Reports & Papers

20 Items

A worker is seen in a tugboat at the Port of Los Angeles on Nov. 10, 2021.

AP Photo/Marcio Jose Sanchez, File

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Never Breaking the Chain: The Economics and Politics of Creating an Effective National Supply Chain Strategy

| August 2022

The creation of a national supply chain strategy is crucial to responding to the challenge and merits specific attention from both policy and business leaders. This paper proposes specific government and business policy steps that would progress the US’s position on a more unified, strategic supply chain approach.

A staff member works on a mobile phone production line during a media tour of a Huawei factory in Dongguan, Guangdong, Wednesday, March 6, 2019.

AP Photo/Kin Cheung

Paper

United States Entity List: Limits on American Exports

| February 2021

The Economic Diplomacy Initiative (EDI) at the Belfer Center for Science and International Affairs is presenting a first-of-its-kind analysis of the makeup of the Commerce Department’s Entity List, by country, by sector, and by year of addition. Starting with raw data made available by the Commerce Department, we manually grouped blacklisted sub-entities at the parent level to give a clearer view of the companies targeted by export controls. While  the Entity List does not include industry tags, we used Federal Register announcements and secondary research to manually assign industry sectors to each entity. The analysis provides a quantitative review of the evolving use of the entity list to shed light on shifting aims of US economic and national security policy.

A representative image of a digital "map"

Adobe Stock

Report

Reconceptualizing Cyber Power

Our intention is to provide the best possible understanding of cyber power capabilities to inform public debate. The Belfer approach proposes eight objectives that countries pursue using cyber means; provides a list of capabilities required to achieve those objectives that demonstrates the breadth of sources of cyber power; and compares countries based on their capability to achieve those objectives. Our work builds on existing cyber indices such as the Economist Intelligence Unit and Booz Allen Hamilton’s 2011 Cyber Power Ranking, by, for example, including a policy dimension and recognizing that cyber capabilities enhance military strength.

Participants attend the G20 Finance Ministers and Central Bank Governors Meeting Saturday, June 8, 2019, in Fukuoka, western Japan.

AP Photo/Eugene Hoshiko

Report

Emerging Issues in Economic Diplomacy

| April 2020

The nine issue papers contained in this report were proposed and written by graduate students at the Belfer Center for Science and International Affairs at Harvard Kennedy School. They present fact-based, nonpartisan analysis to help focus the next Administration on the key policy debates that must be resolved. And, they aim to create a platform for our students to engage with the most pressing policy issues of the day as they continue their careers in public service.

Report

Digital Currency Wars: A National Security Crisis Simulation

On November 19, 2019, the Belfer Center’s Economic Diplomacy Initiative hosted a national security crisis simulation in the JFK Jr. Forum to a packed audience from the Harvard and MIT communities. 

Drawing on the experience of Belfer Center members who have served in the highest levels of the U.S. government, the event explored the nexus of U.S. economic power and its national security interests.

A Tajik conscript looks out over remote stretches of northern Afghanistan from a border outpost near Khorog, Tajikistan.

Photo by David Trilling (c)

Report - Russia Matters

Jihadists from Ex-Soviet Central Asia: Where Are They? Why Did They Radicalize? What Next?

| Fall 2018

Thousands of radicals from formerly Soviet Central Asia have traveled to fight alongside IS in Syria and Iraq; hundreds more are in Afghanistan. Not counting the fighting in those three war-torn countries, nationals of Central Asia have been responsible for nearly 100 deaths in terrorist attacks outside their home region in the past five years. But many important aspects of the phenomenon need more in-depth study.

This research paper attempts to answer four basic sets of questions: (1) Is Central Asia becoming a new source of violent extremism that transcends borders, and possibly continents? (2) If so, why? What causes nationals of Central Asia to take up arms and participate in political violence? (3) As IS has been all but defeated in Iraq and Syria, what will Central Asian extremists who have thrown in their lot with the terrorist group do next? And (4) do jihadists from Central Asia aspire to acquire and use weapons of mass destruction? If so, how significant a threat do they pose and who would be its likeliest targets?

    A person types on a laptop keyboard in North Andover, Mass, June 19, 2017. (AP Photo/Elise Amendola)

    AP Photo/Elise Amendola

    Paper - Cyber Security Project, Belfer Center

    (Why) Is There a Public/Private Pay Gap?

    | August 2018

    The government is facing a severe shortage of skilled workers, especially in information technology and cyber security jobs. The conventional wisdom in branches of policy and public administration is that the shortage is driven by low salaries that are not competitive for attracting top talent. Using longitudinal data on high skilled workers between 1993 and 2013, this paper shows that, if anything, government employees earn more than their private sector counterparts. Although government workers tend to earn less in the raw data, these differences are driven by the correlation between unobserved ability and selection into private sector jobs. These results are robust to additional data from the Census Bureau between 2005 and 2016. Instead, this paper shows that a more plausible culprit behind the worker shortage in government is a lack of development opportunities and poor management.

    Planning for Cyber in the North Atlantic Treaty Organization

    US Department of State

    Report Chapter - Kosciuszko Institute

    Planning for Cyber in the North Atlantic Treaty Organization

    | July 08, 2016

    While the issue of cyber operations beyond NATO’s own networks is a politically difficult one given the complex mosaic of national, transnational (EU), and international law; the role of national intelligence efforts in certain types of operations; and ever-present disputes over burden-sharing, the Alliance already has invaluable experience in developing policies and procedures for contentious and sensitive tools in the form of the Nuclear Planning Group (NPG). This article begins with a brief overview of actions NATO has already taken to address cyberthreats. It will then explore why these, while important, are insufficient for the present and any imaginable future geopolitical threat environment. Next, it will address the history of the NPG, highlighting some parallels with the present situation regarding cyber and drawing out the challenges faced by, and activities and mechanisms of, the NPG. Finally, it will make the case that a group modeled on the NPG can not only significantly enhance the Alliance’s posture in cyberspace, but can serve as an invaluable space for fostering entente and reconciling differences on key aspects of cyber policy. It concludes that the Alliance needs to consider offensive cyber capabilities and planning, and it needs a Cyber Planning Group to do it.

    Paper - Potomac Institute for Policy Studies

    Cyber Readiness Index 2.0

      Authors:
    • Chris Demchak
    • Jason Kerben
    • Jennifer McArdle
    • Francesca Spidalieri
    | November 30, 2015

    "Building on CRI 1.0, Cyber Readiness Index 2.0 examines one hundred twenty-five countries that have embraced, or are starting to embrace, ICT and the Internet and then applies an objective methodology to evaluate each country's maturity and commitment to cyber security across seven essential elements."

    Melissa Hathaway introduces the Cyber Readiness Index 1.0 at a Cisco press event in Sydney, Australia.

    Cisco Photo

    Paper - Science, Technology, and Public Policy Program, Belfer Center

    Cyber Readiness Index 1.0

    | November 8, 2013

    The Cyber Readiness Index (CRI) examines thirty-five countries that have embraced ICT and the Internet and compares their maturity and commitment to protecting those investments using an initial objective assessment of where countries stand in cyber security in five areas.