Reports & Papers

32 Items

German Interior Minister Thomas de Maiziere talks to the media during his visit to the central department of fighting internet criminality (ZIT) in Giessen, Germany, Wednesday, Feb. 8, 2017. In background a map showing the amount of cyber attacks in a30 days.

AP Photo/Michael Probst

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Advancing Cyber Norms Unilaterally: How the U.S. Can Meet its Paris Call Commitments

| January 2023

Establishing norms for state behavior in cyberspace is critical to building a more stable, secure, and safe cyberspace. Norms are defined as “a collective expectation for the proper behavior of actors with a given identity,” and declare what behavior is considered appropriate and when lines have been crossed. Cyberspace is in dire need of such collective expectations. However, despite efforts by the international community and individual states to set boundaries and craft agreements, clear and established cyber norms for state behavior remain elusive. As early as 2005, the UN Group of Governmental Experts (GGE) and UN Open-Ended Working Group (OEWG) both aimed to create shared “rules of the road,” but fundamental disagreements between states and a lack of accountability and enforcement mechanisms have prevented these initiatives from substantively implementing cyber norms. As a result, the international community and individual states are left with no accountability mechanisms or safeguards to protect civilians and critical infrastructure from bad actors in cyberspace.

In this file photo taken Thursday, May 17, 2018, a visitor to the 21st China Beijing International High-tech Expo looks at a computer chip through the microscope displayed by the state-controlled Tsinghua Unigroup project which has emerged as a national champion for Beijing's semiconductor ambitions in Beijing, China.

AP Photo/Ng Han Guan, File

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

The U.S.-China Tech Rivalry: Don't Decouple - Diversify

| Mar. 03, 2022

The U.S. is grappling with increasingly challenging transnational technology, policy, and security issues, which are complicated further by the economic and supply chain relationships with China. As the Biden administration and Congress look at developing policy solutions that will both reduce dependence on China and strengthen the United States’ resilience, it is important that these policies form a larger, holistic strategy that articulates the national security narrative clearly. 

A transatlantic telephone cable is brought ashore at Clarenville, Newfoundland, for the final splice on March 8, 1957. In the background is the British naval vessel Monarch, the world’s largest cable layer, which has worked through two summers laying nearly 4,000 miles of cable to complete the two-way system between Newfoundland and Scotland.

AP Photo, File

Paper - Cyber Project

Data Sharing Between the United States and the European Union

    Author:
  • Madalina Murariu
| July 2021

The implications of the Schrems II decision have substantial short and long-term repercussions. This paper will seek to briefly explain the history of the Schrems cases, then outline the options available to decision makers seeking to enable transatlantic cooperation. The paper will also argue that short-term solutions such as the ones leveraged up till now will increasingly be unfeasible, and therefore present four proposals for consideration on how a revived data transfer ecosystem could be shaped through national and international tools and mechanisms.

Paper

US-Russian Contention in Cyberspace

| June 2021

The overarching question imparting urgency to this exploration is: Can U.S.-Russian contention in cyberspace cause the two nuclear superpowers to stumble into war? In considering this question we were constantly reminded of recent comments by a prominent U.S. arms control expert: At least as dangerous as the risk of an actual cyberattack, he observed, is cyber operations’ “blurring of the line between peace and war.” Or, as Nye wrote, “in the cyber realm, the difference between a weapon and a non-weapon may come down to a single line of code, or simply the intent of a computer program’s user.”

Report - Stavros Niarchos Foundation Agora Institute, Johns Hopkins University

Rechanneling Beliefs: How Information Flows Hinder or Help Democracy

| May 24, 2021

Despite a technically successful election with a record-breaking voter turnout,  U.S. institutions and procedures have not created the kinds of shared public consensus over the results of the 2020 election that they were supposed to. The authors write that the United States needs a dynamic stability, one that incorporates new forces into American democracy rather than trying to deny or quash them. This report is their attempt to explain what this might mean in practice

Fiber optic cables are seen at a data center in Manhattan, March 2013

AP / Mark Lennihan

Paper

A Case for Fortifying the BUILD Act: The U.S., China, and Internet Infrastructure in the Global South

| July 2019

A well-resourced USDFC as a result of the BUILD Act will support U.S. companies and provide competitive alternatives for the Global South. Prioritizing U.S. support in the telecommunications sector will also help balance China’s growing strategic influence in cyberspace. However, reports suggest that the USDFC’s financial resources will be much less than originally planned. These resources are needed to level the playing field. This paper outlines why.

Paper - Carnegie Endowment for International Peace

Russia and Cyber Operations: Challenges and Opportunities for the Next U.S. Administration

| December 13, 2016

Russian cyber operations against the United States aim to both collect information and develop offensive capabilities against future targets. Washington must strengthen its defenses in response.

NATO Road to Cybersecurity

US Department of State

Report - Kosciuszko Institute

NATO Road to Cybersecurity

July 08, 2016

In this report, the Kosciuszko Institute invited authors to take up the most pressing cybersecurity challenges facing the North Atlantic Treaty Organization. The NATO Summit in Warsaw should begin the discussion about these key areas. Everything indicates that in the coming years, the discussions on the direction of the Alliance’s involvement in cyber operations will be dominated by two issues. The first concerns the need for the Alliance to specify exactly the activities carried out in the framework of collective defence and the development of NATO’s capabilities, including offensive, to operate in cyberspace. The second, frequently brought up in the discussion about the cybersecurity of the Alliance, is the need for comprehensive measures to be implemented to counter hybrid threats, including the multi-dimensional use of cyberspace as one of the most critical elements.

Planning for Cyber in the North Atlantic Treaty Organization

US Department of State

Report Chapter - Kosciuszko Institute

Planning for Cyber in the North Atlantic Treaty Organization

| July 08, 2016

While the issue of cyber operations beyond NATO’s own networks is a politically difficult one given the complex mosaic of national, transnational (EU), and international law; the role of national intelligence efforts in certain types of operations; and ever-present disputes over burden-sharing, the Alliance already has invaluable experience in developing policies and procedures for contentious and sensitive tools in the form of the Nuclear Planning Group (NPG). This article begins with a brief overview of actions NATO has already taken to address cyberthreats. It will then explore why these, while important, are insufficient for the present and any imaginable future geopolitical threat environment. Next, it will address the history of the NPG, highlighting some parallels with the present situation regarding cyber and drawing out the challenges faced by, and activities and mechanisms of, the NPG. Finally, it will make the case that a group modeled on the NPG can not only significantly enhance the Alliance’s posture in cyberspace, but can serve as an invaluable space for fostering entente and reconciling differences on key aspects of cyber policy. It concludes that the Alliance needs to consider offensive cyber capabilities and planning, and it needs a Cyber Planning Group to do it.