Climate Change Adaptation in the Arab States Best Practices and Lessons Learned

Total Page:16

File Type:pdf, Size:1020Kb

Climate Change Adaptation in the Arab States Best Practices and Lessons Learned Climate Change Adaptation in the Arab States Best practices and lessons learned United Nations Development Programme 2018 | 1 UNDP partners with people at all levels of society to help build nations that can withstand crisis, and drive and sustain the kind of growth that improves the quality of life for everyone. On the ground in nearly 170 countries and territories, we offer global perspective and local insight to help empower lives and build resilient nations. www.undp.org The Global Environment Facility (GEF) was established on the eve of the 1992 Rio Earth Summit to help tackle our planet’s most pressing environmental problems. Since then, the GEF has provided over $17 billion in grants and mobilized an additional $88 billion in financing for more than 4000 projects in 170 countries. Today, the GEF is an international partnership of 183 countries, international institutions, civil society organizations and the private sector that addresses global environmental issues. www.thegef.org United Nations Development Programme July 2018 Copyright © UNDP 2018 Manufactured in Bangkok Bangkok Regional Hub (BRH) United Nations Development Programme 3rd Floor United Nations Service Building Rajdamnern Nok Avenue, Bangkok, 10200, Thailand www.adaptation-undp.org Authors: The report preparation was led by Tom Twining-Ward in close collaboration with Kishan Khoday, with Cara Tobin as lead author and Fadhel Baccar, Janine Twyman Mills, Walid Ali and Zubair Murshed as contributing authors. The publication was professionally reviewed by fellow UNDP colleagues, Amal Aldababseh, Greg Benchwick, Hanan Mutwaki, Mohamed Bayoumi, and Walid Ali. Valuable external expert review, comments, and suggestions were provided by Hussein El-Atfy (Arab Water Council), Ibrahim Abdel Gelil (Arabian Gulf University), and William Dougherty (Climate Change Research Group). Graphic design by Greg Benchwick. Cover photo: A portrait of 16-year-old Yusra Suleiman al Toum Ahmed in El Fasher, Sudan. Ms. Ahmed, an aspiring journal- ist, is a member of her country’s Parliament of Students, Quranic organization and Students’ Union. El Fasher, Sudan. UN Photo/Albert Gonzalez Farran. This publication or parts of it may not be reproduced, stored by means of any system or transmitted, in any form by any medium, whether electronic, mechanical, photocopied, recorded or of any other type, without the prior permission of the United Nations Development Programme. The views expressed in this publication are those of the author(s) and do not necessarily represent those of the United Nations, including UNDP, or the UN Member States. 2 | Climate change adaptation in the Arab States: Best practices and lessons learned from country experiences United Nations Development Programme 2018 | 3 Table of Contents Foreword 6 Executive summary 10 Acknowledgements 12 Abbreviations and acronyms 14 Introduction 17 1.1. Purpose of the report 17 1.2 Problem declaration 18 1.3 The SDGs and the 2030 Agenda for Sustainable Development 19 1.4 Implementing the Paris Agreement on Climate Change 20 Climate change scenarios and projected impacts in the Arab region 23 2.1 Temperature 24 2.2 Percipitation 24 2.3 Sea Level Rise 24 2.4 Natural Hazards 24 2.5 Impacts and fragilities 25 2.5.1 Economy 25 2.5.2 Food security 26 2.5.3 Water security 26 2.5.4 Displacements 26 2.5.5 Human health 27 2.5.6 Gender aspects 27 2.5.7 Conflict 27 2.6 Maladaptive practices 27 2.7 Challenges for effective governance 28 Regional collaborations to build climate resilience 31 3.1. Regional Frameworks for Action 31 3.1.1 The League of Arab States 31 3.1.2 The Arab Framework Action Plan on Climate Change 32 3.1.3 Arab Strategies for Sustainable Development and Water Security 32 3.1.4 The Arab Strategy for Disaster Risk Reduction 33 3.2. Regional initiatives 33 3.2.1 The UNDP Arab Climate Resilience Initiative 33 3.2.2. One UN Partnerships: The SDG Climate Nexus Facility 33 3.2.3 International Financial Institution Partnerships: UNDP and the Islamic Development Bank 33 Country actions to build climate resilience 37 4.1 UNDP projects in the Arab Region 37 4.1.1 Climate change adaptation projects 37 4.1.2 Disaster risk reduction projects 38 4.1.3 Barriers for the region 38 4.2 Case Studies 40 Case study 1: Reducing climate-related vulnerabilities of agro-pastoralists in Djibouti 40 Case study 2: Djibouti shade garden development 42 Case study 3: Developing national capacities for disaster risk management in Djibouti 44 Case study 4: Adapting to risks of climate change associated sea-level rise in the Nile Delta 46 Case study 5: Enhancing Climate Change Adaptation in the North Coast and Nile Delta Regions in Egypt 48 Case study 6: Capacity building for crisis, disaster and risk management in Egypt 50 Case study 7: Enhancing capacities to reduce disaster risk & integrate climate change adaptation in Jordan 50 Case study 8: