Reports & Papers

25 Items

Flooding Red River

Flickr CC/Loozrboy

Paper - Belfer Center for Science and International Affairs and Wilson International Center for Scholars

Emergency Management in North America

| February 2022

North America continues to face evolving challenges to comprehensive emergency management. As climate change, technology, global health, and the nature and scale of emergencies change, so does the need for improved coordination among the United States, Mexico, and Canada. This is further complicated by the distinct federal systems that operate in each country, and the different roles that national, regional, and private corporations can and should play across all of these separate jurisdictions.

Donald Trump and Anthony Fauci

AP/Alex Brandon

Paper - Centre for International Governance Innovation

US Intelligence, the Coronavirus and the Age of Globalized Challenges

| Aug. 24, 2020

This essay makes three arguments. First, the US government will need to establish a coronavirus commission, similar to the 9/11 commission, to determine why, since April 2020, the United States has suffered more coronavirus fatalities than any other country in the world. Second, the COVID-19 pandemic represents a watershed for what will be a major national security theme this century: biological threats, both from naturally occurring pathogens and from synthesized biology. Third, intelligence about globalized challenges, such as pandemics, needs to be dramatically reconceptualized, stripping away outmoded levels of secrecy.

A drone Interceptor MP200, top, prepares to catch a drone DJI Phantom 2 with a net during a demonstration flight in La Queue-en-Brie, France, in 2015 (AP Photo/Francois Mori).

AP Photo/Francois Mori

Paper - Nuclear Threat Initiative

The Risks and Rewards of Emerging Technology in Nuclear Security

| February 2020

Nuclear security is never finished. Nuclear security measures for protecting all nuclear weapons, weapons-usable nuclear materials, and facilities whose sabotage could cause disastrous consequences should protect against the full range of plausible threats. It is an ongoing endeavor that requires constant assessment of physical protection operations and reevaluation of potential threats. One of the most challenging areas of nuclear security is how to account for the impact–positive and negative—of non-nuclear emerging technologies. The amended Convention on the Physical Protection of Nuclear Material (amended CPPNM) states it should be reviewed in light of the prevailing situation, and a key part of the prevailing situation is technological evolution. Therefore, the upcoming review conference in 2021, as well as any future review conferences, should examine the security threats and benefits posed by emerging technologies.

The U.S. Capitol is seen at sunrise, in Washington, October 10, 2017

AP Photo/J. Scott Applewhite

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Protecting Democracy in an Era of Cyber Information War

| February 2019

Citizens voluntarily carry Big Brother and his relatives in their pockets. Along with big data and artificial intelligence, technology has made the problem of defending democracy from information warfare far more complicated than foreseen two decades ago. And while rule of law, trust, truth and openness make democracies asymmetrically vulnerable, they are also critical values to defend.  Any policy to defend against cyber information war must start with the Hippocratic oath: first, do no harm.

Report - Managing the Atom Project, Belfer Center

Fresh Ideas for the Future: Symposium on the NPT

| April 26, 2015

The abstracts in this booklet summarise the research presented at an academic symposium convened on the sidelines of the 2015 NPT Review Conference. As we write this, journalists and seasoned experts in the nuclear policy field have been speculating about the particularly difficult challenges facing the Review Conference this year. To address those challenges, we would urge all concerned to consider the ideas and analyses presented at this symposium. Experts would be hard-pressed to find a better collection of fresh ideas and approaches for assessing and strengthening the NPT.

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

The Regime Complex for Managing Global Cyber Activities

| November 2014

In 1992, there were only a million users on the Internet; today, there are nearly three billion, and the Internet has become a substrate of modern economic, social and political life. And the volatility continues. Analysts are now trying to understand the implications of ubiquitous mobility, the "Internet of everything" and analysis of "big data." Over the past 15 years, the advances in technology have far outstripped the ability of institutions of governance to respond, as well as our thinking about governance.

The National Nuclear Security Administration’s Pantex Plant is the only U.S. serial  production facility.

NNSA

Report - Nuclear Threat Initiative

Innovating Verification: New Tools & New Actors to Reduce Nuclear Risks

    Author:
  • Verifying Baseline Declarations of Nuclear Warheads and Materials Working Group
| July 2014

Part of NTI's Innovating Verification reports series, Verifying Baseline Declarations of Nuclear Warheads and Materials analyzes how baseline declarations can contribute to near- and long-term arms control and non-proliferation goals and how to verify them without compromising sensitive information.

Paper - Managing the Atom Project, Belfer Center

Shadow Wars of Weapons Acquisition: Arms Denial and its Strategic Implications

| July 01, 2014

In trying to prevent adversaries from acquiring new military capabilities, countries often employ strategies of arms denial; e.g., “unilateral diplomacy,” supply chain interdiction, covert sabotage, and targeted military strikes. Using a game-theoretical model of weapons acquisition and denial, the authors posit that the prevalence of this approach gives rise to strategic effects that affect all players’ behavior.

Paper - American Academy of Arts & Sciences

A Worst Practices Guide to Insider Threats: Lessons from Past Mistakes

| April 2014

Insider threats are perhaps the most serious challenges that nuclear security systems face. Insiders perpetrate a large fraction of thefts from heavily guarded non-nuclear facilities as well, yet organizations often find it difficult to understand and protect against insider threats. Why is this the case? Part of the answer is that there are deep organizational and cognitive biases that lead managers to downplay the threats insiders pose to their nuclear facilities and operations. But another part of the answer is that those managing nuclear security often have limited information about incidents that have happened in other countries or in other industries, and the lessons that might be learned from them.

Report - Managing the Atom Project, Belfer Center

Advancing Nuclear Security: Evaluating Progress and Setting New Goals

In the lead-up to the nuclear security summit, Advancing Nuclear Security: Evaluating Progress and Setting New Goals outlines what was accomplished in a four-year effort launched in 2009 to secure nuclear material around the globe—and what remains to be done. The effort made significant progress, but some weapons-usable nuclear materials still remain “dangerously vulnerable." The authors highlight the continuing danger of nuclear and radiological terrorism and call for urgent action.