or

Organizational Responses to COVID-19 and Climate Change: A Conversation with Rebecca Henderson

Rebecca Henderson, the John and Natty McArthur University Professor at Harvard University, shared her perspectives on how large organizations are changing in response to the coronavirus pandemic and climate change in the newest episode of “Environmental Insights: Discussions on Policy and Practice from the Harvard Environmental Economics Program.”




or

Harvard Business School Professor Rebecca Henderson Outlines Ways Organizations are Changing in Response to the Coronavirus Pandemic and Climate Change in New Edition of "Environmental Insights"

Rebecca Henderson, the John and Natty McArthur University Professor at Harvard University, shared her perspectives on how large organizations are changing in response to the coronavirus pandemic and climate change in the newest episode of "Environmental Insights: Discussions on Policy and Practice from the Harvard Environmental Economics Program," a podcast produced by the Harvard Environmental Economics Program. Listen to the interview here. Listen to the interview here.




or

Action on Plastic: On Track with the Regional Action Plan for the Arctic

In October 2019, the Belfer Center's Arctic Initiative and the Wilson Center's Polar Institute co-hosted a workshop on Policy and Action on Plastic in the Arctic Ocean with the Icelandic Chairmanship of the Arctic Council. The Arctic Council asked Magnús Jóhannesson, the Council's designated Special Coordinator on Plastics Pollution and Marine Litter, and Gunn-Britt Retter, Head of Arctic and Environmental Unit at the Saami Council — who both participated in the workshop — to comment on some of the points that the report raises.




or

The Arctic is Transforming… Can We?

Joel Clement describes how the Arctic is transforming into a warmer, wetter, and less predictable climate state, what the consequences are for the Arctic's indigenous inhabitants, and what measures can be taken to build resilience.




or

Hutchins Roundup: Consumer spending, salary history bans, and more.

Studies in this week’s Hutchins Roundup find that consumer spending has fallen sharply because of COVID-19, salary history bans have increased women’s earnings relative to men’s, and more. Want to receive the Hutchins Roundup as an email? Sign up here to get it in your inbox every Thursday. Consumer spending falls sharply because of COVID-19…

       




or

American workers’ safety net is broken. The COVID-19 crisis is a chance to fix it.

The COVID-19 pandemic is forcing some major adjustments to many aspects of our daily lives that will likely remain long after the crisis recedes: virtual learning, telework, and fewer hugs and handshakes, just to name a few. But in addition, let’s hope the crisis also drives a permanent overhaul of the nation’s woefully inadequate worker…

       




or

What’s the Fed doing in response to the COVID-19 crisis? What more could it do?

The coronavirus crisis in the United States—and the associated business closures, event cancellations, and work-from-home policies—has triggered a deep economic downturn of uncertain duration. The Federal Reserve has stepped in with a broad array of actions to limit the economic damage from the pandemic, including up to $2.3 trillion in lending to support households, employers, financial…

       




or

How did COVID-19 disrupt the market for U.S. Treasury debt?

The COVID-19 pandemic—in addition to posing a severe threat to public health—has disrupted the economy and financial markets, and prompted a strong desire among investors for safe and liquid securities. In that environment, one might expect U.S. Treasury securities to be the investment of choice, but for a while in March, the $18 trillion market…

       




or

Making sense of the monthly jobs report during the COVID-19 pandemic

The monthly jobs report—the unemployment rate from one survey and the change in employer payrolls from another survey—is one of the most closely watched economic indicators, particularly at a time of an economic crisis like today. Here’s a look at how these data are collected and how to interpret them during the COVID-19 pandemic. What…

       




or

Hutchins Roundup: Stimulus checks, team players, and more.