Developing disaster risk management capacities in Iraq 53 Case study 9: Disaster risk reduction and management in Lebanon 53 Case study 10: Enhancing capacities for disaster risk management in Palestine 53 Case study 11: Enhancing resilience capacities of vulnerable Somali communities and ecosystems 54 Case study 12: Disaster risk reduction and recovery in Somalia 56 Case study 13: Building climate resilience in the agriculture and water sectors in Sudan 58 Case study 13b: Implementing Priority Adaptation Measures, especially for women headed households in Sudan 60 4 | Climate change adaptation in the Arab States: Best practices and lessons learned from country experiences Case study 14: Rain-fed farming and pastoral communities and complementary micro-finance and weather-based index insurance services 62 Case study 15: National disaster risk management in Sudan 64 Case study 16: Supporting Tunisia’s most vulnerable coastal areas 66 Case study 17: Support to disaster risk reduction in Tunisia 68 Case study 18: Integrating Water Harvesting Technologies to Enable Rural Yemeni Populations to Adapt 70 Observations and lessons learned 73 5.1 Policy enabling environments for adaptation 73 5.2 Capacity building for locals on all levels 74 5.3 Interlinking CCA and DRR 74 5.4 Project design 74 5.5 Operation and maintenance (O&M) 74 5.6 Decentralization and implications of community-based organizations 75 5.7 Conducting cost-benefit analyses using economics of adaptation principles 75 5.8 Innovative best practices 75 5.9 Community revolving funds and microfinance 76 5.10 Ensuring access to financial services in remote locations 76 5.11 Promoting resilience through livelihood diversification 77 5.12 Project Monitoring and Evaluation 77 Way forward 79 Conclusion 83 References 86 Photo: UNDP United Nations Development Programme 2018 | 5 Foreword A turning point The Sustainable Development Goals (SDGs), the new In response, countries across the region now seek to expand Paris Agreement on Climate Change and the Sendai international cooperation and take action under the Paris Agreement to build climate resilient societies. To this end, Framework for Disaster Risk Reduction together mark a UNDP works closely with our national partners to build re- turning point in development policy globally and in the silience of institutions and communities to anticipate, ab- Arab region. sorb and adapt to increasingly complex risks from climate change. UNDP has rapidly expanded its support in recent The vision these instruments set for a new balance between years in this regard, through a strong partnership with the people and planet represents a shift in the trajectory of Global Environment Facility (GEF), the Green Climate Fund development cooperation. The new 2030 Agenda for Sus- (GCF), the Least Developed Countries Fund (LDCF), the Spe- tainable Development highlights that for development cial Climate Change Fund (SCCF) and key bilateral donors. to be sustainable it must become resilient to increasingly As we empower countries and communities, UNDP pro- complex risks faced in the world today. This is particularly motes integrated solutions to achieve SDG 13 on climate relevant for the Arab region. action and the Paris Agreement, while bringing co-benefits for SDGs on food and water security, health, gender equal- The Arab region was the birthplace of agricultural civili- ity, combating land degradation and reducing the loss of zation and for thousands of years has been able to cope biodiversity. with risks from climatic hazards. But climate change is now happening at a pace unlike anything before, stretching the Climate change poses one of the single greatest threats to ability of societies to cope. Alongside the spread of war and the future of development in the Arab region, but it also conflict, climate change has now emerged as one of the presents an opportunity to innovate and transition to a greatest drivers of change in the region today, accelerating more resilient future in line with the vision set forth in the the rise of social vulnerability and exacerbating trends of re- 2030 Agenda. As elaborated in this report, innovative bot- source insecurity and displacement. Over the past decade, tom up solutions are emerging, which if scaled up, can help the region has witnessed cycles of drought, the frequency sustain communities and ecosystems towards 2030 and be- and severity of which are beyond anything seen for hun- yond. UNDP stands ready to continue and expand our coop- dreds of years in the region. This has contributed to situa- eration with national partners and local communities, who tions of famine and food insecurity, loss of livelihoods and may today stand on the front lines of climate risks, but with life, and the displacement of millions. While the Arab region dedicated support from the international community may is already the planet’s most water insecure and food import well emerge as the new innovators and success stories for dependent region, temperatures in the region are now the sustainable, resilient society of 2030.
