Reports & Papers

16 Items

Donald Trump and Anthony Fauci

AP/Alex Brandon

Paper - Centre for International Governance Innovation

US Intelligence, the Coronavirus and the Age of Globalized Challenges

| Aug. 24, 2020

This essay makes three arguments. First, the US government will need to establish a coronavirus commission, similar to the 9/11 commission, to determine why, since April 2020, the United States has suffered more coronavirus fatalities than any other country in the world. Second, the COVID-19 pandemic represents a watershed for what will be a major national security theme this century: biological threats, both from naturally occurring pathogens and from synthesized biology. Third, intelligence about globalized challenges, such as pandemics, needs to be dramatically reconceptualized, stripping away outmoded levels of secrecy.

Tractors on Westminster bridge

AP/Matt Dunham

Paper - Institut für Sicherheitspolitik

The Global Order After COVID-19

| 2020

Despite the far-reaching effects of the current pandemic,  the essential nature of world politics will not be transformed. The territorial state will remain the basic building-block of international affairs, nationalism will remain a powerful political force, and the major powers will continue to compete for influence in myriad ways. Global institutions, transnational networks, and assorted non-state actors will still play important roles, of course, but the present crisis will not produce a dramatic and enduring increase in global governance or significantly higher levels of international cooperation. In short, the post-COVID-19 world will be less open, less free, less prosperous, and more competitive than the world many people expected to emerge only a few years ago.

Report - Atlantic Council

The Reverse Cascade: Enforcing Security on the Global IoT Supply Chain

| June 2020

The Internet of Things (IoT) refers to the increasing convergence of the physical and digital worlds and it affects us all. Hundreds of "things" are being connected to the Internet and each other, with more than fifty billion devices expected to be connected by 2030. Many IoT devices are manufactured abroad at low cost with little consideration for security. How can we secure these devices, especially those manufactured outside the United States?

Paper - International Security Program, Belfer Center

They Believed They Were Doing No Wrong: NSA and the Snowden Documents

| March 26, 2015

"At the conclusion of this research, and to summarize my bottom line, I would say that the NSA, while operating under the direction of higher authority, nevertheless had a mindset—typically American—of overdoing things and with it, a reflex of protecting the secrets of the organization."

Discussion Paper - Energy Technology Innovation Policy Project, Belfer Center

Energy Technology Expert Elicitations for Policy: Workshops, Modeling, and Meta-analysis

| October 2014

Characterizing the future performance of energy technologies can improve the development of energy policies that have net benefits under a broad set of future conditions. In particular, decisions about public investments in research, development, and demonstration (RD&D) that promote technological change can benefit from (1) an explicit consideration of the uncertainty inherent in the innovation process and (2) a systematic evaluation of the tradeoffs in investment allocations across different technologies. To shed light on these questions, over the past five years several groups in the United States and Europe have conducted expert elicitations and modeled the resulting societal benefits. In this paper, the authors discuss the lessons learned from the design and implementation of these initiatives.

Discussion Paper - International Security Program, Belfer Center

NATO in Afghanistan: Democratization Warfare, National Narratives, and Budgetary Austerity

| December 2013

This paper explains changes in NATO's nationbuilding strategy for Afghanistan over time as an internal push-and-pull struggle between the major NATO contributors. It distinguishes between he "light footprint" phase, which had numerous problems connected to limited resources and growing insurgency (2003–2008), NATO's adoption of a comprehensive approach (CSPMP) and counterinsurgency (COIN) strategy (2009–2011), the transition and drawdown (2011–2014), and the Enduring Partnership (beyond 2014). The paper explains NATO's drawdown, stressing both increased budgetary strictures compelling decisionmakers to focus on domestic concerns nd predominant national narratives connected to a protracted stabilization effort in Afghanistan.

Discussion Paper - Managing the Atom Project, Belfer Center

Antiproliferation: Tackling Proliferation by Engaging the Private Sector

| November 2012


Illicit trade from the international marketplace plays a direct role in sustaining the nuclear and missile programs of several countries, including Iran, in defiance of UN sanctions. This paper sets out what measures the private sector should take in order to manage the legal, financial and reputational risks associated with involvement in proliferation-related trade, and makes recommendations to national authorities for how for how to help the private sector identify and prevent potential proliferation.

A Pakistani Internet user surfs the YouTube Web site at a local Internet cafe in Islamabad, Pakistan, Feb. 26, 2008. Pakistan defended its clampdown on the YouTube Web site which accidentally interrupted access for Internet users around the globe.

AP Photo

Paper - Munk School of Global Affairs, University of Toronto

Duties for Internet Service Providers

| March 2012

In today's interconnected world, the Internet is no longer a tool. Rather, it is a service that helps generate income and employment, provides access to business and information, enables e-learning, and facilitates government activities. It is an essential service that has been integrated into every part of our society. Our experience begins when an Internet Service Provider (ISP) uses fixed telephony (plain old telephone service), mobile-cellular telephony, or fixed fiber-optic or broadband service to connect us to the global network. From that moment on, the ISP shoulders the responsibility for the instantaneous, reliable, and secure movement of our data over the Internet.