Studies in this week’s Hutchins Roundup find that households with low liquidity are more likely to spend their stimulus checks, social skills predict group performance as well as IQ, and more. Want to receive the Hutchins Roundup as an email? Sign up here to get it in your inbox every Thursday. Households with low liquidity…

       




or

Class Notes: Harvard Discrimination, California’s Shelter-in-Place Order, and More

This week in Class Notes: California's shelter-in-place order was effective at mitigating the spread of COVID-19. Asian Americans experience significant discrimination in the Harvard admissions process. The U.S. tax system is biased against labor in favor of capital, which has resulted in inefficiently high levels of automation. Our top chart shows that poor workers are much more likely to keep commuting in…

       




or

Factoring Pandemic Risks into Financial Modelling

Today’s economic crisis leaves us with an unsettling and perplexing regret. Why weren’t financial portfolios already adjusted for risks that stem from health events such as pandemics? After all, financial portfolios are adjusted for liquidity risks, market risks, credit risks, and even operational and political risks.




or

Letter from London on the coronavirus: An order to stay apart brought us together

Dear America,

In London there is much talk of a new “spirit of the Blitz” in the face of another deadly threat to us all.

But 80 years on, that spirit is expressing itself very differently. When the Luftwaffe bombs fell, to continue with normal life was an act of patriotic defiance. Now as COVID-19 spreads, to continue with normal life is an act of punishable deviance.




or

Selective Wilsonianism: Material Interests and the West's Support for Democracy

Analysis of the West's differing responses to Ukrainian and Armenian mass movements reveal that, contrary to the popular Wilsonian narrative, the West assists democratic movements only when that assistance coincides with its material interests.




or

No, the Coronavirus Will Not Change the Global Order

Joseph Nye advises skepticism toward claims that the pandemic changes everything. China won't benefit, and the United States will remain preeminent.




or

The Global Pandemic Has Spawned New Forms of Activism — and They're Flourishing

The authors have identified nearly 100 distinct methods of nonviolent action that include physical, virtual and hybrid actions.




or

Action on Plastic: On Track with the Regional Action Plan for the Arctic

In October 2019, the Belfer Center's Arctic Initiative and the Wilson Center's Polar Institute co-hosted a workshop on Policy and Action on Plastic in the Arctic Ocean with the Icelandic Chairmanship of the Arctic Council. The Arctic Council asked Magnús Jóhannesson, the Council's designated Special Coordinator on Plastics Pollution and Marine Litter, and Gunn-Britt Retter, Head of Arctic and Environmental Unit at the Saami Council — who both participated in the workshop — to comment on some of the points that the report raises.




or

So Do Morals Matter in U.S. Foreign Policy? I Asked the Expert.

In his new book, Do Morals Matter? Presidents and Foreign Policy from FDR to Trump, Joseph S. Nye developed a scorecard to determine how U.S. presidents since 1945 factored questions of ethics and morality into their foreign policy. In an interview, Henry Farrell asked him a few questions to get to the heart of his findings.




or

The Arctic is Transforming… Can We?

Joel Clement describes how the Arctic is transforming into a warmer, wetter, and less predictable climate state, what the consequences are for the Arctic's indigenous inhabitants, and what measures can be taken to build resilience.




or

The United States Forgot Its Strategy for Winning Cold Wars

Stephen Walt writes that arguments against U.S. offshore balancing misunderstand history. The strategy that worked against the Soviet Union can work against China.




or

Africa in the news: Tunisia and Mozambique vote, Nigeria closes borders, and Kenya opens new railway

Tunisia and Mozambique vote: On Sunday, October 13, Tunisians participated in their run-off presidential elections between conservative former law professor Kais Saied and media magnate Nabil Karoui. Saied, known as “Robocop” for his serious presentation, won with 72.7 percent of the vote. Notably, Saied himself does not belong to a party, but is supported by…

       




or

Reforming Tunisia’s military courts

As Tunisia’s newly-elected parliamentarians take their seats, a number of democratic reforms await their attention. Amnesty International has already highlighted five key areas, including the state of emergency, security force abuses, transitional justice, the constitutional court, and the death penalty. To this list we would humbly add a sixth: reforming, if not abolishing, the military…

       




or

The Overwhelming Case for No First Use

The arguments in favor of the United States' declaring that the only purpose of its nuclear weapons is to deter others who possess them from using theirs — in other words, that in no circumstances will this country use nuclear weapons first — are far stronger than the arguments against this stance. It must be hoped that the next US administration will take this no-first-use step promptly.




or

Why is the United States So Bad at Foreign Policy?

