The Arab Spring’s Aftermath, in 7 Minutes

In this Friday, Jan. 28, 2011 file photo, Egyptian anti-government activists clash with riot police in Cairo, Egypt.

Ben Curtis/AP

AA Font size + Print

In this Friday, Jan. 28, 2011 file photo, Egyptian anti-government activists clash with riot police in Cairo, Egypt.

A look at where Libya, Syria, Egypt, Yemen, Bahrain, and Tunisia stand now.

Demonstrations marking the anniversary of the Egyptian uprising were subdued on Monday. Five years earlier, on January 25, 2011, mass protests had broken out in Cairo’s Tahrir Square, culminating weeks later in the ouster of Egyptian strongman Hosni Mubarak, who had ruled the country for the previous three decades. Since then, Egypt has experienced its first democratic elections, the brief presidential tenure of Mohammed Morsi of the previously banned Muslim Brotherhood, another wave of protests over his misrule, a military coup, and a reversion to authoritarianism under former army chief and now President Abdel Fattah el- Sisi. As Lauren Bohn documented from Cairo over the weekend, many of the revolution’s leaders and supporters are now in prison; the crackdown only intensified ahead of the anniversary of the Tahrir Square protests.

Similar uprisings across the Middle East seemed, five years ago, to hold the promise of a wave of transitions to democracy throughout a region infamous for its dictatorships. The relative absence of al-Qaeda as a driving force in the events appeared to show that the forces of democracy had succeeded in removing dictators where terrorists groups, which sought to overthrow those regimes by violent means, had failed. Since then, though, the flood of good news from the region has dried up. ISIS has fed off the civil war that resulted from Syrian President Bashar al-Assad’s crackdown on protesters, and the group has also put down roots in Libya, where chaos followed the international military campaign to overthrow the late Muammar al-Qaddafi. Yemen, too, is engulfed in war. Houthi rebels took over the capital in 2014, and a 10-month Saudi-led bombing campaign has caused massive loss of civilian life but so far failed to dislodge the rebels. Tunisia, in the words of Steven Cook of the Council on Foreign Relations, is “widely regarded as the Arab Spring’s success story,” marked by the passage of a new constitution and a peaceful transfer of power through elections in 2014, and a Nobel Peace Prize awarded in 2015 to the civil-society groups that helped bring all of it about. But even there, Cook notes, the “transition hasn’t been smooth.”

In the audio slideshow that follows, Cook gives a brief tour of the region and what happened to the Arab Spring, country by country, over the past five years.

—Kathy Gilsinan, The Atlantic

This post appears courtesy of the Council on Foreign Relations.

Close [ x ] More from DefenseOne

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.


When you download a report, your information may be shared with the underwriters of that document.