Reports & Papers

12 Items

Paper - Carnegie Endowment for International Peace

Russia and Cyber Operations: Challenges and Opportunities for the Next U.S. Administration

| December 13, 2016

Russian cyber operations against the United States aim to both collect information and develop offensive capabilities against future targets. Washington must strengthen its defenses in response.

Report - Council on Foreign Relations Press

Global Korea: South Korea's Contributions to International Security

    Authors:
  • Scott Bruce
  • John Hemmings
  • Balbina Y. Hwang
  • Scott Snyder
| October 2012

Given the seriousness of the ongoing standoff on the Korean peninsula, South Korea's emergence as an active contributor to international security addressing challenges far from the Korean peninsula is a striking new development, marking South Korea's emergence as a producer rather than a consumer of global security resources. This volume outlines South Korea's progress and accomplishments toward enhancing its role and reputation as a contributor to international security.

Report Chapter

South Korea's Counterpiracy Operations in the Gulf of Aden

| October 2012

In March 2009, the South Korean National Assembly approved the first foreign deployment of South Korea's naval forces to join the U.S.-led Combined Task Force (CTF-151). The purpose of CTF-151 is to conduct antipiracy operations in the Gulf of Aden and off Somalia's east coast by the Horn of Africa. South Korea joined the navies of twenty four other countries that participate in the Combined Maritime Forces (CMF) through one of three combined task forces, CTF-150, CTF-151, and CTF-152, to help ensure maritime security in this region. The CMF is an international effort to conduct maritime security operations in the Gulf of Aden, the Arabian Sea, and the Indian Ocean.

Report - Center for Strategic and International Studies

The U.S.-Japan Alliance: Anchoring Stability in Asia

| August 2012

The following report presents a consensus view of the members of a bipartisan study group on the U.S.-Japan alliance. The report specifically addresses energy, economics and global trade, relations with neighbors, and security-related issues. Within these areas, the study group offers policy recommendations for Japan and the United States, which span near- and long-term time frames. These recommendations are intended to bolster the alliance as a force for peace, stability, and prosperity in the Asia-Pacific region and beyond.

Report - Centre for International Governance Innovation

Unleashing the Nuclear Watchdog: Strengthening and Reform of the IAEA

| June 2012

This report marks the culmination of a two-year research project that examined all aspects of the mandate and operations of the International Atomic Energy Agency, from major programs on safeguards, safety, security, and the peaceful uses of nuclear energy to governance, management, and finance.

Paper - American Academy of Arts & Sciences

Nuclear Collisions: Discord, Reform & the Nuclear Nonproliferation Regime

    Authors:
  • Wael Al-Assad
  • Jayantha Dhanapala
  • C. Raja Mohan
  • Ta Minh Tuan
| April 2012

Nearly all of the 190 signatories to the Nuclear Non-Proliferation Treaty (NPT) agree that the forty-two-year-old treaty is fragile and in need of fundamental reform. But gaining consensus on how to fix the NPT will require reconciling the sharply differing views of nuclear weapon states and non-nuclear weapon states. Strengthening the international rules is increasingly important as dozens of countries, including some with unstable political environments, explore nuclear energy. The result is an ever-increasing distribution of this technology. In this paper, Steven E. Miller outlines the main points of contention within the NPT regime and identifies the issues that have made reform so difficult.

Discussion Paper - Science, Technology, and Public Policy Program, Belfer Center

Cyber Norm Emergence at the United Nations—An Analysis of the UN's Activities Regarding Cyber-security

    Author:
  • Tim Maurer
| September 2011

Cyber-warfare is no longer science fiction and the debate among policy-makers on what norms will guide behavior in cyber-space is in full swing. The United Nations (UN) is one of the fora where this debate is taking place exhibiting an astonishing rate of norm emergence in cyber-space. Most recently, Russia together with China proposed an “International code of conduct for information security” in September 2011 after the U.S. reversed its long-standing policy position in 2010.

Discussion Paper - Science, Technology, and Public Policy Program, Belfer Center

WikiLeaks 2010: A Glimpse of the Future?

    Author:
  • Tim Maurer
| August 2011

The recent publications on WikiLeaks reveal a story about money, fame, sex, underground hackers, and betrayal. But it also involves fundamental questions regarding cyber-security and foreign policy. This paper argues WikiLeaks is only the symptom of a new, larger problem which is the result of technological advances that allow a large quantity of data to be 'stolen' at low or no cost by one or more individuals and to be potentially made public and to go 'viral', spreading exponentially online.

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Cyber Power

| May 2010

Power depends upon context, and the rapid growth of cyber space is an important new context in world politics. The low price of entry, anonymity, and asymmetries in vulnerability means that smaller actors have more capacity to exercise hard and soft power in cyberspace than in many more traditional domains of world politics. The largest powers are unlikely to be able to dominate this domain as much as they have others like sea or air. But cyberspace also illustrates the point that diffusion of power does not mean equality of power or the replacement of governments as the most powerful actors in world politics.