North Africa Weekly: December 3, 2025

…mining-rail corridor, a crucial export link for iron ore. AFRICAN BUSINESS Europe backs African push to get more value from critical minerals European partners support African governments’ efforts to expand…
Rethinking Himalayan Cryosphere Risk Assessment in the Wake of Nepal’s Thame Disaster

…the Thyanbo lakes. Evidence gathered suggests that the hazard chain was initiated by a minor slope failure from the glaciated area immediately upslope from Upper Mukse (likely either ice, rockfall,…
Bringing the Developing World into the Nuclear Security Conversation
…a bomb, and other security efforts-such as physical security at nuclear sites and binding international standards-remain elusive. For all of its progress, the NSS process cannot and will not be…
Israel is Trying to Move Beyond Deterrence with Hezbollah

…incident may now seem minor in comparison with everything that has followed, but it reflects the volatile nature of the Israel-Hezbollah stand-off, and, perhaps more importantly, the fundamental vulnerability that…
Mekong – US Partnership Track 1.5 Policy Dialogue Summary Report on Energy and Infrastructure

…of ThailandVithounlabandith (Vitoun) Thoummabouth, Ministry of Energy and Mines of Lao PDRBeni Suryadi, ASEAN Center for EnergyMatthieu Bommier, Nam Theun 2 Power Company Panel B4: Planning for coastal defense infrastructure…
What is UNIFIL’s Future Amidst A New Hezbollah-Israel War?

…of war.” Israeli Prime Minister Benyamin Netanyahu in mid-October called on UN Secretary General Antonio Guterres to “remove UNIFIL from Hezbollah’s strongholds and war zones” or risk further casualties. “Get…
Robert Markos’ Op-Ed in The Hill on the Nature of War
Wake up, America: There is no such thing as a “clean war,” where the only blood that spills is that of the enemy. After reading several media sites these past…
Bias in Nuclear Security Implementation

…and cleared for access to sensitive nuclear sites, material, and information — might betray the trust of their colleagues and supervisors to misuse that access for malicious, harmful purposes. Yet…