Stephen Walt writes that the United States' unusual historical experience, geographic isolation, large domestic market, and general ignorance have weakened its ability to make viable foreign-policy strategies.




or

What Makes for a Moral Foreign Policy?

Joseph Nye's new book rates the efforts of presidents from FDR to Trump.




or

The Need for Creative and Effective Nuclear Security Vulnerability Assessment and Testing

Realistic, creative vulnerability assessment and testing are critical to finding and fixing nuclear security weaknesses and avoiding over-confidence. Both vulnerability assessment and realistic testing are needed to ensure that nuclear security systems are providing the level of protection required. Systems must be challenged by experts thinking like adversaries, trying to find ways to overcome them. Effective vulnerability assessment and realistic testing are more difficult in the case of insider threats, and special attention is needed. Organizations need to find ways to give people the mission and the incentives to find nuclear security weaknesses and suggest ways they might be fixed. With the right approaches and incentives in place, effective vulnerability assessment and testing can be a key part of achieving and sustaining high levels of nuclear security.




or

Arms Control Agreement With Russia Should Cover More Than Nuclear Weapons

With the Russia investigation and impeachment behind him, President Trump finally may feel empowered to engage with Russian President Vladimir Putin and pursue an arms control deal.  




or

How Do Past Presidents Rank in Foreign Policy?

How do presidents incorporate morality into decisions involving the national interest? Moral considerations explain why Truman, who authorized the use of nuclear weapons in Japan during World War II, later refused General MacArthur's request to use them in China during the Korean War. What is contextual intelligence, and how does it explain why Bush 41 is ranked first in foreign policy, but Bush 43 is found wanting? Is it possible for a president to lie in the service of the public interest? In this episode, Professor Joseph S. Nye considers these questions as he explores the role of morality in presidential decision-making from FDR to Trump.




or

Budapest Memorandum at 25: Between Past and Future

On December 5, 1994, leaders of the United States, the United Kingdom, and the Russian Federation met in Budapest, Hungary, to pledge security assurances to Ukraine in connection with its accession to the Treaty on the Nonproliferation of Nuclear Weapons (NPT) as a non-nuclear-weapons state. The signature of the so-called Budapest Memorandum concluded arduous negotiations that resulted in Ukraine’s agreement to relinquish the world’s third-largest nuclear arsenal, which the country inherited from the collapsed Soviet Union, and transfer all nuclear warheads to Russia for dismantlement. The signatories of the memorandum pledged to respect Ukraine’s territorial integrity and inviolability of its borders, and to refrain from the use or threat of military force. Russia breached these commitments with its annexation of Crimea in 2014 and aggression in eastern Ukraine, bringing the meaning and value of security assurance pledged in the Memorandum under renewed scrutiny.

On the occasion of the 25th anniversary of the memorandum’s signature, the Project on Managing the Atom at the Belfer Center for Science & International Affairs at the Harvard Kennedy School, with the support of the Center for U.S.-Ukrainian Relations and the Harvard Ukrainian Research Institute, hosted a conference to revisit the history of the Budapest Memorandum, consider the repercussions of its violation for international security and the broader nonproliferation regime, and draw lessons for the future. The conference brought together academics, practitioners, and experts who have contributed to developing U.S. policy toward post-Soviet nuclear disarmament, participated in the negotiations of the Budapest Memorandum, and dealt with the repercussions of its breach in 2014. The conference highlighted five key lessons learned from the experience of Ukraine’s disarmament, highlighted at the conference.




or

Public Testimony on Trump Administration Funding for Nuclear Theft Preventing Programs

A nuclear explosion detonated anywhere by a terrorist group would be a global humanitarian, economic, and political catastrophe. The current COVID-19 pandemic reminds us not to ignore prevention of and preparation for low-probability, high-consequence disasters. For nuclear terrorism, while preparation is important, prevention must be the top priority. The most effective strategy for keeping nuclear weapons out of the hands of terrorists is to ensure that nuclear materials and facilities around the world have strong and sustainable security. Every president for more than two decades has made strengthening nuclear security around the globe a priority. This includes the Trump administration, whose 2018 Nuclear Posture Review states: “[n]uclear terrorism remains among the most significant threats to the security of the United States, allies, and partners.”




or

So Do Morals Matter in U.S. Foreign Policy? I Asked the Expert.

