Reports & Papers

122 Items

Report - CNA's Center for Naval Analyses

Russia and the Global Nuclear Order

| March 2024

Russia's 2022 invasion of Ukraine illuminated the long profound shadow of nuclear weapons over international security. Russia's nuclear threats have rightfully garnered significant attention because of the unfathomable lethality of nuclear weapons. However, the use of such weapons in Ukraine is only one way—albeit the gravest— that Russia could challenge the global nuclear order. Russia's influence extends deep into the very fabric of this order—a system to which it is inextricably bound by Moscow's position in cornerstone institutions such as the Nuclear Non-Proliferation Treaty (NPT) and the International Atomic Energy Agency (IAEA). From withdrawing from key treaties to stymieing resolutions critical of misconduct, Moscow has demonstrated its ability to challenge the legitimacy, relevance, and interpretations of numerous standards and principles espoused by the West.

guns and missiles burst forth from a laptop screen

Adobe Stock

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Guns, Incels, and Algorithms: Where We Are on Managing Terrorist and Violent Extremist Content Online

| June 12, 2023

Technology companies and governments have spent the past decade trying to better address the evolving threat of terrorist and violent extremist content online (TVEC). This paper examines how effective these efforts have been, where we are today in managing the problem, and wherein lie gaps for improvement.

Report - Atlantic Council

The Reverse Cascade: Enforcing Security on the Global IoT Supply Chain

| June 2020

The Internet of Things (IoT) refers to the increasing convergence of the physical and digital worlds and it affects us all. Hundreds of "things" are being connected to the Internet and each other, with more than fifty billion devices expected to be connected by 2030. Many IoT devices are manufactured abroad at low cost with little consideration for security. How can we secure these devices, especially those manufactured outside the United States?

A member of the Czech Army takes part in an anti-terrorism drill at the Temelin nuclear power plant near the town of Tyn nad Vltavou, Czech Republic, April 11, 2017.

REUTERS/David W. Cerny

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

Revitalizing Nuclear Security in an Era of Uncertainty

| January 2019

Nuclear security around the world has improved dramatically over the last three decades—which demonstrates that with focused leadership, major progress is possible. But important weaknesses remain, and the evolution of the threat remains unpredictable. The danger that terrorists could get and use a nuclear bomb, or sabotage a major nuclear facility, or spread dangerous radioactive material in a “dirty bomb,” remains too high. The United States and countries around the world need to join together and provide the leadership and resources needed to put global nuclear security on a sustained path of continuous improvement, in the never-ending search for excellence in performance.

Paper - Carnegie-Tsinghua Center for Global Policy

Stabilizing Sino-Indian Security Relations: Managing the Strategic Rivalry After Doklam

| June 21, 2018

The paper provides a detailed analysis of the contemporary Sino-Indian conventional ground and nuclear force balances and carefully reconstructs how mutual developments in these areas are perceived by both New Delhi and Beijing.

Report - International Panel on Fissile Materials

China’s Fissile Material Production and Stockpile

| January 2018

China began producing highly enriched uranium (HEU) and plutonium for nuclear weapons in the 1960s and is believed to have halted production the 1980s. Despite the passage of thirty years there has been no official policy declaration in this regard. This report uses newly available public information from Chinese sources to provide an improved reconstruction of the history of China’s production of HEU and plutonium for nuclear weapons. This allows improved estimates of the amount of HEU and plutonium China has produced and of its current stockpiles.

Paper - Woodrow Wilson International Center for Scholars

Interpreting the Bomb: Ownership and Deterrence in Ukraine's Nuclear Discourse

| December 2017

Nuclear deterrence thinking has become so entrenched in U.S. academic and policy circles that it only seems natural that other states regard nuclear weapons in the same terms. Yet is it necessarily so? In this working paper, Polina Sinovets and Mariana Budjeryn examine the case of Ukraine to understand how its leaders interpreted the value of the nuclear weapons deployed on Ukrainian territory in 1990–1994.

Paper - Cyber Security Project, Belfer Center

A Legislator's Guide to Reauthorizing Section 702

    Author:
  • Anne Boustead
| Aug. 20, 2017

Section 702 of the Foreign Intelligence Surveillance Act (FISA) Amendments Act of 2008, a powerful surveillance tool that allows U.S. government agencies to spy on foreign persons to collect counter-terrorism intelligence, will expire on December 31, 2017 without Congressional reauthorization. This paper has two goals: to concisely describe how agencies obtain information under Section 702, and to provide guidance to legislators and their staffers by examining the core issues they will confront as they consider reauthorizing this legislation.

Los Alamos National Laboratory, National Security Science, July 2015

Los Alamos National Laboratory

Discussion Paper - Managing the Atom Project, Belfer Center

When Did (and Didn’t) States Proliferate?

| June 2017

In this Project on Managing the Atom Discussion Paper, Philipp C. Bleek chronicles nuclear weapons proliferation choices throughout the nuclear age. Since the late 1930s and early 1940s, some thirty-one countries are known to have at least explored the possibility of establishing a nuclear weapons program. Seventeen of those countries launched weapons programs, and ten acquired deliverable nuclear weapons.

Paper - Cyber Security Project, Belfer Center

Too Connected to Fail

| May 2017

This paper argues that threats to core internet infrastructure and services can, in fact, rise to the level of a serious national security threat to the United States and will explore scenarios where this may be the case. The paper will discuss several kinds of core internet services and infrastructure and explore the challenges with understanding interdependencies between the internet and critical infrastructure; review recent attack techniques that can cause systemic risk to the internet; discuss various nation state capabilities, intentions and recent activities in this area; and describe how these attacks could be used against the United States to deter the U.S., control escalation, or potentially degrade U.S. warfighting capabilities in a conflict. Finally, the paper concludes with recommendations for what the United States and other governments can do to build defenses and resiliency against systemic threats to the internet.