Reports & Papers

174 Items

Report - CNA's Center for Naval Analyses

Russia and the Global Nuclear Order

| March 2024

Russia's 2022 invasion of Ukraine illuminated the long profound shadow of nuclear weapons over international security. Russia's nuclear threats have rightfully garnered significant attention because of the unfathomable lethality of nuclear weapons. However, the use of such weapons in Ukraine is only one way—albeit the gravest— that Russia could challenge the global nuclear order. Russia's influence extends deep into the very fabric of this order—a system to which it is inextricably bound by Moscow's position in cornerstone institutions such as the Nuclear Non-Proliferation Treaty (NPT) and the International Atomic Energy Agency (IAEA). From withdrawing from key treaties to stymieing resolutions critical of misconduct, Moscow has demonstrated its ability to challenge the legitimacy, relevance, and interpretations of numerous standards and principles espoused by the West.

Senior officials from around the world, including IAEA DG Rafael Mariano Grossi, together at an International Gender Champions meeting in Vienna in March 2020.

Dean Calma/IAEA

Report - Institute for Replication

Gender Analysis and the Treaty on the Prohibition of Nuclear Weapons: A Response to Daarstad, Park, and Balogh

| Dec. 01, 2023

Herzog, Baron, and Gibbons (HBG) thank Haley Daarstad, RyuGyung Park, and Timea Balogh for replicating their 2022 short article in The Journal of Politics. In that article, HBG tested the malleability of U.S. public support for nuclear disarmament, specifically in the context of the 2017 Treaty on the Prohibition of Nuclear Weapons (TPNW). Their survey experiment reveals that––despite majority public support for eliminating nuclear weapons––Americans’ backing of the TPNW can be significantly attenuated by exposure to elite and group cues opposing the treaty. The resultant article has received considerable attention from policymakers and anti-nuclear activists alike. Daarstad, Park, and Balogh (DPB) offer three main substantive points of comment on HGB's article. First, DPB indicate that the results successfully replicate and note that they “do not find any coding errors that undermine the authors’ analysis or conclusions.” Second, DPB show that the findings also replicate when partisan leaners are coded as political Independents. Finally, and most interestingly, DPB conduct gender-based subgroup analysis and show that there are heterogenous treatment effects among male and female respondents in our sample. HBG address each of these points in turn.

U.S. and Iranian negotiators sit around a cured table as media with cameras and microphones crowd the foreground.

Joe Klamar/Pool Photo via AP

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Nuclear About-Face: Examining the Role of Collective Face Concerns in Iran's Nuclear Decision-Making

| July 2023

By looking beyond solely Iran’s security motivations, this paper by Sahar Nowrouzzadeh seeks to inform more holistic negotiation strategies that can potentially influence Iran’s nuclear decision-making in a manner more favorable to U.S. interests.

German Interior Minister Thomas de Maiziere talks to the media during his visit to the central department of fighting internet criminality (ZIT) in Giessen, Germany, Wednesday, Feb. 8, 2017. In background a map showing the amount of cyber attacks in a30 days.

AP Photo/Michael Probst

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Advancing Cyber Norms Unilaterally: How the U.S. Can Meet its Paris Call Commitments

| January 2023

Establishing norms for state behavior in cyberspace is critical to building a more stable, secure, and safe cyberspace. Norms are defined as “a collective expectation for the proper behavior of actors with a given identity,” and declare what behavior is considered appropriate and when lines have been crossed. Cyberspace is in dire need of such collective expectations. However, despite efforts by the international community and individual states to set boundaries and craft agreements, clear and established cyber norms for state behavior remain elusive. As early as 2005, the UN Group of Governmental Experts (GGE) and UN Open-Ended Working Group (OEWG) both aimed to create shared “rules of the road,” but fundamental disagreements between states and a lack of accountability and enforcement mechanisms have prevented these initiatives from substantively implementing cyber norms. As a result, the international community and individual states are left with no accountability mechanisms or safeguards to protect civilians and critical infrastructure from bad actors in cyberspace.

A person on the left bends to take pictures of a drone showcased on a platform on the right.

AP Photo/Joe Buglewicz

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Buying What Works: An Acquisitions Strategy for the Reality of Dual-Use Technologies

| October 2022

In this student research paper, Harvard Kennedy School student Coen Williams finds that  The Department of Defense should implement an “effects-driven” acquisitions system rather than “capabilities-based” to effectively acquire and utilize commercially developed capabilities. An effects-driven acquisitions system will increase the diversity of solutions, and by appropriating money to effects-driven portfolios, Congress can still maintain control of the purse while the Department of Defense can more effectively allocate its appropriated funds.

An abstract image of locks and electronic wires

Adobe Stock

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

National Cyber Power Index 2022

| September 2022

In his Note to Readers of the 2022 National Cyber Power Index, Eric Rosenbach, Belfer Center Co-Director and former Chief of Staff and Assistant Secretary for the U.S. Department of Defense, writes: “With the challenges in the cyber domain only increasing, it is critical for analytical tools to also be available, presenting the full range of cyber power, and informing critical public debates today. The framework that the NCPI provides is one that allows policymakers to consider a fuller range of challenges and threats from other state actors. The incorporation of both qualitative and quantitative models, with more than 1000 existing sources of data and with 29 indicators to measure a state’s capability, is more comprehensive than any other current measure of cyber power.”

A worker is seen in a tugboat at the Port of Los Angeles on Nov. 10, 2021.

AP Photo/Marcio Jose Sanchez, File

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Never Breaking the Chain: The Economics and Politics of Creating an Effective National Supply Chain Strategy

| August 2022

The creation of a national supply chain strategy is crucial to responding to the challenge and merits specific attention from both policy and business leaders. This paper proposes specific government and business policy steps that would progress the US’s position on a more unified, strategic supply chain approach.

President Truman signs National Security Act Amendments

NARA

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

Imagining a New U.S. National Security Act for the 21st Century: Winning Essays

| July 19, 2022

The Intelligence and Applied History Projects hosted a National Security Act Essay Contest in 2022 entitled: “Imagining a New National Security Act for the 21st Century.” The contest sought to generate new ideas for improving the intelligence and national security community in the US based on the dynamic security environment we face in the 21st century. The essay prompt offered a variety of hypothetical scenarios where intelligence failure contributed to catastrophic failure and posed the question: what you would change now to improve the intelligence and national security posture of the US?

The winning essays, from a field of approximately 75 applicants, were authored by (1) Russell Travers, (2) Sophie Faaborg-Andersen, and (3) Marie Couture and Laurie LaPorte. The authors' winning essays appear in this report.

In this file photo taken Thursday, May 17, 2018, a visitor to the 21st China Beijing International High-tech Expo looks at a computer chip through the microscope displayed by the state-controlled Tsinghua Unigroup project which has emerged as a national champion for Beijing's semiconductor ambitions in Beijing, China.

AP Photo/Ng Han Guan, File

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

The U.S.-China Tech Rivalry: Don't Decouple - Diversify

| Mar. 03, 2022

The U.S. is grappling with increasingly challenging transnational technology, policy, and security issues, which are complicated further by the economic and supply chain relationships with China. As the Biden administration and Congress look at developing policy solutions that will both reduce dependence on China and strengthen the United States’ resilience, it is important that these policies form a larger, holistic strategy that articulates the national security narrative clearly.