Reports & Papers

13 Items

Donald Trump and Anthony Fauci

AP/Alex Brandon

Paper - Centre for International Governance Innovation

US Intelligence, the Coronavirus and the Age of Globalized Challenges

| Aug. 24, 2020

This essay makes three arguments. First, the US government will need to establish a coronavirus commission, similar to the 9/11 commission, to determine why, since April 2020, the United States has suffered more coronavirus fatalities than any other country in the world. Second, the COVID-19 pandemic represents a watershed for what will be a major national security theme this century: biological threats, both from naturally occurring pathogens and from synthesized biology. Third, intelligence about globalized challenges, such as pandemics, needs to be dramatically reconceptualized, stripping away outmoded levels of secrecy.

The U.S. Capitol is seen at sunrise, in Washington, October 10, 2017

AP Photo/J. Scott Applewhite

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Protecting Democracy in an Era of Cyber Information War

| February 2019

Citizens voluntarily carry Big Brother and his relatives in their pockets. Along with big data and artificial intelligence, technology has made the problem of defending democracy from information warfare far more complicated than foreseen two decades ago. And while rule of law, trust, truth and openness make democracies asymmetrically vulnerable, they are also critical values to defend.  Any policy to defend against cyber information war must start with the Hippocratic oath: first, do no harm.

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

The Regime Complex for Managing Global Cyber Activities

| November 2014

In 1992, there were only a million users on the Internet; today, there are nearly three billion, and the Internet has become a substrate of modern economic, social and political life. And the volatility continues. Analysts are now trying to understand the implications of ubiquitous mobility, the "Internet of everything" and analysis of "big data." Over the past 15 years, the advances in technology have far outstripped the ability of institutions of governance to respond, as well as our thinking about governance.

Paper - American Academy of Arts & Sciences

A Worst Practices Guide to Insider Threats: Lessons from Past Mistakes

| April 2014

Insider threats are perhaps the most serious challenges that nuclear security systems face. Insiders perpetrate a large fraction of thefts from heavily guarded non-nuclear facilities as well, yet organizations often find it difficult to understand and protect against insider threats. Why is this the case? Part of the answer is that there are deep organizational and cognitive biases that lead managers to downplay the threats insiders pose to their nuclear facilities and operations. But another part of the answer is that those managing nuclear security often have limited information about incidents that have happened in other countries or in other industries, and the lessons that might be learned from them.

Paper

Strengthening Global Approaches To Nuclear Security

| July 1, 2013

Despite substantial progress in improving nuclear security in recent years, there is more to be done.  The threats of nuclear theft and terrorism remain very real.  This paper recommends learning from the much stronger national and international efforts in nuclear safety, and in particular taking steps to build international understanding of the threat; establish effective performance objectives; assure performance; train and certify needed personnel; build security culture and exchange best practices; reduce the number of sites that need to be protected; and strengthen the international framework and continue the dialogue once leaders are no longer meeting regularly at the summit level.

This undated handout photo provided by the National Nuclear Security Administration shows the United States' last B53 nuclear bomb. The 10,000-pound bomb was scheduled to be dismantled Oct. 25, 2011 at the Pantex Plant just outside Amarillo, Texas.

AP Photo

Paper

Safe, Secure and Effective Nuclear Operations in the Nuclear Zero Era

| April 2012

Without significant change in the geopolitical landscape, nuclear weapons will remain a relevant portion of America's long-term national security strategy. Therefore, the burdens and responsibilities of maintaining an effective nuclear deterrent force are paramount to ensure credibility for America and her allies. Bottom line: nuclear weapons and nuclear deterrence are still relevant today and for the foreseeable future. Therefore, to maintian international strategic stability we must embrace the necessity of nuclear deterrence, develop strategic policy that supports deterrence as an essential element and adequately resource the enterprise.

Report - Center for Strategic and International Studies

The U.S.-Japan Alliance: Anchoring Stability in Asia

| August 2012

The following report presents a consensus view of the members of a bipartisan study group on the U.S.-Japan alliance. The report specifically addresses energy, economics and global trade, relations with neighbors, and security-related issues. Within these areas, the study group offers policy recommendations for Japan and the United States, which span near- and long-term time frames. These recommendations are intended to bolster the alliance as a force for peace, stability, and prosperity in the Asia-Pacific region and beyond.

Paper

The Need for the Next Special Operations Forces' Mobility Aircraft

| June 2012

The proliferation of threat systems and Anti-Access, Area Denial (A2/AD) strategies make performing special operations forces' (SOF) air mobility missions increasingly complicated and limit the capability to defeat air defenses and penetrate into denied airspace. Combined with an aging inventory, ill suited to evading these threats, Air Force Special Operations Command (AFSOC) and the United States Special Operations Command (USSOCOM) must look to technology to defeat the more modern threat systems and anti-access strategies. The best answer to penetrate future, denied regions is in stealth or low observable (LO) technology.

The No.1 and No. 2 reactors at the Tianwan Nuclear Power Plant in Lianyungang city, China, 22 Mar. 2009. The Tianwan power plant is designed to have eight reactors.

AP Photo

Paper

China's Current Spent Fuel Management and Future Management Scenarios

| July 2010

China's recent nuclear energy ambitions have put it in the forefront of research and development in the nuclear industry.This paper will first discuss the status of China's current spent fuel management methods and storage capability. Second, this paper will estimate and calculate the accumulated spent fuel and required spent fuel storage up to 2040 based on three different nuclear development scenarios. Third, future spent fuel management scenarios from now to 2040 are designed and financial costs and proliferation risks are evaluated and discussed associated with each scenario. Last, policy recommendations will be provided for the future spent fuel.

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Cyber Power

| May 2010

Power depends upon context, and the rapid growth of cyber space is an important new context in world politics. The low price of entry, anonymity, and asymmetries in vulnerability means that smaller actors have more capacity to exercise hard and soft power in cyberspace than in many more traditional domains of world politics. The largest powers are unlikely to be able to dominate this domain as much as they have others like sea or air. But cyberspace also illustrates the point that diffusion of power does not mean equality of power or the replacement of governments as the most powerful actors in world politics.