By Nawaf Obaid, Visiting Fellow, Belfer Center for Science and International Affairs
"The so-called Arab Spring has ushered in a great deal of hope that a number of Arab states might begin to develop and engender more socially responsive, economically prosperous and politically progressive indigenous conditions," writes Nawaf Obaid.
"Unfortunately, in the nine Arab nations I analyze here -Tunisia, Egypt, Libya, Bahrain, Yemen, Syria, Sudan, Jordan and Iraq - this does not seem to be the case. Indeed, one might say that some or all of these nations are far worse off than they were before their social upheavals."
This report summarizes the context of natural gas development in the Iraqi Kurdistan Region (Kurdistan), assesses the major risk factors and opportunities, and presents a financial model for natural gas development projects.
"Temporary Workers or Permanent Migrants? The Kafala System and Contestations over Residency in the Arab Gulf States"
By Noora Lori, Former Research Fellow, International Security Program, August 2012–July 2013; Former Research Fellow, Dubai Initiative, September–December 2011
The Arab Gulf is the third largest receiving region for global migrants (after North America and the European Union). The six states of the Gulf Corporation Council (GCC) are the richest Arab economies, boast some of the highest GDP per capita rankings in the world, and they all depend upon guest workers in virtually every economic sector. Guest workers have played an integral role in the Gulf since the 1970s, supplying the skills and manpower needed to implement ambitious development plans. This paper examines the formal and informal institutions that support the inward flows of large numbers of foreign laborers while excluding non-citizens from full integration into Gulf societies.
November 5, 2012
By Olli Heinonen, Senior Fellow, Belfer Center for Science and International Affairs
International diplomacy efforts dealing with Iran’s nuclear program continue to fill the daily news headlines. The efforts of P5+1, the International Atomic Energy Agency (IAEA) and the United Nations Security Council (UNSC) have tried, in various formats, to encourage and enforce Iran to comply with the provisions of the Non-proliferation Treaty (NPT) and its Comprehensive Safeguards Agreement (CSA) to ensure that Iran’s nuclear program is not used as a cover for the development of nuclear weapons. The challenge of discovering what has taken place as well as currently with Iran’s nuclear ambitions is difficult not only because of Tehran’s obstructionism, but also because the same nuclear technologies, particularly uranium enrichment and spent fuel reprocessing, can be used for both civilian and military purposes.
By Ronald G. Allen, Jr., Former Research Fellow, International Security Program/Project on Managing the Atom, 2011–2012
Without significant change in the geopolitical landscape, nuclear weapons will remain a relevant portion of America's long-term national security strategy. Therefore, the burdens and responsibilities of maintaining an effective nuclear deterrent force are paramount to ensure credibility for America and her allies. Bottom line: nuclear weapons and nuclear deterrence are still relevant today and for the foreseeable future. Therefore, to maintian international strategic stability we must embrace the necessity of nuclear deterrence, develop strategic policy that supports deterrence as an essential element and adequately resource the enterprise.
By Joseph K. Michalek, Former Research Fellow, International Security Program, 2011–2012
The proliferation of threat systems and Anti-Access, Area Denial (A2/AD) strategies make performing special operations forces' (SOF) air mobility missions increasingly complicated and limit the capability to defeat air defenses and penetrate into denied airspace. Combined with an aging inventory, ill suited to evading these threats, Air Force Special Operations Command (AFSOC) and the United States Special Operations Command (USSOCOM) must look to technology to defeat the more modern threat systems and anti-access strategies. The best answer to penetrate future, denied regions is in stealth or low observable (LO) technology.
This paper offers analysis and policy recommendations for use and response to various forms of cyber action for Offensive Military Cyber Policy. It establishes a pragmatic policy-relevant, effects-based ontology for categorizing cyber capabilities, and develops a comprehensive framework for cyber policy analysis. Furthermore, it demonstrates the utility of the cyber policy analysis framework by analyzing six key categories of external cyber actions identified by our ontology, which range the entire spectrum of cyber activity. Lastly, this work develops actionable policy recommendations from our analysis for cyber policy makers while identifying critical meta-questions.
"Internet Fragmentation: Highlighting the Major Technical, Governance and Diplomatic Challenges for U.S. Policy Makers"
By Jonah Force Hill, Former Belfer IGA Fellow 2011–2012
The Internet is at a crossroads. Today it is generally open, interoperable and unified. Tomorrow, however, we may see an entirely different Internet, one not characterized by openness and global reach, but by restrictions, blockages and cleavages. In order to help ensure that the Internet continues to serve as a source of global integration, democratization, and economic growth, American policymakers must be aware of the most significant technical, political and legal challenges to a unified Internet.
By Steven E. Miller, Director, International Security Program; Editor-in-Chief, International Security; Co-Principal Investigator, Project on Managing the Atom, Wael Al-Assad, Jayantha Dhanapala, C. Raja Mohan and Ta Minh Tuan
Nearly all of the 190 signatories to the Nuclear Non-Proliferation Treaty (NPT) agree that the forty-two-year-old treaty is fragile and in need of fundamental reform. But gaining consensus on how to fix the NPT will require reconciling the sharply differing views of nuclear weapon states and non-nuclear weapon states. Strengthening the international rules is increasingly important as dozens of countries, including some with unstable political environments, explore nuclear energy. The result is an ever-increasing distribution of this technology. In this paper, Steven E. Miller outlines the main points of contention within the NPT regime and identifies the issues that have made reform so difficult.
In today's interconnected world, the Internet is no longer a tool. Rather, it is a service that helps generate income and employment, provides access to business and information, enables e-learning, and facilitates government activities. It is an essential service that has been integrated into every part of our society. Our experience begins when an Internet Service Provider (ISP) uses fixed telephony (plain old telephone service), mobile-cellular telephony, or fixed fiber-optic or broadband service to connect us to the global network. From that moment on, the ISP shoulders the responsibility for the instantaneous, reliable, and secure movement of our data over the Internet.