In his new book, Do Morals Matter? Presidents and Foreign Policy from FDR to Trump, Joseph S. Nye developed a scorecard to determine how U.S. presidents since 1945 factored questions of ethics and morality into their foreign policy. In an interview, Henry Farrell asked him a few questions to get to the heart of his findings.




or

Maxwell Taylor's Cold War: From Berlin to Vietnam

Nathaniel Moir reviews Maxwell Taylor's Cold War: From Berlin to Vietnam by Ingo Trauschweizer.




or

Defense Playbook for Campaigns

The 2018 National Defense Strategy (NDS) is predicated on a single organizing principle: America’s military pre-eminence is rapidly eroding. This is not a new concept. For years, experts have warned that the economic and technological advancements of U.S. adversaries, coupled with the 2008 financial crisis and America’s focus on peripheral conflicts, have caused a decline in America’s military dominance. 

In this context, the advances of near-peer competitors such as China and Russia have created plausible “theories of victory” in potential conflicts across Eastern Europe and East Asia. Competitors’ unaddressed improvements in strategic innovation, economic investment, and dual-use technology increases the risk of conflict and strains the U.S. alliance system. It is urgent that the United States reestablish and maintain credible deterrents against these near-peer competitors. After decades of focusing on post-Cold War ‘shaping’ operations, the American military needs to reinvigorate for full spectrum great power competition.

This report is intended as a blueprint on how to begin that process from graduate students at the Belfer Center for Science and International Affairs at Harvard University. Contained inside are 12 memorandums. Each provides a high-level overview and specific recommendations on a key issue of American defense policy. 




or

Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance

Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance




or

Spies Are Fighting a Shadow War Against the Coronavirus

Calder Walton describes four ways how intelligence services are certain to contribute to defeating COVID-19 and why pandemic intelligence will become a central part of future U.S. national security.




or

No, the Coronavirus Will Not Change the Global Order

Joseph Nye advises skepticism toward claims that the pandemic changes everything. China won't benefit, and the United States will remain preeminent.




or

So Do Morals Matter in U.S. Foreign Policy? I Asked the Expert.

In his new book, Do Morals Matter? Presidents and Foreign Policy from FDR to Trump, Joseph S. Nye developed a scorecard to determine how U.S. presidents since 1945 factored questions of ethics and morality into their foreign policy. In an interview, Henry Farrell asked him a few questions to get to the heart of his findings.




or

This Virus Is Tough, but History Provides Perspective: The 1968 Pandemic and the Vietnam War

Nathaniel L. Moir recounts the events of 1968: The war in Vietnam and extensive civil unrest in the United States — and yet another big problem that made life harder. In 1968, the H3N2 pandemic killed more individuals in the United States than the combined total number of American fatalities during both the Vietnam and Korean Wars.




or

Romney's Reckless China Rhetoric Risks New Cold War

Rachel Esplin Odell argues for a wiser and more conservative strategy that resists the temptation to exaggerate the challenge posed by China.




or

The United States Forgot Its Strategy for Winning Cold Wars

Stephen Walt writes that arguments against U.S. offshore balancing misunderstand history. The strategy that worked against the Soviet Union can work against China.




or

Maxwell Taylor's Cold War: From Berlin to Vietnam

Nathaniel Moir reviews Maxwell Taylor's Cold War: From Berlin to Vietnam by Ingo Trauschweizer.




or

The Economic Gains of Cloud Computing: An Address by Federal Chief Information Officer Vivek Kundra

Event Information

April 7, 2010
9:00 AM - 11:00 AM EDT

Falk Auditorium
The Brookings Institution
1775 Massachusetts Ave., NW
Washington, DC

Register for the Event

Cloud computing services over the Internet have the potential to spur a significant increase in government efficiency and decrease technology costs, as well as to create incentives and online platforms for innovation. Adoption of cloud computing technologies could lead to new, efficient ways of governing.

