Reports & Papers

13 Items

Donald Trump and Anthony Fauci

AP/Alex Brandon

Paper - Centre for International Governance Innovation

US Intelligence, the Coronavirus and the Age of Globalized Challenges

| Aug. 24, 2020

This essay makes three arguments. First, the US government will need to establish a coronavirus commission, similar to the 9/11 commission, to determine why, since April 2020, the United States has suffered more coronavirus fatalities than any other country in the world. Second, the COVID-19 pandemic represents a watershed for what will be a major national security theme this century: biological threats, both from naturally occurring pathogens and from synthesized biology. Third, intelligence about globalized challenges, such as pandemics, needs to be dramatically reconceptualized, stripping away outmoded levels of secrecy.

Paper - Carnegie-Tsinghua Center for Global Policy

Stabilizing Sino-Indian Security Relations: Managing the Strategic Rivalry After Doklam

| June 21, 2018

The paper provides a detailed analysis of the contemporary Sino-Indian conventional ground and nuclear force balances and carefully reconstructs how mutual developments in these areas are perceived by both New Delhi and Beijing.

Paper - International Security Program, Belfer Center

They Believed They Were Doing No Wrong: NSA and the Snowden Documents

| March 26, 2015

"At the conclusion of this research, and to summarize my bottom line, I would say that the NSA, while operating under the direction of higher authority, nevertheless had a mindset—typically American—of overdoing things and with it, a reflex of protecting the secrets of the organization."

Report - Centre for International Governance Innovation

Unleashing the Nuclear Watchdog: Strengthening and Reform of the IAEA

| June 2012

This report marks the culmination of a two-year research project that examined all aspects of the mandate and operations of the International Atomic Energy Agency, from major programs on safeguards, safety, security, and the peaceful uses of nuclear energy to governance, management, and finance.

Nov. 17, 2009: Pakistani army troops patrol in a damaged market in Sararogha, in the Pakistani tribal region of South Waziristan along the Afghan border.

AP Photo

Report - Century Foundation

Militancy in Pakistan's Borderlands: Implications for the Nation and for Afghan Policy

| 2010

This paper provides a critical perspective on past Pakistani policy toward jihadist militant groups, the growth of their influence in Federally Administered Tribal Areas (FATA) and Kyber Pukhtunkhwa Province (KPP), and what steps need to be taken in order to reverse their momentum. Abbas argues that Pakistan's civilian and military leadership will have to transition from a short-term strategy of deal-making and army offensives to a long-term political solution that will erode the gains made by militant groups in these areas since 2002.

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Cyber Power

| May 2010

Power depends upon context, and the rapid growth of cyber space is an important new context in world politics. The low price of entry, anonymity, and asymmetries in vulnerability means that smaller actors have more capacity to exercise hard and soft power in cyberspace than in many more traditional domains of world politics. The largest powers are unlikely to be able to dominate this domain as much as they have others like sea or air. But cyberspace also illustrates the point that diffusion of power does not mean equality of power or the replacement of governments as the most powerful actors in world politics.

Mar. 29, 2010: a poster in Lahore, Pakistan, shows Pakistani nuclear scientist A.Q. Khan. As U.S. President Barack Obama hosted a nuclear security summit in April 2010, many states remained weak links in the global defense against nuclear terrorism.

AP Photo

Report - Begin-Sadat Center for Strategic Studies

The Armageddon Scenario: Israel and the Threat of Nuclear Terrorism

| April 2010

The following study focuses on the threat of nuclear terrorism facing Israel. It begins with an overview of the nature of the threat, before turning to the potential perpetrators of nuclear terrorism against Israel, possible delivery mechanisms and targets, and the specific scenarios under which the threat to Israel might materialize. The study then presents possible policy options for Israel to deal with the threat, both unilaterally and in conjunction with the United States.

A Saudi woman and her son walk past the Imam Muhammad ibn Abdel-Wahhab Philanthropic School for Women's Quranic Studies in Riyadh, Saudi Arabia, March 21, 2003.

AP Photo

Paper - Combating Terrorism Center

The Failure of Jihad in Saudi Arabia

| February 25, 2010

The paper argues that despite the widespread view of Saudi Arabia as "al-Qa'ida country," and despite the recent developments in Yemen, the jihad in Saudi Arabia has failed so far. The late 1990s saw no operations in the Kingdom because Bin Ladin's infrastructure there was too weak. The AQAP campaign, made possible by the massive influx in 2002 of al-Qa'ida members from Afghanistan, petered out in 2006. Today, practically nothing remains of the original AQAP organization. Nevertheless, its legacy and propaganda continues to inspire amateur cells, and al-Qa'ida in Yemen is actively planning operations in the Kingdom.

Information Galaxy: Intelligence Study on Security and Defense—Case on Potential Terrorism at the Beijing 2008 Olympic Games

People's Daily

Paper

Information Galaxy: Intelligence Study on Security and Defense—Case on Potential Terrorism at the Beijing 2008 Olympic Games

| April 2008

The summer 2008 Olympic Games will take place in Beijing, China on August 8–24. In general, the security situation for the 2008 Beijing Olympic Games is quite stable, but still we need to face up to the threats from both traditional and non-traditional security areas such as terrorism, separatism and extremism. Terrorism is the biggest threat to the games. Effective security and defense strategies for the games require reliable intelligence.  Reliable intelligence, however, is notoriously difficult to obtain even though we are immersed in vast quantities of information. How can we identify and obtain the useful intelligence from the vast sea of other less useful information? After analyzing the potential terrorism attacks and terrorists in the games, the paper analyzes the potential means for counterterrorism at the games, and tries to set up an intelligence study system based on the IG (Information Galaxy), which includes five parts: Sun (S), Earth (E), Moon (M), ISE (Information Sharing Environment) and IG (Information Galaxy).