Search

You searched for: Publishing Institution Atlantic Council Remove constraint Publishing Institution: Atlantic Council Publication Year within 10 Years Remove constraint Publication Year: within 10 Years
Number of results to display per page

Search Results

  • Author: Kenneth Geers
  • Publication Date: 08-2020
  • Content Type: Special Report
  • Institution: Atlantic Council
  • Abstract: There is only one internet and only one cyberspace connecting individuals, enterprises, and nations all over the world. Ever more frequently, this shared space is coming under attack from malicious actors, both state and non-state, who are seeking to exploit cyberspace’s shared infrastructure for their own ends. Addressing cybersecurity threats is therefore an international problem that requires an international solution. But given the myriad of threats faced in the cyber domain and the ambiguous borders that exist there, how can states best address these challenges and ensure the safety of their own networks and people? In this new report from the Scowcroft Center’s Transatlantic Security Initiative, Cyber Statecraft Initiative senior fellow Kenneth Geers argues that the best way for democratic states to defend their own cyber networks is to leverage the multinational strength of political and military alliances like NATO and the European Union. Alliances like NATO give democracies an advantage over their authoritarian rivals by providing already established mechanisms for multinational cooperation. Alliances are therefore better equipped to tackle the inherently international challenges of cybersecurity. To illustrate the impact of alliances on cybersecurity, Geers uses events in Ukraine as a case study, comparing the Ukrainian government’s efforts to defend against Russian cyberattacks shortly after the 2014 revolution with measures taken in cooperation with partners to defend the 2019 presidential election. Geers illustrates how collective action in 2019 produced improved security outcomes compared to efforts taken by Ukraine alone. Building on these lessons, Geers argues that the only structures likely to produce tangible results in cybersecurity are those within political and military alliances. Indeed, the only credible cyber superpower is a robust alliance. The report then offers a series of recommendations on how NATO and the EU can promote trust and collaboration among Allies and partners to build a more effective cyber alliance.
  • Topic: Security, Defense Policy, NATO, Cybersecurity, Internet, Non-Traditional Threats
  • Political Geography: Europe, Northern Europe
  • Author: Bastien Revel
  • Publication Date: 07-2020
  • Content Type: Special Report
  • Institution: Atlantic Council
  • Abstract: Since 2014, Turkey has not only hosted the world’s largest refugee population but has also modeled a best practice for the global refugee policy discussion. Turkey’s experience on the key issues such as jobs and employment should be examined as lessons for both refugee hosting countries and donor countries alike. The country has provided Syrians under Temporary Protection the right to access work permits and formal employment. Facilitating self-reliance for such a large number of refugees’ households remains a challenging task, even in the medium to long-term. This is especially the case in a context where increasing levels of unemployment in Turkey compounded by the socio-economic impact of the COVID-19 pandemic have posed a serious challenge to job creation and increased competition for available opportunities. Many Syrians living in Turkey experiencing partial or complete loss of income while incurring higher expenses, which is compounded for most households by a lack of savings. Addressing these challenges requires to draw lessons learnt at both policy and operational level to effectively support access to livelihoods opportunities. This notably involves fostering greater engagement and partnership with the private sector, on the one hand, and exploring innovative solutions such as e-work and online livelihoods opportunities on the other. The COVID-19 pandemic is proving to be an important test on the government’s and their international partners’ relevance and flexibility and their ability to quickly step up efforts in that direction. In this context, UNDP Turkey—a longstanding development partner and the co-lead of the Refugee and Resilience Response Plan (3RP)—joined hands with the Atlantic Council’s program on Turkey—”Atlantic Council IN TURKEY”—to explore policy options to foster socioeconomic inclusion among Syrians under Temporary Protection. Building on the experience and expertise of both organizations, our joint policy report : “Turkey’s Refugee Resilience: Expanding and Improving Solutions for the Economic Inclusion of Syrians in Turkey” aims at outlining pragmatic and innovative options to facilitate refugees’ access to decent employment so as to contribute to our common objective to #leavenoonebehind.
