Middle East & North Africa

19 Items

Israeli Prime Minister Benjamin Netanyahu gives the opening speech of the 'CyberTech 2014' international conference on January 27, 2014 in Tel-Aviv.

Getty Images

Announcement - Belfer Center for Science and International Affairs, Harvard Kennedy School

Study Group with Dan Meridor on Israel's Defense in the Changing Middle East

October 5, 2015

Join Dan Meridor, former Chairman of the Foreign Affairs and Defense Committee of the Knesset, former Chairman of the committee which wrote the report on the Israel Defense Doctrine, and former Minister of Intelligence and Atomic Energy, for a three-session study group on Israel's Defense in the Changing Middle East in November.

How to Know if Iran Breaks its Word: Financial Monitoring

AP Images

Analysis & Opinions - Bulletin of the Atomic Scientists

How to Know if Iran Breaks its Word: Financial Monitoring

| May 26, 2015

In this new oped for the Bulletin of the Atomic Scientist, MTA Associate Aaron Arnold and colleague Nikos Passas consider the role of banks in monitoring and verifying proliferation-related transactions. He outlines steps that the P5+1 and Iran can take in a final agreement that will allow them to remain vigilant about proliferation financing.

Analysis & Opinions - The Huffington Post

Is Cybersecurity Like Arms Control?

| May 18, 2015

"In little more than a generation, the Internet has become the substrate of the global economy and governance worldwide. Several billion more human users will be added in the next decade, as will tens of billions of devices, ranging from thermostats to industrial control systems (the 'Internet of Things'). All of this burgeoning interdependence implies vulnerabilities that governments and non-governmental actors can exploit. At the same time, we are only beginning to come to terms with the national-security implications of this. Strategic studies of the cyber domain resemble nuclear strategy in the 1950s: analysts are still not clear about the meaning of offense, defense, deterrence, escalation, norms, and arms control."

March 8, 2012: Norwich University student Adam Marenna, of Belair, Md.  Deep in the bowels of a building on the campus of the nation's oldest private military academy, students from across the globe are being taught to fight the war of the future.

AP Photo/Toby Talbot

Journal Article - Quarterly Journal: International Security

The Meaning of the Cyber Revolution: Perils to Theory and Statecraft

| Fall 2013

While decisionmakers warn about the cyber threat constantly, there is little systematic analysis of the issue from an international security studies perspective. Cyberweapons are expanding the range of possible harm between the concepts of war and peace, and give rise to enormous defense complications and dangers to strategic stability. It is detrimental to the intellectual progress and policy relevance of the security studies field to continue to avoid the cyber revolution's central questions.

Analysis & Opinions - The Mark News

By Way of Power

| August 26, 2013

"As for the perceived loss of America's much-vaunted superpower status, we simply need to come to terms with the changing reality of international relations, and accept that the United States will have to work with others to achieve its global aims. The changes of a global information age mean that even the world's only superpower can't go it alone."

Running Out of Time on Iran, and All Out of Options

Wikimedia Commons CC

Newspaper Article - The Times of Israel

Running Out of Time on Iran, and All Out of Options

    Author:
  • David Horovitz
| June 19, 2013

"...[Y]es, I think Stuxnet had a few down sides. One of those down sides was that the actual attack code became publicly available. As far as I can tell the attack code was supposed to die and not get out onto the Internet, but apparently the same way it got into Natanz [Iranian nuclear enrichment facility], it got out...."

Report - Council on Foreign Relations Press

Global Korea: South Korea's Contributions to International Security

    Authors:
  • Scott Bruce
  • John Hemmings
  • Balbina Y. Hwang
  • Scott Snyder
| October 2012

Given the seriousness of the ongoing standoff on the Korean peninsula, South Korea's emergence as an active contributor to international security addressing challenges far from the Korean peninsula is a striking new development, marking South Korea's emergence as a producer rather than a consumer of global security resources. This volume outlines South Korea's progress and accomplishments toward enhancing its role and reputation as a contributor to international security.

Report Chapter

South Korea's Counterpiracy Operations in the Gulf of Aden

| October 2012

In March 2009, the South Korean National Assembly approved the first foreign deployment of South Korea's naval forces to join the U.S.-led Combined Task Force (CTF-151). The purpose of CTF-151 is to conduct antipiracy operations in the Gulf of Aden and off Somalia's east coast by the Horn of Africa. South Korea joined the navies of twenty four other countries that participate in the Combined Maritime Forces (CMF) through one of three combined task forces, CTF-150, CTF-151, and CTF-152, to help ensure maritime security in this region. The CMF is an international effort to conduct maritime security operations in the Gulf of Aden, the Arabian Sea, and the Indian Ocean.