Reports & Papers

92 Items

A lighthouse, battered by waves, sits at the center of this dark and stormy seascape.

AP Photo/Matt Dunham

Report - Belfer Center for Science and International Affairs

Democracy and the Liberal World Order Amid the Rise of Authoritarianism

| Aug. 14, 2023

The entanglement and feedback loops among the domestic and the geopolitical cycles of distrust have resulted in a cohesive threat to democracy: a downward political spiral that is pulling societies towards enmity. This spiral feeds on and generates destructive human emotions at massive scale, such as outrage and hatred, that lead to violence, war, and autocracy, so it can be better understood as a dangerous global maelstrom of distrust, which could sink democracy worldwide. As showcased by historical evidence, domestic and international forces do not act in isolation from each other. Democratic backsliding, the rise of authoritarianism and totalitarianism, and the politics of aggression generated feedback loops in the 1930s, that resulted in WWII. Similar forces are again working in the 2020s. If massive distrust can wreck democracy worldwide, it follows that the regeneration of trust is the path to democratic revitalization.

A computer code is seen on displays in the office of Global Cyber Security Company Group-IB in Moscow, Russia, Wednesday, Oct. 25, 2017. A new strain of malicious software has paralyzed computers at a Ukrainian airport, the Ukrainian capital's subway and at some independent Russian media. Moscow-based Global Cyber Security Company Group-IB said in a statement Wednesday the ransomware called BadRabbit also tried to penetrate the computers of major Russian banks but failed.

AP Photo/Pavel Golovkin

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Addressing Russian and Chinese Cyber Threats: A Transatlantic Perspective on Threats to Ukraine and Beyond

| May 2023

In an interconnected world, cyberattacks are becoming more frequent and sophisticated. Building resilience against this asymmetric threat is critical for countries to protect their economies, critical infrastructure, and democratic institutions. However, cyberattacks do not respect borders, and no country can address this threat alone. The strength and longevity of the transatlantic partnership between the EU and the U.S. presents a unique opportunity to address this strategic threat through international cooperation. Through an analysis of cyberwarfare in the ongoing war in Ukraine, this paper proposes policy recommendations to enhance transatlantic coordination and cooperation against current and future adversaries in a new era of strategic competition. Ultimately, a stronger transatlantic partnership is critical for protecting international democratic norms, building resilience against cyber threats, and strengthening global security and stability.

A container ship of Chinese Cosco shipping lies in the harbor in Hamburg, Germany, Wednesday, Oct. 26, 2022

AP Photo/Michael Probst

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

The Belt and Road Initiative in Europe: Opportunities for a Transatlantic Response Amid the Russian Invasion of Ukraine

| January 2023

China’s Belt and Road Initiative (BRI) has for years held a prominent position in the global infrastructure investment space. In the absence of similarly far-reaching projects coordinated by other countries including the transatlantic partners, important questions about the BRI’s implications for Europe and America arise. Given U.S.-China competition pulling the EU in two directions and opposing approaches among member states vis-à-vis China amid a globally growing infrastructure investment gap, the need for a liberally motivated large-scale infrastructure investment approach is clear. This alternative model of advancing economic development goals stands in opposition to the BRI’s approach of creating economic dependence on China through massive recipient country debt thereby increasing Chinese geopolitical power. 

German Interior Minister Thomas de Maiziere talks to the media during his visit to the central department of fighting internet criminality (ZIT) in Giessen, Germany, Wednesday, Feb. 8, 2017. In background a map showing the amount of cyber attacks in a30 days.

AP Photo/Michael Probst

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Advancing Cyber Norms Unilaterally: How the U.S. Can Meet its Paris Call Commitments

| January 2023

Establishing norms for state behavior in cyberspace is critical to building a more stable, secure, and safe cyberspace. Norms are defined as “a collective expectation for the proper behavior of actors with a given identity,” and declare what behavior is considered appropriate and when lines have been crossed. Cyberspace is in dire need of such collective expectations. However, despite efforts by the international community and individual states to set boundaries and craft agreements, clear and established cyber norms for state behavior remain elusive. As early as 2005, the UN Group of Governmental Experts (GGE) and UN Open-Ended Working Group (OEWG) both aimed to create shared “rules of the road,” but fundamental disagreements between states and a lack of accountability and enforcement mechanisms have prevented these initiatives from substantively implementing cyber norms. As a result, the international community and individual states are left with no accountability mechanisms or safeguards to protect civilians and critical infrastructure from bad actors in cyberspace.

A person on the left bends to take pictures of a drone showcased on a platform on the right.

AP Photo/Joe Buglewicz

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Buying What Works: An Acquisitions Strategy for the Reality of Dual-Use Technologies

| October 2022

In this student research paper, Harvard Kennedy School student Coen Williams finds that  The Department of Defense should implement an “effects-driven” acquisitions system rather than “capabilities-based” to effectively acquire and utilize commercially developed capabilities. An effects-driven acquisitions system will increase the diversity of solutions, and by appropriating money to effects-driven portfolios, Congress can still maintain control of the purse while the Department of Defense can more effectively allocate its appropriated funds.

An abstract image of locks and electronic wires

Adobe Stock

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

National Cyber Power Index 2022

| September 2022

In his Note to Readers of the 2022 National Cyber Power Index, Eric Rosenbach, Belfer Center Co-Director and former Chief of Staff and Assistant Secretary for the U.S. Department of Defense, writes: “With the challenges in the cyber domain only increasing, it is critical for analytical tools to also be available, presenting the full range of cyber power, and informing critical public debates today. The framework that the NCPI provides is one that allows policymakers to consider a fuller range of challenges and threats from other state actors. The incorporation of both qualitative and quantitative models, with more than 1000 existing sources of data and with 29 indicators to measure a state’s capability, is more comprehensive than any other current measure of cyber power.”

A worker is seen in a tugboat at the Port of Los Angeles on Nov. 10, 2021.

AP Photo/Marcio Jose Sanchez, File

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Never Breaking the Chain: The Economics and Politics of Creating an Effective National Supply Chain Strategy

| August 2022

The creation of a national supply chain strategy is crucial to responding to the challenge and merits specific attention from both policy and business leaders. This paper proposes specific government and business policy steps that would progress the US’s position on a more unified, strategic supply chain approach.

The U.S. Homeland Security Department headquarters in northwest Washington is pictured on Feb. 25, 2015

AP Photo/Manuel Balce Ceneta, File

Paper

Continuous Compliance: Enhancing Cybersecurity for Critical Infrastructure by Strengthening Regulation, Oversight, and Monitoring

| August 2022

In this student research paper, Harvard Kennedy School student Julian Baker finds that transition from a point-in-time framework to a method of continuous compliance would raise the level of cybersecurity for critical infrastructure, making these essential services more reliable for the people relying on them. 

Ship navigates icecaps in the Arctic

Spanish Navy

Report - Belfer Center for Science and International Affairs

NATO and Climate Change: A Climatized Perspective on Security

| Aug. 18, 2022

NATO aspires to take the lead in understanding and adapting to the impact of climate change on security. The new Strategic Concept declares that climate change is a defining challenge of our time, with a profound impact on Allied security. Now, the Alliance and the Allies must “walk the talk” by preparing to face the emerging climate change-driven challenges and adapting their armed forces to the new climate conditions created by global warming. This paper will begin by answering the most pressing questions about NATO and climate change: Is climate change a security threat? Does climate security fit into NATO’s mission? And is NATO the best forum to address climate change? It will then review NATO’s current actions on the climate, and finally make some proposals for the Alliance to implement a climatized perspective on security to climate-proof its assets and capacities and effectively accomplish its mission and tasks.