  • Topic: Migration, Science and Technology, United Nations, Women, Refugees, Economic growth, Youth, Conflict, Syrian War, Crisis Management, Resilience
  • Political Geography: Europe, Eurasia, Turkey, Middle East, Syria
  • Author: Harris Samad, Fatima Salman
  • Publication Date: 07-2020
  • Content Type: Special Report
  • Institution: Atlantic Council
  • Abstract: This report explores illicit networks in Afghanistan in the context of peacebuilding, democratic consolidation, and enhancing state capacity. Existing literature on the topic is sparse. While the 1990s saw study of the subject matter as tangential to international arms and drug trafficking policies, this period laid the foundation for renewed interest on the issue partially catalyzed by the 2001 US-led invasion. The 2008 global financial crisis shifted this lens toward one of countering the financing of terrorism strategies, corruption, and money laundering. The current day reflects a broadening of how illicit networks are analyzed beyond sector-specific policies; that is, the subject matter today encompasses more of the sectors that make it profitable, rather than focusing only on the most relevant component at a given time. Indeed, it is an internationalized issue, encompassing the smuggling of different goods and involving individuals of varying motivations and capacities within and without Afghanistan. Illicit networks can be broadly understood at three main levels: hyper-local, national, and international. At a hyper-local level, illicit networks represent a series of interpersonal relationships that facilitate the exchange of goods and compensation (taking many forms) beyond the reach of central law enforcement or political authority. Nationally, illicit networks comprise regional and countrywide patronage, criminal, and insurgent networks that organize and profiteer from the hyper-local relationships on a macro level. Internationally, actors with reach outside of the country move illicitly gained goods such as poppy, talc, methamphetamine, minerals, and others, as well as people via human trafficking, into trading hubs in Iran, Pakistan, and the Gulf for export into international markets. They then use poorly regulated financial institutions throughout the world (notably, Western and Gulf banking systems) to store funds, some of which make their way back to Afghanistan (though this phenomenon is particularly difficult to track). This report outlines several specific policy recommendations that will be necessary to combat the illicit networks in a manner that supports the durability of the ongoing peace process in Afghanistan and the continued consolidation of its fragile democratic institutions. These recommendations include the following: For Afghanistan: Provide a path for illicit actors into the formal economy; Generate political will and support; Establish high-level Afghan support for countering illicit trafficking; and upholding the rule of law; Implement enhanced border management; Expand the negotiating table to include more localized narratives; Strengthen and internationalize counter-threat finance strategies For the United States: Support a comprehensive economic settlement; Ensure future interoperability between Afghan and US security forces For regional stakeholders: Provide access to global markets to enhance regional trade integration; Cut off regional and international components of networks to reduce viability and profitability via neighborhood watchdogs, in conjunction with the United States
  • Topic: Arms Control and Proliferation, Arms Trade, Trafficking , Financial Institutions , Non-Traditional Threats
  • Political Geography: Afghanistan, South Asia
  • Author: Phil Thornton
  • Publication Date: 07-2020
  • Content Type: Policy Brief
  • Institution: Atlantic Council
  • Abstract: The world is facing unprecedented health and economic crises that require a global solution. Governments have locked down their economies to contain the mounting death toll from the COVID-19 pandemic. With this response well underway, now is the time to move into a recovery effort. This will require a coordinated response to the health emergency and a global growth plan that is based on synchronized monetary, fiscal, and debt relief policies. Failure to act will risk a substantial shock to the postwar order established by the United States and its allies more than seventy years ago. The most effective global forum for coordinating this recovery effort is the Group of 20 (G20), which led the way out of the global financial crisis (GFC) in 2009, the closest parallel we have to the current catastrophe. Eleven years ago, world leaders used the G20 meeting in London as the forum to deliver a unified response and a massive fiscal stimulus that helped stem economic free fall and prevented the recession from becoming a second Great Depression. A decade on, it is clear that the G20 is the only body with the clout to save the global economy. This does not mean that the G20 should be the only forum for actions for its member states. The United States, for example, should also work closely with like-minded states that support a rules-based world order, and there are many other fora where it can and must be active with partners and allies. But no others share the G20’s depth and breadth in the key focus areas for recovery. The other multilateral organizations that could take up the challenge lack either the substance or membership. The United Nations may count all countries as members but is too unwieldly to coordinate a response. The International Monetary Fund (IMF) has the resources but requires direction from its 189 members. The Group of Seven (G7), which once oversaw financial and economic management, does not include the fast-growing emerging economies. The G20 represents both the world’s richest and fastest-growing countries, making it the forum for international collaboration. It combines that representation with agility.
