25 Items

An F-35A Lightning II flies above the Mojave Desert

USAF/Public Domain

Analysis & Opinions - Bulletin of the Atomic Scientists

To Enhance National Security, the Biden Administration Will Have to Trim an Exorbitant Defense Wish List

| Mar. 13, 2024

David Kearn argues that even in the absence of restrictive resource and budgetary constraints, a focus on identifying and achieving concrete objectives that will position the United States and its allies to effectively deter aggression in critical regional flashpoints should be the priority given the stressed nature of the defense industrial base and the nuclear enterprise.

teaser image

Journal Article - Journal of Cybersecurity

Rules of Engagement for Cyberspace Operations: A View From the USA

| March 2017

As cyber weapons are incorporated into US military planning, policy makers and field commanders will increasingly confront a core issue: How to formulate the rules of engagement (ROEs) for US forces with regard to military operations that may use such weapons. Michael Sulmeyer, Herbert Lin, and C. Robert Kehler address ROEs from the perspective of US military operators. 

- Belfer Center for Science and International Affairs, Harvard Kennedy School Belfer Center Newsletter

Brandon Parker: From Bombers to Nonproliferation

    Author:
  • Isabella Gordillo
| Spring 2015

As a young man in the small city of Ogden, Utah, Brandon Parker found himself increasingly interested in the U.S. Air Force, a service where his step-father had made his career. Recruited by the Air Force Academy to play basketball, Parker didn't initially want to become a pilot. But after his initial flight-screening program, he called his mother out of excitement to let her know that he had found exactly what he was meant to do. Until recently, Lieutenant Colonel Parker commanded a nuclear bomber unit based in North Dakota. This year, Parker a research fellow with the Center's International Security Program/Project on Managing the Atom, is conducting research on nuclear nonproliferation.

Analysis & Opinions - Bulletin of the Atomic Scientists

The Time is Now

| August 7, 2013

Ayman Khalil asked whether the effort to create a WMD-free zone in the Middle East is dead. Martin's answer is this: The effort will continue, but the opportunity presented by the 2010 Review Conference for the Nuclear Non-Proliferation Treaty (NPT) may be slipping out of reach.

Book - Rowman & Littlefield Publishers, Inc.

North Korea in Transition: Politics, Economy, and Society

    Editors:
  • Kyung-Ae Park
  • Scott Snyder
| December 2012

Following the death of Kim Jong Il, North Korea has entered a period of profound transformation laden with uncertainty. This authoritative book brings together the world's leading North Korea experts to analyze both the challenges and prospects the country is facing. Drawing on the contributors' expertise across a range of disciplines, the book examines North Korea's political, economic, social, and foreign policy concerns.

Report - CNA's Center for Naval Analyses

CNA Maritime Asia Project Workshop Two: Naval Developments in Asia

    Authors:
  • Michael A. McDevitt
  • Catherine K. Lea
| 2012

As part of its Maritime Asia project, the Center for Naval Analyses (CNA) conducted a workshop focused on naval developments in Asia. The purpose of this workshop was to explore the interaction between China's ongoing naval modernization and the navy modernization programs that most of China's neighbors are pursuing.

Paper - Science, Technology, and Public Policy Program, Belfer Center

On the Use of Offensive Cyber Capabilities: A Policy Analysis on Offensive US Cyber Policy

    Authors:
  • Robert Belk
  • Matthew Noyes
| March 2012

This paper offers analysis and policy recommendations for use and response to various forms of cyber action for Offensive Military Cyber Policy. It establishes a pragmatic policy-relevant, effects-based ontology for categorizing cyber capabilities, and develops a comprehensive framework for cyber policy analysis. Furthermore, it demonstrates the utility of the cyber policy analysis framework by analyzing six key categories of external cyber actions identified by our ontology, which range the entire spectrum of cyber activity. Lastly, this work develops actionable policy recommendations from our analysis for cyber policy makers while identifying critical meta-questions.

- Belfer Center for Science and International Affairs, Harvard Kennedy School Belfer Center Newsletter

Q&A: John S. Park

| Summer 2012

John Park, a senior research associate at the U.S. Institute of Peace and currently a visiting fellow with the Belfer Center's International Security Program/Project on Managing the Atom, recently sat down with for a one-on-one interview where he talked about his work with the Center and his contributions to the Seoul Nuclear Security Summit.