On April 7, the Brookings Institution hosted a policy forum that examines the economic benefits of cloud computing for local, state, and federal government. Federal Chief Information Officer Vivek Kundra delivered a keynote address on the role of the government in developing and promoting cloud computing. Brookings Vice President Darrell West moderated a panel of experts and detailed the findings in his paper, "Saving Money through Cloud Computing," which analyzes its governmental cost-savings potential.

After the program, panelists took audience questions.

Video

Audio

Transcript

Event Materials

     
 
 




or

Steps to Improve Cloud Computing in the Public Sector


Executive Summary

Government information technology is subject to a variety of rules, regulations, and procurement policies.  Computing is treated differently depending on whether the platform is based on desktops, laptops, mobile devices, or remote file servers known as cloud computing.  There are differences between the executive, legislative, and judicial branches of government, as well as in the level of privacy and security expected for various applications.  

Some people perceive higher security on desktop or laptop computers and lower security with the cloud because the latter’s information is stored remotely through third-party commercial providers.  In reality, though, there are serious security threats to all electronic information regardless of platform, and cloud server providers often take security more seriously than mass consumers or government officials employing weak passwords on their local computers. 

In this paper, I review current federal IT policy and discuss rules, practices, and procedures that limit innovation.  There are a variety of obstacles that make it difficult for policymakers to take full advantage of the technological revolution that has unfolded in recent years.  After outlining these issues, I make recommendations on policy changes required to improve the efficiency and effectiveness of federal computing. 

My specific recommendations include:

  1. Public officials should develop more consistent rules on computing across desktop, laptop, mobile, and cloud platforms.  
  2. The use of video, collaboration, and social networking should be authorized for congressional offices.  This would make legislative branch policy consistent with that of the executive branch.
  3. Judicial branch computing should be modernized, with greater emphasis on cloud computing. 
  4. There should be a more uniform certification process for federal agencies.  Right now, each agency is responsible for certifying its own applications.  It makes sense to have a “joint authorization board” with the power to review management services and certify particular products for use across the government. 
  5. Congress should update the Electronic Communications Privacy Act to change the process by which law enforcement agents obtain electronic information.  Instead of using a prosecutor’s subpoena, legislation should require a “probable cause” search warrant that is approved by a judge.  This would provide greater safeguards in terms of online content, pictures, geolocation data, and e-mails.
  6. Privacy rights should be placed on the same footing regardless of whether a person is using desktop or cloud computing.  It makes little sense to have weaker standards on one platform than another.  Consumers and government decision-makers expect the same level of protection whether they are accessing information on a desktop, laptop, mobile, or cloud storage system. 
  7. Congress should amend the Computer Fraud and Abuse Act to strengthen penalties for unwanted intrusion into computing systems.  The law has inconsistent penalties and prosecutors have found that it is hard to prosecute cyber-crimes. 
  8. Apps.gov represents a big step forward and government use should be expanded because it makes procurement easier and speeds public sector innovation.  It is a model of how the government can reinvent itself through digital technology in ways that improve efficiency and effectiveness.
  9. Countries need to harmonize their laws on cloud computing so as to reduce current inconsistencies in regard to privacy, data storage, security processes, and personnel training,  
  10. There should be mechanisms for data exchange that encourage portability across platforms.  We should avoid vendor lock-in that precludes data exchange.
  11. Data on uptime, downtime, recover time, archiving, and maintenance schedules would help build public trust by providing information on computing performance.

Downloads

Authors

Image Source: Martin Barraud
     
 
 




or

Moving to the Cloud: How the Public Sector Can Leverage the Power of Cloud Computing

Event Information

July 21, 2010
10:00 AM - 12:00 PM EDT

Falk Auditorium
The Brookings Institution
1775 Massachusetts Ave., NW
Washington, DC

Register for the Event

The U.S. government spends billions of dollars each year on computer hardware, software and file servers that may no longer be necessary. Currently, the public sector makes relatively little use of cloud computing, even though studies suggest substantial government savings from a migration to more Internet-based computing with shared resources.

