Articles

131 Items

A security guard stands near a sculpture of the Chinese Communist Party flag at the Museum of the Communist Party of China on May 26, 2022, in Beijing.

AP Photo/Ng Han Guan

Journal Article - Quarterly Journal: International Security

Strategic Substitution: China’s Search for Coercive Leverage in the Information Age

    Author:
  • Fiona Cunningham
| Summer 2022

After the mistaken U.S. bombing of the Chinese Embassy in Belgrade in 1999, China turned to information-age weapons to create a risk of escalation to nuclear war with the United States. This shift helps compensate for its conventional military inferiority.

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

Ambassador Ivor Richard, left, of the United Kingdom, and U.S. Ambassador Andrew Young, right, raise their arms during vote, Friday, Nov. 4, 1977 at the United Nations Security Council.

(AP Photo/Dave Pickoff)

Journal Article - Quarterly Journal: International Security

Caught Red-Handed: How States Wield Proof to Coerce Wrongdoers

| Fall 2021

States frequently acquire proof that other states have violated norms. Yet, existing theories do not fully explain how states wield such proof to coerce wrongdoers. Four case studies of nuclear proliferation probe a novel theory of how states coerce norm violators by concealing, sharing privately, or publicizing proof of guilt.

Signing of the SALT treaty between the U.S. and the U.S.S.R. is observed by officials as U.S. President Richard Nixon, left and Soviet leader Leonid Brezhnev, right, sign document in Moscow, May 26, 1972. (AP Photo)

AP Photo

Journal Article - Quarterly Journal: International Security

Arms Control as Wedge Strategy: How Arms Limitation Deals Divide Alliances

| Fall 2021

Wedge strategy theory explains how states use strategic arms control to divide adversaries by affecting their trust, threat perceptions, and beliefs about a commitment’s trade-offs. Examining three landmark arms control negotiations shows how the wedge motive was a key component to these negotiations.

teaser image

Magazine Article - Economist

Digital Dominance: A new global ranking of cyber-power throws up some surprises

China has the world’s largest army. Russia wields the most tanks. America owns the fanciest satellites. But who has the most cyber-power? A new National Cyber Power Index by the Belfer Centre at Harvard University ranks 30 countries on their level of ambition and capability. Offensive cyber-power—the ability to do harm in or through computer networks—is one measure. But so too are the strength of a country’s defences, the sophistication of its cyber-security industry and its ability to spread and counter propaganda.

teaser image

Newspaper Article

Chinese cyber power is neck-and-neck with US, Harvard research finds

| Sep. 08, 2020

As conventional wisdom goes, experts tend to rank the U.S ahead of China, U.K.IranNorth KoreaRussia, in terms of how strong it is when it comes to cyberspace. But a new study from Harvard University’s Belfer Center shows that China has closed the gap on the U.S. in three key categories: surveillance, cyber defense, and its efforts to build up its commercial cyber sector.

“A lot of people, Americans in particular, will think that the U.S., the U.K., France, Israel are more advanced than China when it comes to cyber power,” Eric Rosenbach, the Co-Director of Harvard’s Belfer Center, told CyberScoop. “Our study shows it’s just not the case and that China is very sophisticated and almost at a peer level with the U.S.”

nuclear power plant

Wikimedia CC/Korea Yonggwang NPP

Journal Article - Journal for Peace and Nuclear Disarmament

The Nuclear Fuel Cycle and the Proliferation ‘Danger Zone’

| May 27, 2020

Horizontal nuclear proliferation presents what is sometimes referred to as the "Nth country problem," or identifying which state could be next to acquire nuclear weapons. Nuclear fuel cycle technologies can contribute to both nuclear power generation and weapons development. Consequently, observers often view civilian nuclear programs with suspicion even as research on nuclear latency and the technological inputs of proliferation has added nuance to these discussions. To contribute to this debate, the author puts forth a simple theoretical proposition: En route to developing a civilian nuclear infrastructure and mastering the fuel cycle, states pass through a proliferation "danger zone."