Reports & Papers

3 Items

In this April 22, 2020 photo, Gerard Bakulikira, right, and captain Tim Daghelet, left, both wear a Romware COVID Radius digital bracelet, which flashes red when people are too close to each other and creates a log of contacts. 

AP Photo/Virginia Mayo

Paper

Considerations for Digital Contact Tracing Tools for COVID-19 Mitigation: Recommendations for Stakeholders and Policymakers

Many are looking to digital contact tracing to assist reopening efforts, especially in light of reports that the U.S. could expect as many as 100,000 more deaths due to the virus by this Fall. This report focuses on how the U.S. might consider various proposed solutions.

We believe there are real benefits, challenges, and even potential harms in using digital solutions in the fight against COVID-19, but we must also acknowledge that the promise of any technology and associated systems to assist manual contact tracing efforts is largely hypothetical in the United States. There is not one catch-all answer; the truth is that technology is not a panacea, but it may be able to assist official efforts at an unprecedented time. However, no technological solution can succeed without two specific factors: public trust and buy-in, and rapid, widespread testing for everyone living in the U.S. To achieve the first, a number of factors must be addressed by officials in the states looking to implement digital solutions, and by technology developers.
 

The nuclear archive warehouse outside Tehran (Satellite image via Google).

Satellite image via Google

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

The Iran Nuclear Archive: Impressions and Implications

In mid-January, a team of scholars from the Belfer Center’s Intelligence and Managing the Atom Projects traveled to Tel Aviv, Israel to examine samples of, and receive briefings on, an archive of documents related to Iran’s nuclear weapons program. The large cache includes some 55,000 pages of documents and a further 55,000 files on CDs that included photos and videos. A clandestine Israeli intelligence operation spirited the materials out of Iran in early 2018.

The documents that the Belfer group were shown confirm that senior Iranian officials had decided in the late 1990s to actually manufacture nuclear weapons and carry out an underground nuclear test; that Iran’s program to do so made more technical progress than had previously been understood; and that Iran had help from quite a number of foreign scientists, and access to several foreign nuclear weapon designs. The archive also leaves open a wide range of questions, including what plan, if any, Iran has had with respect to nuclear weapons in the nearly 16 years since Iran’s government ordered a halt to most of the program in late 2003. 

This brief report summarizes the group’s conclusions about what the archive reveals about Iran’s program and questions that remain open.

Planning for Cyber in the North Atlantic Treaty Organization

US Department of State

Report Chapter - Kosciuszko Institute

Planning for Cyber in the North Atlantic Treaty Organization

| July 08, 2016

While the issue of cyber operations beyond NATO’s own networks is a politically difficult one given the complex mosaic of national, transnational (EU), and international law; the role of national intelligence efforts in certain types of operations; and ever-present disputes over burden-sharing, the Alliance already has invaluable experience in developing policies and procedures for contentious and sensitive tools in the form of the Nuclear Planning Group (NPG). This article begins with a brief overview of actions NATO has already taken to address cyberthreats. It will then explore why these, while important, are insufficient for the present and any imaginable future geopolitical threat environment. Next, it will address the history of the NPG, highlighting some parallels with the present situation regarding cyber and drawing out the challenges faced by, and activities and mechanisms of, the NPG. Finally, it will make the case that a group modeled on the NPG can not only significantly enhance the Alliance’s posture in cyberspace, but can serve as an invaluable space for fostering entente and reconciling differences on key aspects of cyber policy. It concludes that the Alliance needs to consider offensive cyber capabilities and planning, and it needs a Cyber Planning Group to do it.