Middle East & North Africa

62 Items

How Saudi Arabia and China Could Partner on Solar Energy

AP/Andy Wong

Analysis & Opinions - Axios

How Saudi Arabia and China Could Partner on Solar Energy

| Jan. 24, 2019

Last May, Chinese solar panel manufacturer LONGi signed an agreement with Saudi trading company El Seif Group to establish large-scale solar manufacturing infrastructure in Saudi Arabia. The deal came several months after the Trump administration's imposition of global tariffs on imports of Chinese solar panels and cells.

Russian President Vladimir Putin speaks during his annual news conference in Moscow

AP/Alexander Zemlianichenko

Journal Article - Bulletin of the Atomic Scientists

How the Next Nuclear Arms Race Will Be Different from the Last One

| 2019

All the world's nuclear-armed states (except for North Korea) have begun modernizing and upgrading their arsenals, leading many observers to predict that the world is entering a new nuclear arms race. While that outcome is not yet inevitable, it is likely, and if it happens, the new nuclear arms race will be different and more dangerous than the one we remember. More nuclear-armed countries in total, and three competing great powers rather than two, will make the competition more complex. Meanwhile, new non-nuclear weapon technologies — such as ballistic missile defense, anti-satellite weapons, and precision-strike missile technology — will make nuclear deterrence relationships that were once somewhat stable less so.

A worker is silhouetted against a computer display showing a live visualization of the online phishing and fraudulent phone calls across China during the 4th China Internet Security Conference in Beijing. Aug. 16, 2016 (Ng Han Guan/Associated Press, File). Keywords: China, cyberattack

Ng Han Guan/Associated Press, File

Newspaper Article - The Wall Street Journal

Review: An Uneasy Unpeace

| Jan. 21, 2018

In the cyber arena, the same technologies that are creating unprecedented benefits for billions are also democratizing destruction. Graham Allison reviews ‘The Virtual Weapon and International Order’ by Lucas Kello.

Russian President Vladimir Putin, right, shakes hands with Iranian President Hassan Rouhani

AP Photo/Sergei Karpukhin

Analysis & Opinions - Foreign Policy

What Would U.S. Withdrawal From the Iran Nuclear Deal Look Like?

| Aug. 31, 2017

Judging the Trump administration to be incapable of formulating a diplomatic campaign in support of one of its highest foreign policy priorities, John Bolton, a former U.S. ambassador to the United Nations, published an Iran deal exit strategy in the National Review on Monday. The document is less about why the United States should leave the Joint Comprehensive Plan of Action, and more about how to do so.

Los Alamos National Laboratory, National Security Science, July 2015

Los Alamos National Laboratory

Discussion Paper - Managing the Atom Project, Belfer Center

When Did (and Didn’t) States Proliferate?

| June 2017

In this Project on Managing the Atom Discussion Paper, Philipp C. Bleek chronicles nuclear weapons proliferation choices throughout the nuclear age. Since the late 1930s and early 1940s, some thirty-one countries are known to have at least explored the possibility of establishing a nuclear weapons program. Seventeen of those countries launched weapons programs, and ten acquired deliverable nuclear weapons.

What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment

AP

Journal Article - Quarterly Journal: International Security

What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment

    Author:
  • Rebecca Slayton
| Winter 2016/17

Does cyberspace favor the offense, as many analysts and policymakers claim? Three factors undermine any cyber offensive advantage, as demonstrated in a cost-benefit analysis of the Stuxnet operation against Iran. First, any measurement of the offense-defense balance must consider a cyber operation’s value as well as its cost to both sides. Second, organizational capabilities play a significant role in determining the balance. Third, offensive advantages decline when attackers target physical infrastructure rather than information networks.