Reports & Papers

9 Items

A worker is seen in a tugboat at the Port of Los Angeles on Nov. 10, 2021.

AP Photo/Marcio Jose Sanchez, File

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Never Breaking the Chain: The Economics and Politics of Creating an Effective National Supply Chain Strategy

| August 2022

The creation of a national supply chain strategy is crucial to responding to the challenge and merits specific attention from both policy and business leaders. This paper proposes specific government and business policy steps that would progress the US’s position on a more unified, strategic supply chain approach.

A Tajik conscript looks out over remote stretches of northern Afghanistan from a border outpost near Khorog, Tajikistan.

Photo by David Trilling (c)

Report - Russia Matters

Jihadists from Ex-Soviet Central Asia: Where Are They? Why Did They Radicalize? What Next?

| Fall 2018

Thousands of radicals from formerly Soviet Central Asia have traveled to fight alongside IS in Syria and Iraq; hundreds more are in Afghanistan. Not counting the fighting in those three war-torn countries, nationals of Central Asia have been responsible for nearly 100 deaths in terrorist attacks outside their home region in the past five years. But many important aspects of the phenomenon need more in-depth study.

This research paper attempts to answer four basic sets of questions: (1) Is Central Asia becoming a new source of violent extremism that transcends borders, and possibly continents? (2) If so, why? What causes nationals of Central Asia to take up arms and participate in political violence? (3) As IS has been all but defeated in Iraq and Syria, what will Central Asian extremists who have thrown in their lot with the terrorist group do next? And (4) do jihadists from Central Asia aspire to acquire and use weapons of mass destruction? If so, how significant a threat do they pose and who would be its likeliest targets?

    A person types on a laptop keyboard in North Andover, Mass, June 19, 2017. (AP Photo/Elise Amendola)

    AP Photo/Elise Amendola

    Paper - Cyber Security Project, Belfer Center

    (Why) Is There a Public/Private Pay Gap?

    | August 2018

    The government is facing a severe shortage of skilled workers, especially in information technology and cyber security jobs. The conventional wisdom in branches of policy and public administration is that the shortage is driven by low salaries that are not competitive for attracting top talent. Using longitudinal data on high skilled workers between 1993 and 2013, this paper shows that, if anything, government employees earn more than their private sector counterparts. Although government workers tend to earn less in the raw data, these differences are driven by the correlation between unobserved ability and selection into private sector jobs. These results are robust to additional data from the Census Bureau between 2005 and 2016. Instead, this paper shows that a more plausible culprit behind the worker shortage in government is a lack of development opportunities and poor management.

    Paper - Potomac Institute for Policy Studies

    Cyber Readiness Index 2.0

      Authors:
    • Chris Demchak
    • Jason Kerben
    • Jennifer McArdle
    • Francesca Spidalieri
    | November 30, 2015

    "Building on CRI 1.0, Cyber Readiness Index 2.0 examines one hundred twenty-five countries that have embraced, or are starting to embrace, ICT and the Internet and then applies an objective methodology to evaluate each country's maturity and commitment to cyber security across seven essential elements."

    Melissa Hathaway introduces the Cyber Readiness Index 1.0 at a Cisco press event in Sydney, Australia.

    Cisco Photo

    Paper - Science, Technology, and Public Policy Program, Belfer Center

    Cyber Readiness Index 1.0

    | November 8, 2013

    The Cyber Readiness Index (CRI) examines thirty-five countries that have embraced ICT and the Internet and compares their maturity and commitment to protecting those investments using an initial objective assessment of where countries stand in cyber security in five areas.

    Report - Center for Strategic and International Studies

    The U.S.-Japan Alliance: Anchoring Stability in Asia

    | August 2012

    The following report presents a consensus view of the members of a bipartisan study group on the U.S.-Japan alliance. The report specifically addresses energy, economics and global trade, relations with neighbors, and security-related issues. Within these areas, the study group offers policy recommendations for Japan and the United States, which span near- and long-term time frames. These recommendations are intended to bolster the alliance as a force for peace, stability, and prosperity in the Asia-Pacific region and beyond.

    A Pakistani Internet user surfs the YouTube Web site at a local Internet cafe in Islamabad, Pakistan, