"Lessons on the Value of a Military Fellowship, North Korea & Iran's Nuclear Pursuits, and the Evolving Cyberspace Domain"
By Troy Endicott, Former Research Fellow, International Security Program, 2012–2013
This paper briefly covers three topics of interest—a description of the author's fellowship and its value, how nuclear weapons are still "game changers" on the 50th anniversary of the Cuban Missile Crisis, and how the cyberspace domain is reshaping military activities and doctrine in the 21st Century.
By David Kelley, Former Research Fellow, International Security Program/Project on Managing the Atom, 2012–2013
"The military buildup by China, its Asia-Pacific neighbors and the United States is creating a classical security dilemma that is increasing the potential for military conflict in the region. Although history is replete with conflicts between existing and rising powers, conflict between China and the United States is not preordained. Opportunities exist in both the diplomatic and military arenas for both countries to actively engage the other in open and direct communication to increase transparency, reduce tensions, and improve understanding. It is in the best interest of the United States, China and countries around the world to confront the reality that is a rising nuclear-armed China and, in doing so, manage its accession into the regional and world order without conflict."
By Nawaf Obaid, Visiting Fellow, Belfer Center for Science and International Affairs
"The so-called Arab Spring has ushered in a great deal of hope that a number of Arab states might begin to develop and engender more socially responsive, economically prosperous and politically progressive indigenous conditions," writes Nawaf Obaid.
"Unfortunately, in the nine Arab nations I analyze here -Tunisia, Egypt, Libya, Bahrain, Yemen, Syria, Sudan, Jordan and Iraq - this does not seem to be the case. Indeed, one might say that some or all of these nations are far worse off than they were before their social upheavals."
This report summarizes the context of natural gas development in the Iraqi Kurdistan Region (Kurdistan), assesses the major risk factors and opportunities, and presents a financial model for natural gas development projects.
"Temporary Workers or Permanent Migrants? The Kafala System and Contestations over Residency in the Arab Gulf States"
By Noora Lori, Former Research Fellow, International Security Program, August 2012–July 2013; Former Research Fellow, Dubai Initiative, September–December 2011
The Arab Gulf is the third largest receiving region for global migrants (after North America and the European Union). The six states of the Gulf Corporation Council (GCC) are the richest Arab economies, boast some of the highest GDP per capita rankings in the world, and they all depend upon guest workers in virtually every economic sector. Guest workers have played an integral role in the Gulf since the 1970s, supplying the skills and manpower needed to implement ambitious development plans. This paper examines the formal and informal institutions that support the inward flows of large numbers of foreign laborers while excluding non-citizens from full integration into Gulf societies.
November 5, 2012
By Olli Heinonen, Senior Fellow, Belfer Center for Science and International Affairs
International diplomacy efforts dealing with Iran’s nuclear program continue to fill the daily news headlines. The efforts of P5+1, the International Atomic Energy Agency (IAEA) and the United Nations Security Council (UNSC) have tried, in various formats, to encourage and enforce Iran to comply with the provisions of the Non-proliferation Treaty (NPT) and its Comprehensive Safeguards Agreement (CSA) to ensure that Iran’s nuclear program is not used as a cover for the development of nuclear weapons. The challenge of discovering what has taken place as well as currently with Iran’s nuclear ambitions is difficult not only because of Tehran’s obstructionism, but also because the same nuclear technologies, particularly uranium enrichment and spent fuel reprocessing, can be used for both civilian and military purposes.
By Ronald G. Allen, Jr., Former Research Fellow, International Security Program/Project on Managing the Atom, 2011–2012
Without significant change in the geopolitical landscape, nuclear weapons will remain a relevant portion of America's long-term national security strategy. Therefore, the burdens and responsibilities of maintaining an effective nuclear deterrent force are paramount to ensure credibility for America and her allies. Bottom line: nuclear weapons and nuclear deterrence are still relevant today and for the foreseeable future. Therefore, to maintian international strategic stability we must embrace the necessity of nuclear deterrence, develop strategic policy that supports deterrence as an essential element and adequately resource the enterprise.
By Joseph K. Michalek, Former Research Fellow, International Security Program, 2011–2012
The proliferation of threat systems and Anti-Access, Area Denial (A2/AD) strategies make performing special operations forces' (SOF) air mobility missions increasingly complicated and limit the capability to defeat air defenses and penetrate into denied airspace. Combined with an aging inventory, ill suited to evading these threats, Air Force Special Operations Command (AFSOC) and the United States Special Operations Command (USSOCOM) must look to technology to defeat the more modern threat systems and anti-access strategies. The best answer to penetrate future, denied regions is in stealth or low observable (LO) technology.
This paper offers analysis and policy recommendations for use and response to various forms of cyber action for Offensive Military Cyber Policy. It establishes a pragmatic policy-relevant, effects-based ontology for categorizing cyber capabilities, and develops a comprehensive framework for cyber policy analysis. Furthermore, it demonstrates the utility of the cyber policy analysis framework by analyzing six key categories of external cyber actions identified by our ontology, which range the entire spectrum of cyber activity. Lastly, this work develops actionable policy recommendations from our analysis for cyber policy makers while identifying critical meta-questions.
"Internet Fragmentation: Highlighting the Major Technical, Governance and Diplomatic Challenges for U.S. Policy Makers"
By Jonah Force Hill, Jonah Hill is a former Belfer Center International and Global Affairs (BIGA) Student Fellow, 2011-12
The Internet is at a crossroads. Today it is generally open, interoperable and unified. Tomorrow, however, we may see an entirely different Internet, one not characterized by openness and global reach, but by restrictions, blockages and cleavages. In order to help ensure that the Internet continues to serve as a source of global integration, democratization, and economic growth, American policymakers must be aware of the most significant technical, political and legal challenges to a unified Internet.