Reports & Papers

23 Items

A convoy of Israeli army tanks maneuvers near Israel's border after leaving Gaza, southern Israel, on Friday, Nov. 24, 2023.

AP Photo/Tsafrir Abayov

Discussion Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Lessons from Israel’s Forever Wars

| Jan. 16, 2024

Since its founding in 1948, Israel has been engaged in a series of forever wars. After each war, the IDF, Mossad, Shin Bet, and others in the intelligence and security community analyze what happened and summarize their findings in after-action, or “lessons learned,” reports. Former leaders from these institutions, many of whom retain close relations with their successors, also produce reports on what happened and identify takeaways for the future. Thus, in trying to make sense of what’s happening now, lessons these experts have distilled from their experiences provide a sound starting point.

President Truman signs National Security Act Amendments

NARA

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

Imagining a New U.S. National Security Act for the 21st Century: Winning Essays

| July 19, 2022

The Intelligence and Applied History Projects hosted a National Security Act Essay Contest in 2022 entitled: “Imagining a New National Security Act for the 21st Century.” The contest sought to generate new ideas for improving the intelligence and national security community in the US based on the dynamic security environment we face in the 21st century. The essay prompt offered a variety of hypothetical scenarios where intelligence failure contributed to catastrophic failure and posed the question: what you would change now to improve the intelligence and national security posture of the US?

The winning essays, from a field of approximately 75 applicants, were authored by (1) Russell Travers, (2) Sophie Faaborg-Andersen, and (3) Marie Couture and Laurie LaPorte. The authors' winning essays appear in this report.

A satellite photo showing heavy snows along the Korean coast, mid-February 2011.

NASA images courtesy MODIS Rapid Response Team at NASA GSFC

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

A Policy of Public Diplomacy with North Korea

| August 2021

The Biden administration has emphasized the importance of alliances and core values of democracy in its foreign policy approach. Given this emphasis, public diplomacy—activities intended to understand, inform, and influence foreign audiences—should be considered an essential tool in achieving our long-term policy objectives in North Korea. Public diplomacy has the potential to spur domestic change in North Korea—change that could result in improved human rights conditions, leading to behavioral change in the Kim regime, and eventually denuclearization.

Report - Stavros Niarchos Foundation Agora Institute, Johns Hopkins University

Rechanneling Beliefs: How Information Flows Hinder or Help Democracy

| May 24, 2021

Despite a technically successful election with a record-breaking voter turnout,  U.S. institutions and procedures have not created the kinds of shared public consensus over the results of the 2020 election that they were supposed to. The authors write that the United States needs a dynamic stability, one that incorporates new forces into American democracy rather than trying to deny or quash them. This report is their attempt to explain what this might mean in practice

Donald Trump and Anthony Fauci

AP/Alex Brandon

Paper - Centre for International Governance Innovation

US Intelligence, the Coronavirus and the Age of Globalized Challenges

| Aug. 24, 2020

This essay makes three arguments. First, the US government will need to establish a coronavirus commission, similar to the 9/11 commission, to determine why, since April 2020, the United States has suffered more coronavirus fatalities than any other country in the world. Second, the COVID-19 pandemic represents a watershed for what will be a major national security theme this century: biological threats, both from naturally occurring pathogens and from synthesized biology. Third, intelligence about globalized challenges, such as pandemics, needs to be dramatically reconceptualized, stripping away outmoded levels of secrecy.

In this April 22, 2020 photo, Gerard Bakulikira, right, and captain Tim Daghelet, left, both wear a Romware COVID Radius digital bracelet, which flashes red when people are too close to each other and creates a log of contacts. 

AP Photo/Virginia Mayo

Paper

Considerations for Digital Contact Tracing Tools for COVID-19 Mitigation: Recommendations for Stakeholders and Policymakers

Many are looking to digital contact tracing to assist reopening efforts, especially in light of reports that the U.S. could expect as many as 100,000 more deaths due to the virus by this Fall. This report focuses on how the U.S. might consider various proposed solutions.

We believe there are real benefits, challenges, and even potential harms in using digital solutions in the fight against COVID-19, but we must also acknowledge that the promise of any technology and associated systems to assist manual contact tracing efforts is largely hypothetical in the United States. There is not one catch-all answer; the truth is that technology is not a panacea, but it may be able to assist official efforts at an unprecedented time. However, no technological solution can succeed without two specific factors: public trust and buy-in, and rapid, widespread testing for everyone living in the U.S. To achieve the first, a number of factors must be addressed by officials in the states looking to implement digital solutions, and by technology developers.
 

Advocacy groups display a thousand signs that read #GetUsPPE, along images of health care workers, in a call for personal protective equipment for frontline health workers during the coronavirus outbreak, on the West Lawn of the U.S. Capitol, Friday, April 17, 2020, in Washington.

AP Photo/Andrew Harnik

Paper

Coronavirus as a Strategic Challenge: Has Washington Misdiagnosed the Problem?

| April 2020

With reservations about venturing into territory outside our normal wheelhouse, and in full certainty that some of what we write here will in retrospect turn out to have been wrong, a team of researchers at the Belfer Center and I have been collecting all the data we have been able to find about coronavirus, analyzing it to the best of our ability, and debating competing answers to the fundamental questions about the challenge this novel virus poses to our nation.

What follows is our current first-approximation of a work in progress. We are posting at this point in the hope of stimulating a wider debate that will include a much larger number of analysts beyond public health professionals and epidemiologists—including in particular intelligence officers, financial wizards, historians, and others.

A representative image of a digital "map"

Adobe Stock

Report

Reconceptualizing Cyber Power

Our intention is to provide the best possible understanding of cyber power capabilities to inform public debate. The Belfer approach proposes eight objectives that countries pursue using cyber means; provides a list of capabilities required to achieve those objectives that demonstrates the breadth of sources of cyber power; and compares countries based on their capability to achieve those objectives. Our work builds on existing cyber indices such as the Economist Intelligence Unit and Booz Allen Hamilton’s 2011 Cyber Power Ranking, by, for example, including a policy dimension and recognizing that cyber capabilities enhance military strength.

Planning for Cyber in the North Atlantic Treaty Organization

US Department of State

Report Chapter - Kosciuszko Institute

Planning for Cyber in the North Atlantic Treaty Organization

| July 08, 2016

While the issue of cyber operations beyond NATO’s own networks is a politically difficult one given the complex mosaic of national, transnational (EU), and international law; the role of national intelligence efforts in certain types of operations; and ever-present disputes over burden-sharing, the Alliance already has invaluable experience in developing policies and procedures for contentious and sensitive tools in the form of the Nuclear Planning Group (NPG). This article begins with a brief overview of actions NATO has already taken to address cyberthreats. It will then explore why these, while important, are insufficient for the present and any imaginable future geopolitical threat environment. Next, it will address the history of the NPG, highlighting some parallels with the present situation regarding cyber and drawing out the challenges faced by, and activities and mechanisms of, the NPG. Finally, it will make the case that a group modeled on the NPG can not only significantly enhance the Alliance’s posture in cyberspace, but can serve as an invaluable space for fostering entente and reconciling differences on key aspects of cyber policy. It concludes that the Alliance needs to consider offensive cyber capabilities and planning, and it needs a Cyber Planning Group to do it.