Recommended publications
  • Cyber Security Practices and Challenges at Selected Critical Infrastructures in Ethiopia: Towards Tailoring Cyber Security Framework
    ADDIS ABABA UNIVERSITY COLLEGE OF NATURAL AND COMPUTATIONAL SCIENCES SCHOOL OF INFORMATION SCIENCE CYBER SECURITY PRACTICES AND CHALLENGES AT SELECTED CRITICAL INFRASTRUCTURES IN ETHIOPIA: TOWARDS TAILORING CYBER SECURITY FRAMEWORK By TEWODROS GETANEH JUNE, 2018 ADDIS ABABA, ETHIOPIA ADDIS ABABA UNIVERSITY COLLEGE OF NATURAL AND COMPUTATIONAL SCIENCES SCHOOL OF INFORMATION SCIENCE CYBER SECURITY PRACTICES AND CHALLENGES AT SELECTED CRITICAL INFRASTRUCTURES IN ETHIOPIA: TOWARDS TAILORING CYBER SECURITY FRAMEWORK A Thesis Submitted to School of Graduate Studies of Addis Ababa University in Partial Fulfillment of the Requirements for the Degree of Master of Science in Information Science By: TEWODROS GETANEH Advisor: Tebebe Beshah (PhD) JUNE, 2018 Addis Ababa, Ethiopia ADDIS ABABA UNIVERSITY COLLEGE OF NATURAL AND COMPUTATIONAL SCIENCE SCHOOL OF INFORMATION SCIENCE CYBER SECURITY PRACTICES AND CHALLENGES AT SELECTED CRITICAL INFRASTRUCTURES IN ETHIOPIA: TOWARDS TAILORING CYBER SECURITY FRAMEWORK By: Tewodros Getaneh Name and signature of Members of the Examining Board Tebebe Beshah (PhD) __________ _________ Advisor Signature Date Lemma Lenssa (PhD) ___________ __________ Examiner Signature Date Dereje Teferi (PhD) __________ _________ Examiner Signature Date Declaration This thesis has not previously been accepted for any degree and is not being concurrently submitted in candidature for any degree in any university. I declare that the thesis is a result of my own investigation, except where otherwise stated. I have undertaken the study independently with the guidance and support of my research advisor. Other sources are acknowledged by citations giving explicit references. A list of references is appended. Signature: ________________________ Tewodros Getaneh This thesis has been submitted for examination with my approval as university advisor. Advisor’s Signature: ________________________ Tebebe Beshah (PhD) i | P a g e Dedication This work is dedicated to my beloved sister Eleni Getaneh.