  • Topic: Security, Energy Policy, G20, Global Markets, Geopolitics, Economy, Business , Trade, Coronavirus, COVID-19
  • Political Geography: China, Middle East, Canada, Asia, Saudi Arabia, North America, United States of America
  • Author: Lauren Speranza
  • Publication Date: 07-2020
  • Content Type: Special Report
  • Institution: Atlantic Council
  • Abstract: Tackling hybrid threats, particularly from state actors such as Russia and China, remains one of the greatest challenges for the transatlantic community. Hybrid threats have gained more traction among policymakers and publics across Europe and the United States, especially in a world with COVID-19. Over the last five years, Euro-Atlantic nations and institutions, such as NATO and the European Union (EU), have taken important steps to respond to hybrid issues. But, as hybrid threats become more prominent in the future, policymakers must move toward a more coherent, effective, and proactive strategy for countering Russian and Chinese hybrid threats. To develop such a transatlantic counter-hybrid strategy for Russia and China, this paper argues that two major things need to happen. First, transatlantic policymakers have to build a common strategic concept to guide collective thinking on hybrid threats. Second, transatlantic policymakers need to take a range of practical actions in service of that strategic concept. In a strategic concept for countering Russian and Chinese hybrid threats, Lauren Speranza offers five strategic priorities that could form the basis of this strategic concept and presents a series of constructive steps that NATO, the EU, and nations can take, in cooperation with the private sector and civil society, to enhance their counter-hybrid capabilities against Russia and China.
  • Topic: Security, Defense Policy, NATO, Diplomacy, Politics, Science and Technology, European Union, Innovation, Resilience, Non-Traditional Threats
  • Political Geography: Russia, China, Europe, Eurasia, Asia
  • Author: JD Work, Richard Harknett
  • Publication Date: 07-2020
  • Content Type: Policy Brief
  • Institution: Atlantic Council
  • Abstract: Reported Iranian intrusions against Israeli critical infrastructure networks and alleged Israeli actions against Iranian proliferation-associated targets pose substantial new challenges to understanding ongoing competition and conflict in the Middle East. These cyber exchanges may be interpreted through two distinct lenses: as the struggle to achieve deterrence using the instrument of cyber operations, or as the contest for initiative in order to establish conditions for relative security advantage in a cyber-persistent environment. Either way, these ongoing incidents are best understood not as “bolt out of the blue” attacks, but rather fleeting glimpses of continuing cyber campaigns leveraging previously disclosed and newly developed capabilities as each side grapples to anticipate cyber vulnerability and shape the conditions of exploitation. The opaque nature of these interactions is further complicated by potential bureaucratic politics and interservice rivalries, as well as unknown dynamics of a counter-proliferation campaign to slow, disrupt and potentially destroy Iranian nuclear capacity. In the end, observed cyber actions may not represent reflections of accurate strategic calculation, and even if aligned to the operational environment they may not lead to intended outcomes. Continuous failure to deter, or inability to manage persistent interactions, may lead to greater dangers.
  • Topic: Security, Defense Policy, Cybersecurity, Non-Traditional Threats
  • Political Geography: Iran, Middle East, Israel
  • Author: Jeffrey Cimmino, Matthew Kroenig, Barry Pavel
  • Publication Date: 06-2020
  • Content Type: Policy Brief
  • Institution: Atlantic Council
  • Abstract: The COVID-19 pandemic is a strategic shock, and its almost immediate, damaging effects on the global economy constitute a secondary disruption to global order. Additional secondary strategic shocks (e.g., in the developing world) are looming. Together, these developments pose arguably the greatest threat to the global order since World War II. In the aftermath of that conflict, the United States and its allies established a rules-based international system that has guaranteed freedom, peace, and prosperity for decades. If the United States and its allies do not act effectively, the pandemic could upend this order. This issue brief considers the current state of the pandemic and how it has strained the global rules-based order over the past few months. First, it considers the origins of the novel coronavirus and how it spread around the world. Next, it examines how COVID-19 has exacerbated or created pressure points in the global order, highlights uncertainties ahead, and provides recommendations to the United States and its partners for shaping the post-COVID-19 world.