On July 21, the Center for Technology Innovation at Brookings hosted a policy forum on steps to enhance public sector adoption of cloud computing innovations. Brookings Vice President Darrell West moderated a panel of experts, including David McClure of the General Services Administration, Dawn Leaf of the National Institute for Standards and Technology, and Katie Ratte of the Federal Trade Commission. West released a paper detailing the policy changes required to improve the efficiency and effectiveness of federal computing.

Audio

Transcript

Event Materials

     
 
 




or

Technology and the Federal Government: Recommendations for the Innovation Advisory Board


Our former Brookings colleague Rebecca Blank, now at the Commerce Department, is today leading the first meeting of the Obama Administration’s Innovation Advisory Board, looking at the innovative capacity and economic competitiveness of the United States.

I applaud the effort.  Nothing is more important to America’s longterm competitiveness than emphasizing innovation.  As the council looks to the private sector and global markets, I urge it to examine how the U.S. government can lead innovation and contribute to economic growth.  The best place to look is new and emerging digital technologies that can make government more accessible, accountable, responsive and efficient for the people who use government services every day.

Here are some of the recommendations I made in a recent paper I wrote with colleagues here at Brookings as part of our “Growth Through Innovation” initiative:

  • Save money and gain efficiency by moving federal IT functions “to the cloud,” i.e., using advances in cloud computing to put software, hardware, services and data storage through remote file servers.

  • Continue to prioritize the Obama administration’s existing efforts to put unparalleled amounts of data online at Data.gov and other federal sites, making it easier and cheaper for citizens and businesses to access the information they need.

  • Use social media networks to deliver information to the public and to solicit feedback to improve government performance.

  • Integrate ideas and operations with state and local organizations, where much of government innovation is taking place today. 

  • Apply the methods of private-sector business planning to the public sector to produce region-specific business plans that are low cost and high impact.

These improvements in government services innovations in the digital age can help spur innovation and support a robust business climate.  And, as a sorely needed side benefit, they can also serve to eliminate some of the current distrust and even contempt for government that has brought public approval of the performance of the federal government to near historic lows.  



Authors

Image Source: © Mario Anzuoni / Reuters
     
 
 




or

Addressing Export Control in the Age of Cloud Computing


Executive Summary

The move to the cloud is one of the defining information technology trends of the early 21st century. By providing businesses, universities, government agencies, and other entities with access to shared and often physically dispersed computing resources, cloud computing can simultaneously offer increased flexibility, reduced cost, and access to a wider array of services.

Cloud computing has also created a set of new challenges. For example, the issues of privacy and security in the cloud are well recognized and have been extensively discussed in the business and popular press. However, one critical issue that has received very little attention with respect to cloud computing is export control.

In the broadest sense, export control relates to regulations that the United States and many other countries have put in place to restrict the export of various sensitive items, information, and software.

There is an inherent tension between cloud computing and export control. While the concept of the cloud is centered on the premise of removing the need to track the details of data movement among various destinations, export control regulations are built largely around restrictions tied to those very movements.

If cloud computing is to reach its full potential, it is critical for providers and users of cloud services to address its implications with respect to export control. It is equally important to adapt the export control regulations to reflect the increasing prevalence of cloud computing in a manner that preserves the ability of American companies to benefit from the efficiencies of the cloud while also ensuring that American national security and foreign policy interests are adequately protected.

Downloads

Authors

Image Source: © Valentin Flauraud / Reuters
      
 
 




or

New Federal Government CIO is Key to Improving Government Performance


The appointment of new federal chief information officer Steven VanRoekel comes at a challenging time for President Barack Obama. The national economy continues to be weak. Congress plans to cut trillions from the federal budget. And in the time leading up to the 2012 election, American voters remain cynical about the ability of the government to address important policy problems in an effective manner.