    [Show full text]
  • 1 CHAPTER I INTRODUCTION 1.1 Background the Yemen Civil War Is
    CHAPTER I INTRODUCTION 1.1 Background The Yemen civil war is currently in its fifth year, but tensions within the country have existed for many years. The conflict in Yemen has been labelled as the worst humanitarian crisis in the world by the United Nations (UN) and is categorized as a man-made phenomenon. According to the UN, 80% of the population of Yemen need humanitarian assistance, with 2/3 of its population considered to be food insecure while 1/3 of its population is suffering from extreme levels of hunger and most districts in Yemen at risk of famine. As the conditions in Yemen continue to deteriorate, the world’s largest cholera outbreak occurred in Yemen in 2017 with a reported one million infected.1 Prior to the conflict itself, Yemen has been among the poorest countries in the Arab Peninsula. However, that is contradictory considering the natural resources that Yemen possess, such as minerals and oil, and its strategical location of being adjacent to the Red Sea.2 Yemen has a large natural reserve of natural gasses and minerals, with over 490 billion cubic meters as of 2010. These minerals include the likes of silver, gold, zinc, cobalt and nickel. The conflict in Yemen is a result of a civil war between the Houthi, with the help of Former President Saleh, and the Yemen government that is represented by 1 UNOCHA. “Yemen.” Humanitarian Needs Overview 2019, 2019. https://reliefweb.int/sites/reliefweb.int/files/resources/2019_Yemen_HNO_FINAL.pdf. 2 Sophy Owuor, “What Are The Major Natural Resources Of Yemen?” WorldAtlas, February 19, 2019.
    [Show full text]
  • Planning and Implementing Ecosystem Based Adaptation (Eba) in Djibouti’S Dikhil and Tadjourah Regions
    5/6/2020 WbgGefportal Project Identification Form (PIF) entry – Full Sized Project – GEF - 7 Planning and implementing Ecosystem based Adaptation (EbA) in Djibouti’s Dikhil and Tadjourah regions Part I: Project Information GEF ID 10180 Project Type FSP Type of Trust Fund LDCF CBIT/NGI CBIT NGI Project Title Planning and implementing Ecosystem based Adaptation (EbA) in Djibouti’s Dikhil and Tadjourah regions Countries Djibouti Agency(ies) UNEP Other Executing Partner(s) Executing Partner Type Ministry of Habitat, Urbanism, and Environment Government GEF Focal Area Climate Change Taxonomy Biodiversity, Biomes, Climate Change, Climate Change Adaptation, Focal Areas, Sustainable Land Management, Land Degradation, Land Degradation Neutrality, Private Sector, Type of Engagement, Civil Society, Stakeholders, Communications, Gender Mainstreaming, Gender Equality, Gender results areas, Food Security in Sub-Sahara Africa, Integrated Programs, Sustainable Cities, Capacity, Knowledge and Research, Knowledge Generation, Food Security, Land Productivity, Income Generating Activities, Community-Based Natural Resource Management, Sustainable Livelihoods, Sustainable Agriculture, Improved Soil and Water Management Techniques, Ecosystem Approach, Drought Mitigation, Wetlands, Least Developed Countries, Livelihoods, Mainstreaming adaptation, Climate resilience, Community-based adaptation, Ecosystem-based Adaptation, Beneficiaries, Participation, Information Dissemination, Consultation, Behavior change, Awareness Raising, Public Campaigns, SMEs, Community Based
    [Show full text]
  • Horn of Africa Crisis Situation Report No
    Horn of Africa Crisis Situation Report No. 28 23 December 2011 This report is produced by OCHA Eastern Africa in collaboration with humanitarian partners. It is issued by OCHA in New York. It covers the period from 16 to 23 December. The next report will be issued on 30 December. I. HIGHLIGHTS/KEY PRIORITIES • Tensions remain high in North Eastern Province of Kenya following a series of explosive attacks targeting military and police convoys in the area. • Aid workers have further reduced operations in the Dadaab refugee camps following heightened insecurity. • WHO has called on health partners to intensify cholera preventative activities in Mogadishu following an increase in cases. II. Situation Overview While drought conditions have eased in many locations due to the recent rains, drought conditions are expected to worsen in parts of the Horn of Africa in the coming months as the dry season sets in. A new food security analysis of the Integrated Food Security Phase Classification (IPC) system in Djibouti has indicated that the food security situation in Obock Region has deteriorated from ‘Stressed’ (IPC Phase 2) to ‘Crisis’ (IPC Phase 3).Deterioration in food security conditions is now likely in coastal and southeast areas as well. In Ethiopia, even as the seasonal deyr (October-December) rains continue in most lowland areas of southern and south-eastern Ethiopia, drought conditions are expected to worsen in the northernmost parts of the Afar Region and parts of northern Somali Region in the coming month. On the other hand, drought conditions in the northern, north-eastern and southern parts of Kenya have significantly eased following good rainfall received in the October-December short rains season.In Somalia, while the deyr rains have subsided in many parts of Lower and Middle Juba regions, flooding continues to affect many settlements in Middle Juba.
