Reports & Papers

128 Items

Report - CNA's Center for Naval Analyses

Russia and the Global Nuclear Order

| March 2024

Russia's 2022 invasion of Ukraine illuminated the long profound shadow of nuclear weapons over international security. Russia's nuclear threats have rightfully garnered significant attention because of the unfathomable lethality of nuclear weapons. However, the use of such weapons in Ukraine is only one way—albeit the gravest— that Russia could challenge the global nuclear order. Russia's influence extends deep into the very fabric of this order—a system to which it is inextricably bound by Moscow's position in cornerstone institutions such as the Nuclear Non-Proliferation Treaty (NPT) and the International Atomic Energy Agency (IAEA). From withdrawing from key treaties to stymieing resolutions critical of misconduct, Moscow has demonstrated its ability to challenge the legitimacy, relevance, and interpretations of numerous standards and principles espoused by the West.

Report - Atlantic Council

The Reverse Cascade: Enforcing Security on the Global IoT Supply Chain

| June 2020

The Internet of Things (IoT) refers to the increasing convergence of the physical and digital worlds and it affects us all. Hundreds of "things" are being connected to the Internet and each other, with more than fifty billion devices expected to be connected by 2030. Many IoT devices are manufactured abroad at low cost with little consideration for security. How can we secure these devices, especially those manufactured outside the United States?

A member of the Czech Army takes part in an anti-terrorism drill at the Temelin nuclear power plant near the town of Tyn nad Vltavou, Czech Republic, April 11, 2017.

REUTERS/David W. Cerny

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

Revitalizing Nuclear Security in an Era of Uncertainty

| January 2019

Nuclear security around the world has improved dramatically over the last three decades—which demonstrates that with focused leadership, major progress is possible. But important weaknesses remain, and the evolution of the threat remains unpredictable. The danger that terrorists could get and use a nuclear bomb, or sabotage a major nuclear facility, or spread dangerous radioactive material in a “dirty bomb,” remains too high. The United States and countries around the world need to join together and provide the leadership and resources needed to put global nuclear security on a sustained path of continuous improvement, in the never-ending search for excellence in performance.

Paper - Carnegie-Tsinghua Center for Global Policy

Stabilizing Sino-Indian Security Relations: Managing the Strategic Rivalry After Doklam

| June 21, 2018

The paper provides a detailed analysis of the contemporary Sino-Indian conventional ground and nuclear force balances and carefully reconstructs how mutual developments in these areas are perceived by both New Delhi and Beijing.

Report - International Panel on Fissile Materials

China’s Fissile Material Production and Stockpile

| January 2018

China began producing highly enriched uranium (HEU) and plutonium for nuclear weapons in the 1960s and is believed to have halted production the 1980s. Despite the passage of thirty years there has been no official policy declaration in this regard. This report uses newly available public information from Chinese sources to provide an improved reconstruction of the history of China’s production of HEU and plutonium for nuclear weapons. This allows improved estimates of the amount of HEU and plutonium China has produced and of its current stockpiles.

Paper - Woodrow Wilson International Center for Scholars

Interpreting the Bomb: Ownership and Deterrence in Ukraine's Nuclear Discourse

| December 2017

Nuclear deterrence thinking has become so entrenched in U.S. academic and policy circles that it only seems natural that other states regard nuclear weapons in the same terms. Yet is it necessarily so? In this working paper, Polina Sinovets and Mariana Budjeryn examine the case of Ukraine to understand how its leaders interpreted the value of the nuclear weapons deployed on Ukrainian territory in 1990–1994.

Los Alamos National Laboratory, National Security Science, July 2015

Los Alamos National Laboratory

Discussion Paper - Managing the Atom Project, Belfer Center

When Did (and Didn’t) States Proliferate?

| June 2017

In this Project on Managing the Atom Discussion Paper, Philipp C. Bleek chronicles nuclear weapons proliferation choices throughout the nuclear age. Since the late 1930s and early 1940s, some thirty-one countries are known to have at least explored the possibility of establishing a nuclear weapons program. Seventeen of those countries launched weapons programs, and ten acquired deliverable nuclear weapons.

Paper - Cyber Security Project, Belfer Center

Too Connected to Fail

| May 2017

This paper argues that threats to core internet infrastructure and services can, in fact, rise to the level of a serious national security threat to the United States and will explore scenarios where this may be the case. The paper will discuss several kinds of core internet services and infrastructure and explore the challenges with understanding interdependencies between the internet and critical infrastructure; review recent attack techniques that can cause systemic risk to the internet; discuss various nation state capabilities, intentions and recent activities in this area; and describe how these attacks could be used against the United States to deter the U.S., control escalation, or potentially degrade U.S. warfighting capabilities in a conflict. Finally, the paper concludes with recommendations for what the United States and other governments can do to build defenses and resiliency against systemic threats to the internet.

Paper - Centre for International Governance Innovation

Getting beyond Norms: When Violating the Agreement Becomes Customary Practice

| Apr. 20, 2017

This paper offers five standards of care that can be used to test individual states' true commitment to the international norms of behaviour. Only with a concerted and coordinated effort across the global community will it be possible to change the new normal of "anything goes" and move forward to ensure the future safety and security of the Internet and Internet-based infrastructures.