Iran’s alleged clandestine pursuit of a nuclear-weapon capability dominated the headlines last week during the ongoing Nuclear Nonproliferation Treaty (NPT) Review Conference. However, beyond the theatrics of President Mahmoud Ahmadinejad and U.S. Secretary of State Hillary Clinton’s verbal exchange, it is important to remember, and ultimately to address, the root cause of the Iranian nuclear problem — namely, the spread of dual-use technologies such as uranium enrichment to countries outside the ring of first-order world powers. The problem with uranium enrichment is its ambiguity: It is a vital component of the civilian nuclear power industry, yet it can also be [...]
Just 12 years ago, in writing a research memorandum on the future of global telecommunications, I noted the oft-quoted estimate that roughly half of the planet’s population had never made a phone call in their lives. Fast forward to today, and best estimates are that 55 percent of the planet owns a mobile telephone. Factor in that the highest rates of growth are occurring among the poorest and most disconnected populations, where communal use of cells is the norm, and it seems likely that this pool of phone-call virgins has been cut in half — or better. With virtually universal [...]
To what extent does the ownership and management of a nation’s information infrastructure represent a question of national security? This question is all the more important because of recent changes in the models by which IT infrastructures are currently deployed, owned, and used. In general, we use the term “protected industry” to refer to an industry or economic segment protected from external competition or influences (e.g., ownership likely to export production and jobs). Barriers to importation are raised to protect domestic industry from foreign competition, while foreign investment and ownership are blocked or restricted in some instances, both to protect [...]
Free Newsletter
Showing 443 - 459 of 524First 1 25 26 27 28 29 31 Last