Reports & Papers

6 Items

Report - CNA's Center for Naval Analyses

Russia and the Global Nuclear Order

| March 2024

Russia's 2022 invasion of Ukraine illuminated the long profound shadow of nuclear weapons over international security. Russia's nuclear threats have rightfully garnered significant attention because of the unfathomable lethality of nuclear weapons. However, the use of such weapons in Ukraine is only one way—albeit the gravest— that Russia could challenge the global nuclear order. Russia's influence extends deep into the very fabric of this order—a system to which it is inextricably bound by Moscow's position in cornerstone institutions such as the Nuclear Non-Proliferation Treaty (NPT) and the International Atomic Energy Agency (IAEA). From withdrawing from key treaties to stymieing resolutions critical of misconduct, Moscow has demonstrated its ability to challenge the legitimacy, relevance, and interpretations of numerous standards and principles espoused by the West.

U.S. Secretary of Defense William J. Perry (right) Ukraine Minister of Defense Valeriy Shmarov (center) and Russian Federation Minister of Defense General of the Army Pavel Grachev (left)

Public Domain/Petty Officer 1st Class Todd P. Cichonowicz, U.S. Navy

Paper - Hague Centre for Strategic Studies

Hard Times for Arms Control: What Can Be Done?

| February 2022

The world has grown more dangerous but also less open to arms control measures that could limit some of the dangers. What can be done? Steven E. Miller offers a tour de force overview of both dismal and hopeful trends within arms control over the past decades, in this first paper of a new HCSS series on Arms Control.

Report - Atlantic Council

The Reverse Cascade: Enforcing Security on the Global IoT Supply Chain

| June 2020

The Internet of Things (IoT) refers to the increasing convergence of the physical and digital worlds and it affects us all. Hundreds of "things" are being connected to the Internet and each other, with more than fifty billion devices expected to be connected by 2030. Many IoT devices are manufactured abroad at low cost with little consideration for security. How can we secure these devices, especially those manufactured outside the United States?

Discussion Paper - Managing the Atom Project, Belfer Center

Antiproliferation: Tackling Proliferation by Engaging the Private Sector

| November 2012


Illicit trade from the international marketplace plays a direct role in sustaining the nuclear and missile programs of several countries, including Iran, in defiance of UN sanctions. This paper sets out what measures the private sector should take in order to manage the legal, financial and reputational risks associated with involvement in proliferation-related trade, and makes recommendations to national authorities for how for how to help the private sector identify and prevent potential proliferation.

A Pakistani Internet user surfs the YouTube Web site at a local Internet cafe in Islamabad, Pakistan, Feb. 26, 2008. Pakistan defended its clampdown on the YouTube Web site which accidentally interrupted access for Internet users around the globe.

AP Photo

Paper - Munk School of Global Affairs, University of Toronto

Duties for Internet Service Providers

| March 2012

In today's interconnected world, the Internet is no longer a tool. Rather, it is a service that helps generate income and employment, provides access to business and information, enables e-learning, and facilitates government activities. It is an essential service that has been integrated into every part of our society. Our experience begins when an Internet Service Provider (ISP) uses fixed telephony (plain old telephone service), mobile-cellular telephony, or fixed fiber-optic or broadband service to connect us to the global network. From that moment on, the ISP shoulders the responsibility for the instantaneous, reliable, and secure movement of our data over the Internet.

Discussion Paper - Science, Technology, and Public Policy Program, Belfer Center

WikiLeaks 2010: A Glimpse of the Future?

    Author:
  • Tim Maurer
| August 2011

The recent publications on WikiLeaks reveal a story about money, fame, sex, underground hackers, and betrayal. But it also involves fundamental questions regarding cyber-security and foreign policy. This paper argues WikiLeaks is only the symptom of a new, larger problem which is the result of technological advances that allow a large quantity of data to be 'stolen' at low or no cost by one or more individuals and to be potentially made public and to go 'viral', spreading exponentially online.