Reports & Papers

48 Items

A computer code is seen on displays in the office of Global Cyber Security Company Group-IB in Moscow, Russia, Wednesday, Oct. 25, 2017. A new strain of malicious software has paralyzed computers at a Ukrainian airport, the Ukrainian capital's subway and at some independent Russian media. Moscow-based Global Cyber Security Company Group-IB said in a statement Wednesday the ransomware called BadRabbit also tried to penetrate the computers of major Russian banks but failed.

AP Photo/Pavel Golovkin

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Addressing Russian and Chinese Cyber Threats: A Transatlantic Perspective on Threats to Ukraine and Beyond

| May 2023

In an interconnected world, cyberattacks are becoming more frequent and sophisticated. Building resilience against this asymmetric threat is critical for countries to protect their economies, critical infrastructure, and democratic institutions. However, cyberattacks do not respect borders, and no country can address this threat alone. The strength and longevity of the transatlantic partnership between the EU and the U.S. presents a unique opportunity to address this strategic threat through international cooperation. Through an analysis of cyberwarfare in the ongoing war in Ukraine, this paper proposes policy recommendations to enhance transatlantic coordination and cooperation against current and future adversaries in a new era of strategic competition. Ultimately, a stronger transatlantic partnership is critical for protecting international democratic norms, building resilience against cyber threats, and strengthening global security and stability.

A person on the left bends to take pictures of a drone showcased on a platform on the right.

AP Photo/Joe Buglewicz

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Buying What Works: An Acquisitions Strategy for the Reality of Dual-Use Technologies

| October 2022

In this student research paper, Harvard Kennedy School student Coen Williams finds that  The Department of Defense should implement an “effects-driven” acquisitions system rather than “capabilities-based” to effectively acquire and utilize commercially developed capabilities. An effects-driven acquisitions system will increase the diversity of solutions, and by appropriating money to effects-driven portfolios, Congress can still maintain control of the purse while the Department of Defense can more effectively allocate its appropriated funds.

President Truman signs National Security Act Amendments

NARA

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

Imagining a New U.S. National Security Act for the 21st Century: Winning Essays

| July 19, 2022

The Intelligence and Applied History Projects hosted a National Security Act Essay Contest in 2022 entitled: “Imagining a New National Security Act for the 21st Century.” The contest sought to generate new ideas for improving the intelligence and national security community in the US based on the dynamic security environment we face in the 21st century. The essay prompt offered a variety of hypothetical scenarios where intelligence failure contributed to catastrophic failure and posed the question: what you would change now to improve the intelligence and national security posture of the US?

The winning essays, from a field of approximately 75 applicants, were authored by (1) Russell Travers, (2) Sophie Faaborg-Andersen, and (3) Marie Couture and Laurie LaPorte. The authors' winning essays appear in this report.

A miniature of “The War Room” as depicted in the 1964 classic film Dr. Strangelove

Courtesy Eric Chan  and the Los Angeles County Museum of Art, CC-BY 2.0

Paper

Toward a Collaborative Cyber Defense and Enhanced Threat Intelligence Structure

| August 2021

National security structures envisioned in the 20th century are inadequate for the cyber threats that America faces in the 21st century. These structures, created to address strategic, external threats on one end, and homeland security emergencies on the other, cannot protect us from ambient cyber conflict, because they were designed for different times and threats. Our nation—comprising the federal government, private sector companies, critical infrastructure operators, state and local governments, nonprofits and universities, and even private citizens—are constantly under attack by a myriad of cyber actors with ever-increasing capabilities. 

Report - Cyber Project

Zero Botnets: An Observe-Pursue-Counter Approach

June 2021

Adversarial Internet robots (botnets) represent a growing threat to the safe use and stability of the Internet. Botnets can play a role in launching adversary reconnaissance (scanning and phishing), influence operations (upvoting), and financing operations (ransomware, market manipulation, denial of service, spamming, and ad click fraud) while obfuscating tailored tactical operations. Reducing the presence of botnets on the Internet, with the aspirational target of zero, is a powerful vision for galvanizing policy action. Setting a global goal, encouraging international cooperation, creating incentives for improving networks, and supporting entities for botnet takedowns are among several policies that could advance this goal.