  • Topic: Security, Defense Policy, NATO, Diplomacy, Politics, European Union, Economy, Business , Coronavirus, COVID-19
  • Political Geography: Russia, China, South Asia, Eurasia, India, Taiwan, Asia, North America, Korea, United States of America, Indo-Pacific
  • Author: Hans Binnendijk, Conor Rodihan
  • Publication Date: 06-2020
  • Content Type: Special Report
  • Institution: Atlantic Council
  • Abstract: The conventional military threat from Russia towards Europe most acutely affects a number of frontline Nordic and Baltic states from the Barents Sea in the Arctic through the Baltic Sea region: Estonia, Finland, Latvia, Lithuania, Norway, Poland, and Sweden. Since Russia’s invasion of Crimea in 2014, these countries, in concert with other Euro-Atlantic allies and partners, have concentrated on strengthening their own defenses and on developing and enhancing eight sets of different defense cooperation arrangements. As the only two non-NATO and militarily nonaligned nations in the region, Finland and Sweden’s role in regional security and their level of cooperation with these and other partners poses challenges as well as opportunities for deterrence and defense in Europe’s northeast. These two countries have particularly emphasized cooperation with partners as they seek to build an interlocking web of security relationships to improve defense in the region. The core arrangements within this network include: The Finnish-Swedish bilateral defense relationship; Nordic Defense Cooperation; Nordic-Baltic Eight; The Northern Group; NATO Partnerships; The European Union; Ad hoc arrangements such as the Joint Expeditionary Force; Framework Nations Concept, and European Intervention Initiative; Finnish-Swedish-US trilateral and bilateral defense cooperation. These “geometries of deterrence” vary in scope, scale, and membership, but taken together, they enhance a range of important components of deterrence. In Geometries of Deterrence, Hans Binnendijk and Conor Rodihan assess the contributions of each of these arrangements against an ideal or “gold standard” for conventional military deterrence, before evaluating the arrangements collectively and offering recommendations to further strengthen deterrence for Finland, Sweden, and indeed for all of Northeastern Europe.
  • Topic: Security, Defense Policy, NATO, Partnerships
  • Political Geography: Russia, Europe, Eurasia, Northern Europe
  • Author: Nathaniel Kim, Trey Herr, Bruce Schneier
  • Publication Date: 06-2020
  • Content Type: Special Report
  • Institution: Atlantic Council
  • Abstract: The Internet of Things (IoT) refers to the increasing convergence of the physical and digital worlds. Hundreds of “things” are being connected to the Internet and each other, with more than fifty billion devices expected to be connected by 2030. 1 These devices vary from Internet-connected power-generation equipment to wearable health trackers and smart home appliances, and generally offer some combination of new functionality, greater convenience, or cost savings to users. The Internet of Things (IoT) refers to the increasing convergence of the physical and digital worlds. Hundreds of “things” are being connected to the Internet and each other, with more than fifty billion devices expected to be connected by 2030. 1 These devices vary from Internet-connected power-generation equipment to wearable health trackers and smart home appliances, and generally offer some combination of new functionality, greater convenience, or cost savings to users.
  • Topic: Security, Science and Technology, Cybersecurity, Internet, Innovation
  • Political Geography: Global Focus
  • Author: T. X. Hammes
  • Publication Date: 06-2020
  • Content Type: Special Report
  • Institution: Atlantic Council
  • Abstract: For the last two decades, China has studied the US military, identified its key weaknesses, and developed the tactics and forces best suited to exploit those vulnerabilities. These challenges are compounded by significant deficiencies in today’s US joint force across all domains of conflict—sea, air, land, space, electronic warfare, and cyber. Proposed budgets cannot overcome those deficiencies using legacy systems. Therefore, the current US military strategy for the defense of Asia—a conventional defense of the first island chain from Japan to the Philippines, built on current air and sea platforms supported by major air and sea bases—needs to be adapted. The United States and its allies have two major advantages they can exploit—geography and emerging technologies. In Forward Defense’s inaugural report, An Affordable Defense of Asia, T.X. Hammes crafts a strategy for leveraging these advantages. Hammes makes the case that by developing novel operational concepts that take advantage of emerging technologies, while integrating these concepts into a broader Offshore Control Strategy which seeks to hold geostrategic chokepoints, the United States can improve its warfighting posture and bolster conventional deterrence. This paper advances the following arguments and recommendations. 1. The geography of the Pacific provides significant strategic, operational, and tactical advantages to a defender. 2. New operational concepts that employ emerging, relatively inexpensive technologies—including multimodal missiles, long-range air drones, smart sea mines, and unmanned naval vessels—can support an affordable defense of Asia. 3. These new technologies can and should be manufactured and fielded by US allies in the region in order to strengthen alliance relationships and improve their ability to defend themselves. 4. Autonomous weapons will be essential to an affordable defense of Asia.
  • Topic: Security, Defense Policy, Science and Technology
  • Political Geography: China, East Asia, Asia, North America, United States of America