In an era of deficit reduction and public cynicism, the tasks facing federal officials are to determine how to do more with less and persuade voters the government can become smarter and more effective. There are going to be fewer dollars for virtually every federal program so it is important to figure how ways to innovate and perform more efficiently.

Former CIO Vivek Kundra sought to do this through encouraging agencies to move software applications to the cloud, consolidating federal data centers, improving transparency, and improving the information technology procurement process. It is important to continue this progress even as agencies are forced to downsize their operations.

As shown in the private sector, government administrators should use technology to cut costs, improve worker productivity, and streamline operations. This is not just a matter of using technology in more innovative ways, but changing the operations and culture of the public sector. Public officials must improve its data mining activities to identify fraud and abuse in Medicare, Medicaid, the Defense Department, and other domestic programs.

New software gives managers better tools to evaluate how money is being spent and whether it is fulfilling intended goals. If it is not, programs need to be modified or eliminated. The most important weapon in Mr. VanRoekel’s arsenal may be the scalpel as he goes through the federal government’s $80 billion IT budget.

Authors

Image Source: © Hyungwon Kang / Reuters
      
 
 




or

FedRAMP to Monitor Cloud Service Providers


As of today, the federal government will require that all cloud service providers have Federal Risk and Authorization Program (FedRAMP) approval. FedRAMP is a program meant to standardize the security of cloud services, thus reducing the time and effort that independent cloud providers would need to spend ensuring cloud security. According to a 2013 annual report by the General Services Administration, agencies that use FedRAMP could save 50 percent on staffing and $200,000 in costs overall. FedRAMP will operate under similar rules as the Federal Information Security Management Act (FISMA), which helps maintain security of federal IT systems, applications and databases. Both FISMA and FedRAMP will provide enhanced protection and scrutiny for federal and independent agencies.

To learn more about cloud computing, read Darrell West’s papers Saving Money Through Cloud Computing and Steps to Improve Cloud Computing in the Public Sector. Visit the FedRAMP website here.

MaryCate Most contributed to this post.

Authors

  • Hillary Schaub
Image Source: © Navesh Chitrakar / Reuters
      
 
 




or

Assessing the Obstacles and Opportunities in a Future Israeli-Syrian-American Peace Negotiation

Introduction:

In the ebb and flow of Middle East diplomacy, the two interrelated issues of an Israeli-Syrian peace settlement and Washington’s bilateral relationship with Damascus have gone up and down on Washington’s scale of importance. The election of Barack Obama raised expectations that the United States would give the two issues the priority they had not received during the eight years of the George W. Bush administration. Candidate Obama promised to assign a high priority to the resuscitation of the Arab-Israeli peace process, and separately to “engage” with Iran and Syria (as recommended by the Iraq Study Group in 2006).

In May 2009, shortly after assuming office, President Obama sent the assistant secretary of state for Near Eastern affairs, Jeffrey Feltman, and the senior director for the Middle East in the National Security Council, Daniel Shapiro, to Damascus to open a dialogue with Bashar al-Asad’s regime. Several members of Congress also travelled to Syria early in Obama’s first year, including the chairman of the Senate Committee on Foreign Relations, John Kerry, and the chairman of the House Committee on Foreign Affairs, Howard Berman. In addition, when the president appointed George Mitchell as special envoy to the Middle East, Mitchell named as his deputy Fred Hof, a respected expert on Syria and the Israeli-Syrian dispute. Last summer, both Mitchell and Hof visited Damascus and began their give and take with Syria.

And yet, after this apparent auspicious beginning, neither the bilateral relationship between the United States and Syria, nor the effort to revive the Israeli-Syrian negotiation has gained much traction. Damascus must be chagrined by the fact that when the Arab-Israeli peace process is discussed now, it is practically equated with the Israeli-Palestinian track. This paper analyzes the difficulties confronting Washington’s and Jerusalem’s respective Syria policies and offers an approach for dealing with Syria. Many of the recommendations stem from lessons resulting from the past rounds of negotiations, so it is important to understand what occurred.