    [Show full text]
  • Significant Cyber Incidents Since 2006 This List Is a Work in Progress That We Update As New Incidents Come to Light. If You H
    Significant Cyber Incidents Since 2006 This list is a work in progress that we update as new incidents come to light. If you have suggestions for additions, send them to [email protected]. Significance is in the eye of the beholder, but we focus on successful attacks on government agencies, defense and high tech companies, or economic crimes with losses of more than a million dollars. 1. May 2006. The Department of State’s networks were hacked, and unknown foreign intruders downloaded terabytes of information. If Chinese or Russian spies backed a truck up to the State Department, smashed the glass doors, tied up the guards and spend the night carting off file cabinets it would be an act of war, but when it happens in cyberspace we barely notice. 2. August 2006. A senior Air Force Officer stated publicly that, “China has downloaded 10 to 20 terabytes of data from the NIPRNet (the unclassified military network).” 3. November 2006. Hackers attempted to penetrate U.S. military War College networks, resulting in a two week shutdown at one institution while infected machines are restored. 4. December 2006. NASA was forced to block emails with attachments before shuttle launches out of fear they would be hacked. Business Week reported that the plans for the latest U.S. space launch vehicles were obtained by unknown foreign intruders. 5. 2006. Chinese hackers were thought to be responsible for shutting down the House of Commons computer system. 6. April 2007. The Department of Commerce had to take the Bureau of Industrial Security’s networks offline for several months because its networks were hacked by unknown foreign intruders.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • BACKGROUND BRIEF1 Brussels, 17 January 2019 FOREIGN AFFAIRS COUNCIL 21 January 2019
    PRESS Council of the European Union EN BACKGROUND BRIEF1 Brussels, 17 January 2019 FOREIGN AFFAIRS COUNCIL 21 January 2019 The Foreign Affairs Council, chaired by the EU High Representative for Foreign Affairs and Security Policy, Federica Mogherini, will start at 9.00 with a discussion on current affairs allowing ministers to review pressing issues on the international agenda. Foreign ministers will discuss the action plan against disinformation presented by the European Commission on 5 December 2018. They will exchange views on the implementation of the action plan. Ministers are expected to focus on the external aspects of the challenges of disinformation. The Council will have a preparatory discussion for the EU-League of Arab States ministerial meeting to be held in Brussels on 4 February 2019, ahead of the summit foreseen on 24 and 25 February 2019 in Egypt. The Council will also discuss the 22nd EU-ASEAN ministerial meeting, that will take place on the same day in Brussels. The Council is expected to adopt conclusions on EU-ASEAN relations. The Council is expected to adopt a number of decisions and conclusions without debate, including conclusions on the situation in Nicaragua. Press opportunities: Monday 21 January +/- 08.45 Doorstep by High Representative Federica Mogherini +/- 12.45 Press conference following the Foreign Affairs Council +/- 18.15 Press conference following the EU-ASEAN ministerial meeting Tuesday 22 January +/- 13.00 Press conference following the EU-AU ministerial meeting Press conferences and public events via video streaming Video coverage in broadcast quality (MPEG4) and photo gallery 1 This note has been drawn up under the responsibility of the press office.
