Y]es, I think Stuxnet had a few down sides. One of those down sides was that the actual attack code became publicly available. As far as I can tell the attack code was supposed to die and not get out onto the Internet, but apparently the same way it got into Natanz [Iranian nuclear enrichment facility], it got out...."

Presentation

Cyber Disorders: Rivalry and Conflict in a Global Information Age

| May 3, 2012

The risks posed by the proliferation of cyber weapons are gaining wide recognition among security planners. Yet the general reaction of scholars of international relations has been to neglect the cyber peril owing to its technical novelties and intricacies. This attitude amounts to either one or both of two claims: the problem is not of sufficient scale to warrant close inspection, or it is not comprehensible to a non-technical observer. This seminar challenged both assertions.

Aug. 23, 2010: Technicians at work in the Bushehr nuclear power plant, Bushehr, Iran. Iran has confirmed that Stuxnet infected several personal laptops of Bushehr employees but that plant systems were unaffected.

AP Photo

Analysis & Opinions - Today's Zaman

Cyber War and Peace

| April 10, 2012

"Cyber war, though only incipient at this stage, is the most dramatic of the potential threats. Major states with elaborate technical and human resources could, in principle, create massive disruption and physical destruction through cyber attacks on military and civilian targets. Responses to cyber war include a form of interstate deterrence through denial and entanglement, offensive capabilities, and designs for rapid network and infrastructure recovery if deterrence fails. At some point, it may be possible to reinforce these steps with certain rudimentary norms and arms control, but the world is at an early stage in this process."