Downloads

Authors

  • Itamar Rabinovich
     
 
 




or

Saving Syria: Assessing Options for Regime Change


Syria is trapped on a crumbling precipice, and however it might fall will entail significant risks for the United States and for the Syrian people.

The brutal regime of Bashar al-Asad is employing its loyal military forces and sectarian thugs to crush the opposition and reassert its tyranny. Even if Bashar fails, Syria may not be out of the woods: an increasingly likely alternative to the current regime is a bloody civil war similar to what we saw in Lebanon, Bosnia, Congo, and most recently in Iraq. The horrors of such a war might even exceed the brutal reassertion of Asad’s control, and would cause spillover into Syria’s neighbors—Turkey, Iraq, Jordan, Lebanon, and Israel—that could be disastrous for them and for American interests in the Middle East.

But the unrest in Syria, which is now entering its second year, also offers some important opportunities, ones that would come from the fall of the regime of Bashar al-Asad, whose family has ruled the country with an iron grip for over forty years. Syria is Iran’s oldest and most important ally in the Arab world, and the Iranian regime has doubled down on Asad, providing him with financial aid and military support to shore up his regime. Asad’s departure would deal a significant blow to Tehran, further isolating it at a time when it has few friends in the region or the world. In addition, Damascus is steadfast in its hostility toward Israel, and Asad’s regime is also a longtime supporter of terrorist groups like Hizballah and Hamas, and has at times aided al-Qa’ida terrorists and former regime elements in Iraq. The regime’s collapse, therefore, could have significant benefits for the United States and its allies in the region.

Actually ousting Asad, however, will not be easy. Although the Obama administration has for months called for Asad to go, every policy option to remove him is flawed, and some could even make the situation worse—seemingly a recipe for inaction. Doing nothing, however, means standing by while Asad murders his own people, and Syria plunges into civil war and risks becoming a failed state. Already the violence is staggering: as of March 2012, at least 8,000 Syrians have died and thousands more have been arrested and tortured in trying to topple the regime. At the same time, Syria is fragmenting. The Syrian opposition remains divided, and the Free Syrian Army is more a brand than a meaningful, unified force. Al- Qa’ida is urging fighters to join the fray in Syria, and sectarian killings and atrocities are growing. Should the violence continue to intensify, Syria’s neighbors may increase their meddling, and instability could spread, further weakening already-fragile neighbors like Iraq and Lebanon.

So to protect U.S. interests, Asad cannot triumph. But a failed Syria, one wracked by civil war, would be just as bad. Thus, U.S. policy must walk this tightrope, trying to remove Asad, but doing so in a way that keeps Syria an intact state capable of policing its borders and ensuring order at home. At the end of the day, however, removing Asad may not be doable at a price the United States is willing to pay. If so, the U.S. government may be forced to choose between living with a brutal but weakened Asad or getting rid of Asad regardless of the consequences.

This memo lays out six options for the United States to consider to achieve Asad’s overthrow, should it choose to do so:

  1. Removing the regime via diplomacy;
  2. Coercing the regime via sanctions and diplomatic isolation;
  3. Arming the Syrian opposition to overthrow the regime;
  4. Engaging in a Libya-like air campaign to help an opposition army gain victory;
  5. Invading Syria with U.S.-led forces and toppling the regime directly; and
  6. Participating in a multilateral, NATO-led effort to oust Asad and rebuild Syria.
The options are complex, and policymakers will probably try to combine several in an attempt to accentuate the positives and minimize the negatives, which will inevitably be difficult and bring out new complications. But by focusing on discrete approaches, this memo helps expose their relative strengths and weaknesses. For each course of action, this memo describes the strategy inherent to the option and what it would entail in practice. It also assesses the option’s advantages and disadvantages.

This memo does not endorse any particular policy option. Rather, it seeks to explain the risks and benefits of possible courses of action at this moment in time. As conditions change, some options may become more practical or desirable and others less so. The authors mostly agree on the advantages and disadvantages of each approach but weigh the relative rewards and costs differently.

Downloads

Image Source: © Luke MacGregor / Reuters