    [Show full text]
  • E-Commerce Security and Fraud Issues and Protections 10
    E-Commerce Security and Fraud Issues and Protections 10 C o n t e n t s Learning Objectives Opening Case: How State University of New York College at Old Westbury Upon completion of this chapter, you will be Controls Its Internet Use ...................................... 458 able to: 10.1 The Information Security Problem .......... 459 1. Understand the importance and scope of security of information systems for EC. 10.2 Basic E-Commerce Security Issues and Landscape ........................................... 465 2. Describe the major concepts and terminol- ogy of EC security. 10.3 Technical Malware Attack Methods: From Viruses to Denial of Service ............ 471 3. Understand about the major EC security threats, vulnerabilities, and technical attacks. 10.4 Nontechnical Methods: From Phishing to Spam and Fraud .................... 476 4. Understand Internet fraud, phishing, and spam. 10.5 The Information Assurance Model 5. Describe the information assurance security and Defense Strategy ................................. 484 principles. 10.6 The Defense I: Access Control, 6. Identify and assess major technologies Encryption, and PKI ................................. 488 and methods for securing EC access and 10.7 The Defense II: Securing communications. E-Commerce Networks ............................. 494 7. Describe the major technologies for protec- 10.8 The Defense III: General Controls, tion of EC networks. Spam, Pop Ups, Fraud, and Social 8. Describe various types of controls and special Engineering Controls................................. 497 defense mechanisms. 10.9 Implementing Enterprisewide 9. Describe consumer and seller protection from E-Commerce Security ............................... 500 fraud. Managerial Issues.................................................. 504 10. Discuss enterprisewide implementation issues Closing Case: How One Bank Stopped Scams, for EC security. Spams, and Cybercriminals ................................. 509 11. Understand why it is so diffi cult to stop computer crimes.
    [Show full text]
  • Just Below the Surface: Israel, the Arab Gulf States and the Limits of Cooperation
    Middle East Centre JUST BELOW THE SURFACE ISRAEL, THE ARAB GULF STATES AND THE LIMITS OF COOPERATION IAN BLACK LSE Middle East Centre Report | March 2019 About the Middle East Centre The Middle East Centre builds on LSE’s long engagement with the Middle East and provides a central hub for the wide range of research on the region carried out at LSE. The Middle East Centre aims to enhance understanding and develop rigorous research on the societies, economies, polities and international relations of the region. The Centre promotes both special- ised knowledge and public understanding of this crucial area, and has outstanding strengths in interdisciplinary research and in regional expertise. As one of the world’s leading social science institutions, LSE comprises departments covering all branches of the social sciences. The Middle East Centre harnesses this expertise to promote innova- tive research and training on the region. Middle East Centre Just Below the Surface: Israel, the Arab Gulf States and the Limits of Cooperation Ian Black LSE Middle East Centre Report March 2019 About the Author Ian Black is a former Middle East editor, diplomatic editor and European editor for the Guardian newspaper. He is currently Visiting Senior Fellow at the LSE Middle East Centre. His latest book is entitled Enemies and Neighbours: Arabs and Jews in Palestine and Israel, 1917–2017. Abstract For over a decade Israel has been strengthening links with Arab Gulf states with which it has no diplomatic relations. Evidence of a convergence of Israel’s stra- tegic views with those of Saudi Arabia, the United Arab Emirates (UAE) and Bahrain has accumulated as all displayed hostility to Iran’s regional ambitions and to United States President Barack Obama’s policies during the Arab Spring.
    [Show full text]
  • China and Yemen's Forgotten
    UNITED STATES INSTITUTE OF PEACE PEACEBRIEF241 United States Institute of Peace • www.usip.org • Tel. 202.457.1700 • @usip January 2018 I-WEI JENNIFER CHANG China and Yemen’s Forgotten War Email: [email protected] Summary • China’s position on the Yemen conflict is driven primarily by its interest in maintaining close strategic relations with Saudi Arabia. As a result, Beijing has acquiesced to the Saudi-led military campaign in Yemen. • Although not taking a prominent leadership role, China has supported regional and interna- tional initiatives to mitigate the conflict, including the Gulf Cooperation Council Initiative, the National Dialogue Conference, and UN-led peace talks. • As Yemen’s major trade partner, China has an outsized economic presence in the country and can play a significant economic role in Yemen’s postwar reconstruction through its Belt and Road Initiative. Introduction China is playing a supportive, though low-key, role in international efforts to propel Yemen’s peace process in response to one of the world’s greatest humanitarian crises. The Chinese government has China’s response to the backed the political transition process led by the Gulf Cooperation Council (GCC) as well as the peace “Saudi-led airstrikes, which talks brokered by the United Nations. Beijing, however, has been unwilling to challenge the Saudi-led were militarily supported by air campaign against opposition groups that has killed civilians in a spiraling conflict that has already taken over ten thousand lives—including, in December 2017, that of former president Ali Abdullah the United States and United Saleh by the Houthi rebels.1 Kingdom, was muted.
