Reports & Papers

11 Items

A computer code is seen on displays in the office of Global Cyber Security Company Group-IB in Moscow, Russia, Wednesday, Oct. 25, 2017. A new strain of malicious software has paralyzed computers at a Ukrainian airport, the Ukrainian capital's subway and at some independent Russian media. Moscow-based Global Cyber Security Company Group-IB said in a statement Wednesday the ransomware called BadRabbit also tried to penetrate the computers of major Russian banks but failed.

AP Photo/Pavel Golovkin

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Addressing Russian and Chinese Cyber Threats: A Transatlantic Perspective on Threats to Ukraine and Beyond

| May 2023

In an interconnected world, cyberattacks are becoming more frequent and sophisticated. Building resilience against this asymmetric threat is critical for countries to protect their economies, critical infrastructure, and democratic institutions. However, cyberattacks do not respect borders, and no country can address this threat alone. The strength and longevity of the transatlantic partnership between the EU and the U.S. presents a unique opportunity to address this strategic threat through international cooperation. Through an analysis of cyberwarfare in the ongoing war in Ukraine, this paper proposes policy recommendations to enhance transatlantic coordination and cooperation against current and future adversaries in a new era of strategic competition. Ultimately, a stronger transatlantic partnership is critical for protecting international democratic norms, building resilience against cyber threats, and strengthening global security and stability.

A worker is seen in a tugboat at the Port of Los Angeles on Nov. 10, 2021.

AP Photo/Marcio Jose Sanchez, File

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Never Breaking the Chain: The Economics and Politics of Creating an Effective National Supply Chain Strategy

| August 2022

The creation of a national supply chain strategy is crucial to responding to the challenge and merits specific attention from both policy and business leaders. This paper proposes specific government and business policy steps that would progress the US’s position on a more unified, strategic supply chain approach.

A MEP walks in the mostly-vacant Plenary chamber of the European Parliament in Brussels, Tuesday, March 10, 2020.

AP Photo/Virginia Mayo

Paper

Transatlantic Dialogue: The Missing Link in Europe’s Post-Covid-19 Green Deal?

| April 2020

This policy brief emphasizes that the European Green Deal's effectiveness in a post Covid-19 world will require the involvement of strategic partners, especially the US. In the context of a potential US withdrawal from the Paris Agreement and the consequential vacuum, it will be even more important to engage the US in implementing the GD. In light of divergence between the US and the EU during past climate negotiations (e.g. Kyoto, Copenhagen, and Paris), we suggest a gradual approach to US engagement with GD initiatives and objectives.

Workers dismantle the Belt and Road Forum logo next to the “Golden Bridge of Silk Road” structure outside the media center as leaders are attending the round table summit of the Belt and Road Forum chaired by Chinese President Xi Jinping in Beijing, Saturday, April 27, 2019

AP Photo/Andy Wong

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

The Triangle in the Long Game

| June 19, 2019

The purpose of this paper is to analyze how China’s new power is reaching Europe, the challenges that it poses, and the European responses to this new reality. This process has to be examined in the context of the current strategic competition between China and the U.S. and its reflection on the transatlantic relationship.

A person types on a laptop keyboard in North Andover, Mass, June 19, 2017. (AP Photo/Elise Amendola)

AP Photo/Elise Amendola

Paper - Cyber Security Project, Belfer Center

(Why) Is There a Public/Private Pay Gap?

| August 2018

The government is facing a severe shortage of skilled workers, especially in information technology and cyber security jobs. The conventional wisdom in branches of policy and public administration is that the shortage is driven by low salaries that are not competitive for attracting top talent. Using longitudinal data on high skilled workers between 1993 and 2013, this paper shows that, if anything, government employees earn more than their private sector counterparts. Although government workers tend to earn less in the raw data, these differences are driven by the correlation between unobserved ability and selection into private sector jobs. These results are robust to additional data from the Census Bureau between 2005 and 2016. Instead, this paper shows that a more plausible culprit behind the worker shortage in government is a lack of development opportunities and poor management.

Paper - Potomac Institute for Policy Studies

Cyber Readiness Index 2.0

    Authors:
  • Chris Demchak
  • Jason Kerben
  • Jennifer McArdle
  • Francesca Spidalieri
| November 30, 2015

"Building on CRI 1.0, Cyber Readiness Index 2.0 examines one hundred twenty-five countries that have embraced, or are starting to embrace, ICT and the Internet and then applies an objective methodology to evaluate each country's maturity and commitment to cyber security across seven essential elements."

Melissa Hathaway introduces the Cyber Readiness Index 1.0 at a Cisco press event in Sydney, Australia.

Cisco Photo

Paper - Science, Technology, and Public Policy Program, Belfer Center

Cyber Readiness Index 1.0

| November 8, 2013

The Cyber Readiness Index (CRI) examines thirty-five countries that have embraced ICT and the Internet and compares their maturity and commitment to protecting those investments using an initial objective assessment of where countries stand in cyber security in five areas.

Report - Center for Strategic and International Studies

The U.S.-Japan Alliance: Anchoring Stability in Asia

| August 2012

The following report presents a consensus view of the members of a bipartisan study group on the U.S.-Japan alliance. The report specifically addresses energy, economics and global trade, relations with neighbors, and security-related issues. Within these areas, the study group offers policy recommendations for Japan and the United States, which span near- and long-term time frames. These recommendations are intended to bolster the alliance as a force for peace, stability, and prosperity in the Asia-Pacific region and beyond.

A Pakistani Internet user surfs the YouTube Web site at a local Internet cafe in Islamabad, Pakistan, Feb. 26, 2008. Pakistan defended its clampdown on the YouTube Web site which accidentally interrupted access for Internet users around the globe.

AP Photo

Paper - Munk School of Global Affairs, University of Toronto

Duties for Internet Service Providers

| March 2012

In today's interconnected world, the Internet is no longer a tool. Rather, it is a service that helps generate income and employment, provides access to business and information, enables e-learning, and facilitates government activities. It is an essential service that has been integrated into every part of our society. Our experience begins when an Internet Service Provider (ISP) uses fixed telephony (plain old telephone service), mobile-cellular telephony, or fixed fiber-optic or broadband service to connect us to the global network. From that moment on, the ISP shoulders the responsibility for the instantaneous, reliable, and secure movement of our data over the Internet.

Discussion Paper - Science, Technology, and Public Policy Program, Belfer Center

New Threats, Old Technology: Vulnerabilities in Undersea Communication Cable Network Management Systems

| February 2012

This paper explores the vulnerabilities to cyber attacks of infrastructure that today carries nearly all the world's data and voice traffic: undersea communications cables. Long-standing physical vulnerabilities in cable infrastructure have been compounded by new risk found in the network management systems that monitor and control cable operations. Unlike an attack on a water treatment plant's control systems, however, an attack on the cables' control systems could devastate the world's economies — presenting a different kind of Internet "kill switch" altogether — shutting down world commerce, and doing it all with the click of a mouse.