Report - Project on Europe and the Transatlantic Relationship and the German Council on Foreign Relations

Stronger Together: A Strategy to Revitalize Transatlantic Power

| December 2020

Harvard Kennedy School (HKS) and the German Council on Foreign Relations (DGAP) convened a strategy group of experts and former government officials from the United States and Europe over the past year to discuss the crisis in the transatlantic relationship and to propose a strategy to revive and strengthen it.

A watchtower in the United Nations Peacekeeping Force in Cyprus' buffer zone in Nicosia, July 2019.

Photo by Author

Paper

The Modern Roots of the Graveyard for Diplomats: The Tripartite Conference on Cyprus in 1955

| October 2020

For nearly 60 years, attempts at finding a lasting political solution to the conflict in Cyprus have created an environment known as the “graveyard of diplomats” for practitioners of international relations.1 Hastily constructed by the British Royal Air Force in December 1963 because of intercommunal fighting between Greek Cypriots and Turkish Cypriots, a demilitarized buffer zone, or “Green Line,” partitioned the two communities and has separated the island and its inhabitants ever since. Now, Cyprus hosts an amalgamation of different powers: two British sovereign bases which cover 98 square miles, the “Green Line” patrolled by the United Nations Peacekeeping Force in Cyprus (UNFICYP) spanning 134 square miles, a de facto state only recognized by Turkey called the “Turkish Republic of Northern Cyprus” (TRNC) occupying one-third of the island, and the Republic of Cyprus which has de jure sovereignty over the entire island but is located in the southern two-thirds.

Donald Trump and Anthony Fauci

AP/Alex Brandon

Paper - Centre for International Governance Innovation

US Intelligence, the Coronavirus and the Age of Globalized Challenges

| Aug. 24, 2020

This essay makes three arguments. First, the US government will need to establish a coronavirus commission, similar to the 9/11 commission, to determine why, since April 2020, the United States has suffered more coronavirus fatalities than any other country in the world. Second, the COVID-19 pandemic represents a watershed for what will be a major national security theme this century: biological threats, both from naturally occurring pathogens and from synthesized biology. Third, intelligence about globalized challenges, such as pandemics, needs to be dramatically reconceptualized, stripping away outmoded levels of secrecy.

In this April 22, 2020 photo, Gerard Bakulikira, right, and captain Tim Daghelet, left, both wear a Romware COVID Radius digital bracelet, which flashes red when people are too close to each other and creates a log of contacts. 

AP Photo/Virginia Mayo

Paper

Considerations for Digital Contact Tracing Tools for COVID-19 Mitigation: Recommendations for Stakeholders and Policymakers

Many are looking to digital contact tracing to assist reopening efforts, especially in light of reports that the U.S. could expect as many as 100,000 more deaths due to the virus by this Fall. This report focuses on how the U.S. might consider various proposed solutions.

We believe there are real benefits, challenges, and even potential harms in using digital solutions in the fight against COVID-19, but we must also acknowledge that the promise of any technology and associated systems to assist manual contact tracing efforts is largely hypothetical in the United States. There is not one catch-all answer; the truth is that technology is not a panacea, but it may be able to assist official efforts at an unprecedented time. However, no technological solution can succeed without two specific factors: public trust and buy-in, and rapid, widespread testing for everyone living in the U.S. To achieve the first, a number of factors must be addressed by officials in the states looking to implement digital solutions, and by technology developers.
 

A Royal Air Force Typhoon of 1(F) Squadron (top) and a French Air Force Mirage 2000N practice their formation flying skills during Exercise Capable Eagle, October 2013.

RAF Photo / Sgt Ralph Merry ABIPP RAF (OGL v3.0)

Paper

Breaking the Ice: How France and the UK Could Reshape a Credible European Defense and Renew the Transatlantic Partnership

| May 2020

History is replete with irony, but rarely more poignantly than in the summer of 2016 when, on 23 June, the UK voted to leave the European Union and the next day, 24 June, the EU published its Global Strategy document asserting its ambition of “strategic autonomy.” Whither Franco-British defense cooperation in such chaotic circumstances? This paper attempts to provide the outline of an answer to that question.