    [Show full text]
  • CIS 381: Social & Ethical Issues of Computing
    CIS 381: Social & Ethical Issues of Computing Security Dr. David Koop D. Koop, CIS 381, Spring 2019 Hackers, Past and Present • Original meaning of hacker: explorer, risk taker, system innovator (e.g. MIT’s Tech Model Railroad Club in 1950s) • Change in meaning from electronics to computers and networks • WarGames (1983): Hacking military supercomputer • Modern meaning of hacker: someone who gains unauthorized access to computers and computer networks [M. J. Quinn] D. Koop, CIS 381, Spring 2019 !2 Password Advice • Do not use short passwords • Do not rely solely on words from the dictionary • Do not rely on substituting numbers for letters • Do not reuse passwords • Give ridiculous answers to security questions • Enable two-factor authentication if available • Have password recoveries sent to a secure email address [M. J. Quinn] D. Koop, CIS 381, Spring 2019 !3 Case Study: Firesheep • October 2010: Eric Butler released Firesheep extension to Firefox browser • Firesheep made it possible for ordinary computer users to easily sidejack Web sessions • More than 500,000 downloads in first week • Attracted great deal of media attention • Early 2011: Facebook and Twitter announced options to use their sites securely • Evaluate: Was this a good action? [M. J. Quinn] D. Koop, CIS 381, Spring 2019 !4 Viruses • Virus: Piece of self-replicating code embedded within another program (host) • Viruses associated with program files - Hard disks, floppy disks, CD- ROMS - Email attachments • How viruses spread - Diskettes or CDs - Email - Files downloaded from Internet [M. J. Quinn] D. Koop, CIS 381, Spring 2019 !5 Worm • Worm: - Self-contained program 7.3 Malware 329 - Spreads via computer network - Exploits security holes W • Tappen's Internet Worm W W - Released worm onto Internet from W MIT computer - Spread to significant numbers of Unix computers W - Infected computers kept crashing or became unresponsive Figure 7.4 A worm spreads to other computers by exploiting security holes in computer networks.
    [Show full text]
  • How to Improve Data Security and Reduce Potential Liability for Data Breaches
    How to Improve Data Security and Reduce Potential Liability for Data Breaches Randy Gainer, Attorney, CISSP February 12, 2014 Topics . The risks of cyber attacks – Identifying threats – Conducting risk assessments . Choosing cost-effective security measures . Evaluating cyber insurance coverage 2 Identifying threats . If your business processes payment cards, card data thieves are targeting your customers’ card data: Trustwave 2013 Global Security Report, 8. 3 Identifying threats . Targeted malware – Deployed by phishing, poisoned websites, poisoned ads, watering hole attacks, and poorly protected third-party access tools. E.g., • Remote access accounts for service vendors that rely on weak passwords; and • Phished credentials for access to the cardholder data environment (“CDE”). 4 Identifying threats . Targeted malware – Programmed to find, copy, store, encrypt, and exfiltrate payment card data – Customized to avoid detection – Allows attacker to persistently communicate with, and exercise command and control of, the malware inside the target network – Permits an attacker to adapt to defenses (e.g., installs multiple backdoors to maintain attacker’s access). 5 Identifying threats . Targeted malware – Used to find assets on the network to steal: Insight Enterprise Intelligence tool. Used with permission. 6 Identifying threats 7 Identifying threats 8 Identifying threats 9 Identifying threats 10 Identifying threats 11 Identifying threats 12 Identifying threats . Issuers, merchants, and acquirers of credit, debit, and prepaid cards experienced gross fraud losses of $11.27 billion in 2012, up 14.6% over the prior year. Card issuers lost 63% and merchants and acquirers lost the other 37%. Business Wire, August 19, 2013, citing The Nilson Report. 13 Identifying threats . Global Payments, Inc.
    [Show full text]