Reports & Papers

7 Items

A representative image of a digital "map"

Adobe Stock

Report

Reconceptualizing Cyber Power

Our intention is to provide the best possible understanding of cyber power capabilities to inform public debate. The Belfer approach proposes eight objectives that countries pursue using cyber means; provides a list of capabilities required to achieve those objectives that demonstrates the breadth of sources of cyber power; and compares countries based on their capability to achieve those objectives. Our work builds on existing cyber indices such as the Economist Intelligence Unit and Booz Allen Hamilton’s 2011 Cyber Power Ranking, by, for example, including a policy dimension and recognizing that cyber capabilities enhance military strength.

Planning for Cyber in the North Atlantic Treaty Organization

US Department of State

Report Chapter - Kosciuszko Institute

Planning for Cyber in the North Atlantic Treaty Organization

| July 08, 2016

While the issue of cyber operations beyond NATO’s own networks is a politically difficult one given the complex mosaic of national, transnational (EU), and international law; the role of national intelligence efforts in certain types of operations; and ever-present disputes over burden-sharing, the Alliance already has invaluable experience in developing policies and procedures for contentious and sensitive tools in the form of the Nuclear Planning Group (NPG). This article begins with a brief overview of actions NATO has already taken to address cyberthreats. It will then explore why these, while important, are insufficient for the present and any imaginable future geopolitical threat environment. Next, it will address the history of the NPG, highlighting some parallels with the present situation regarding cyber and drawing out the challenges faced by, and activities and mechanisms of, the NPG. Finally, it will make the case that a group modeled on the NPG can not only significantly enhance the Alliance’s posture in cyberspace, but can serve as an invaluable space for fostering entente and reconciling differences on key aspects of cyber policy. It concludes that the Alliance needs to consider offensive cyber capabilities and planning, and it needs a Cyber Planning Group to do it.

Report - Center for Strategic and International Studies

The U.S.-Japan Alliance: Anchoring Stability in Asia

| August 2012

The following report presents a consensus view of the members of a bipartisan study group on the U.S.-Japan alliance. The report specifically addresses energy, economics and global trade, relations with neighbors, and security-related issues. Within these areas, the study group offers policy recommendations for Japan and the United States, which span near- and long-term time frames. These recommendations are intended to bolster the alliance as a force for peace, stability, and prosperity in the Asia-Pacific region and beyond.

Paper - Science, Technology, and Public Policy Program, Belfer Center

Internet Fragmentation: Highlighting the Major Technical, Governance and Diplomatic Challenges for U.S. Policy Makers

| May 2012

The Internet is at a crossroads. Today it is generally open, interoperable and unified. Tomorrow, however, we may see an entirely different Internet, one not characterized by openness and global reach, but by restrictions, blockages and cleavages. In order to help ensure that the Internet continues to serve as a source of global integration, democratization, and economic growth, American policymakers must be aware of the most significant technical, political and legal challenges to a unified Internet.

Discussion Paper - Science, Technology, and Public Policy Program, Belfer Center

Cyber Norm Emergence at the United Nations—An Analysis of the UN's Activities Regarding Cyber-security

    Author:
  • Tim Maurer
| September 2011

Cyber-warfare is no longer science fiction and the debate among policy-makers on what norms will guide behavior in cyber-space is in full swing. The United Nations (UN) is one of the fora where this debate is taking place exhibiting an astonishing rate of norm emergence in cyber-space. Most recently, Russia together with China proposed an “International code of conduct for information security” in September 2011 after the U.S. reversed its long-standing policy position in 2010.

Discussion Paper - Science, Technology, and Public Policy Program, Belfer Center

WikiLeaks 2010: A Glimpse of the Future?

    Author:
  • Tim Maurer
| August 2011

The recent publications on WikiLeaks reveal a story about money, fame, sex, underground hackers, and betrayal. But it also involves fundamental questions regarding cyber-security and foreign policy. This paper argues WikiLeaks is only the symptom of a new, larger problem which is the result of technological advances that allow a large quantity of data to be 'stolen' at low or no cost by one or more individuals and to be potentially made public and to go 'viral', spreading exponentially online.

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Cyber Power

| May 2010

Power depends upon context, and the rapid growth of cyber space is an important new context in world politics. The low price of entry, anonymity, and asymmetries in vulnerability means that smaller actors have more capacity to exercise hard and soft power in cyberspace than in many more traditional domains of world politics. The largest powers are unlikely to be able to dominate this domain as much as they have others like sea or air. But cyberspace also illustrates the point that diffusion of power does not mean equality of power or the replacement of governments as the most powerful actors in world politics.