Reports & Papers

47 Items

A representative image of a digital "map"

Adobe Stock

Report

Reconceptualizing Cyber Power

Our intention is to provide the best possible understanding of cyber power capabilities to inform public debate. The Belfer approach proposes eight objectives that countries pursue using cyber means; provides a list of capabilities required to achieve those objectives that demonstrates the breadth of sources of cyber power; and compares countries based on their capability to achieve those objectives. Our work builds on existing cyber indices such as the Economist Intelligence Unit and Booz Allen Hamilton’s 2011 Cyber Power Ranking, by, for example, including a policy dimension and recognizing that cyber capabilities enhance military strength.

A drone Interceptor MP200, top, prepares to catch a drone DJI Phantom 2 with a net during a demonstration flight in La Queue-en-Brie, France, in 2015 (AP Photo/Francois Mori).

AP Photo/Francois Mori

Paper - Nuclear Threat Initiative

The Risks and Rewards of Emerging Technology in Nuclear Security

| February 2020

Nuclear security is never finished. Nuclear security measures for protecting all nuclear weapons, weapons-usable nuclear materials, and facilities whose sabotage could cause disastrous consequences should protect against the full range of plausible threats. It is an ongoing endeavor that requires constant assessment of physical protection operations and reevaluation of potential threats. One of the most challenging areas of nuclear security is how to account for the impact–positive and negative—of non-nuclear emerging technologies. The amended Convention on the Physical Protection of Nuclear Material (amended CPPNM) states it should be reviewed in light of the prevailing situation, and a key part of the prevailing situation is technological evolution. Therefore, the upcoming review conference in 2021, as well as any future review conferences, should examine the security threats and benefits posed by emerging technologies.

PRC flag with digital overlay

Adobe Stock

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Governing Cyberspace: State Control vs. The Multistakeholder Model

| August 2019

This paper is part of a Track-II dialogue between the Belfer Center’s China Cyber Policy Initiative and the China Institute for International Strategic Studies (CIISS) to manage the risk of cyber conflict between the two countries through dialogue and concrete policy recommendations. The paper includes two parts: a cyber governance theory written by Chinese People’s Liberation Army Major General (ret.) Hao Yeli, a senior adviser to CIISS, and a response prepared by Belfer Center Co-Director Eric Rosenbach and Research Assistant Shu Min Chong.

Fiber optic cables are seen at a data center in Manhattan, March 2013

AP / Mark Lennihan

Paper

A Case for Fortifying the BUILD Act: The U.S., China, and Internet Infrastructure in the Global South

| July 2019

A well-resourced USDFC as a result of the BUILD Act will support U.S. companies and provide competitive alternatives for the Global South. Prioritizing U.S. support in the telecommunications sector will also help balance China’s growing strategic influence in cyberspace. However, reports suggest that the USDFC’s financial resources will be much less than originally planned. These resources are needed to level the playing field. This paper outlines why.

Discussion Paper - Managing the Atom Project, Belfer Center

The Three Overlapping Streams of India's Nuclear Power Programs

| April 15, 2016

As India’s civilian nuclear energy program expands with the assistance of international nuclear suppliers, it creates new potential pathways to the acquisition of fissile material that could be diverted for military purposes. A key question is whether and how India’s civilian and military nuclear facilities are separated. In this discussion paper from the Belfer Center’s Project on Managing the Atom, Kalman A. Robertson and John Carlson argue that India has not established a complete and verifiable separation of its civilian and military nuclear programs. The authors recommend steps for India to take under its safeguards agreement with the International Atomic Energy Agency to provide assurances to all states that components of its civilian program are not contributing to the growth of its nuclear arsenal. These steps include renouncing options that would facilitate the use of safeguarded items to produce unsafeguarded nuclear material, and placing the proliferation-sensitive components of its nuclear power industry under continuous safeguards.

Report - Managing the Atom Project, Belfer Center

China's Uranium Enrichment Capacity: Rapid Expansion to Meet Commercial Needs

| August 20, 2015

Based on satellite imagery, Chinese publications, and discussions with Chinese experts, This report suggests that China has much more civilian enrichment capacity than previously thought, and even more is on the way. If these new estimates are correct, China has enough enrichment capacity to meet its nuclear power fuel requirements for the coming decade and beyond. Further, China will have excess enrichment capacity and will likely become a net exporter of commercial enrichment services.

Report - Managing the Atom Project, Belfer Center

IAEA Verification of Fissile Material in Support of Nuclear Disarmament

| Apr. 27, 2015

This report proposes a framework for IAEA verification of steps toward nuclear disarmament, premised on IAEA verification of fissile material, in any form, whether classified or not, submitted by any state possessing nuclear weapons. It identifies technical, legal, and financial solutions to the challenges posed by such verification, and offers a way forward to the implementation of the proposed framework. The tool that Rockwood and Shea offer is ready for any state with nuclear weapons to take up, finish the final details, and implement.

Report - Managing the Atom Project, Belfer Center

Fresh Ideas for the Future: Symposium on the NPT

| April 26, 2015

The abstracts in this booklet summarise the research presented at an academic symposium convened on the sidelines of the 2015 NPT Review Conference. As we write this, journalists and seasoned experts in the nuclear policy field have been speculating about the particularly difficult challenges facing the Review Conference this year. To address those challenges, we would urge all concerned to consider the ideas and analyses presented at this symposium. Experts would be hard-pressed to find a better collection of fresh ideas and approaches for assessing and strengthening the NPT.

Paper

Nuclear Disarmament: The Legacy of the Trilateral Initiative

| March 23, 2015

In 1996, the International Atomic Energy Agency (IAEA), the United States and the Russian Federation entered into a cooperative effort – the Trilateral Initiative – aimed at investigating the feasibility and requirements for a verification system under which the IAEA could accept and monitor nuclear warheads or nuclear warhead components pursuant to the NPT Article VI commitments of both States. Although the Initiative ended in 2002, the Model Verification Agreement produced could still serve as the basis for bilateral or multilateral agreements between the IAEA and nuclear-weapon States.

In this paper, Thomas E. Shea and Laura Rockwood examine the potential role for international verification of fissile material in relation to nuclear disarmament, what was accomplished under the Trilateral Initiative and, more importantly, what should be done now to preserve its legacy and take concrete steps towards such verification.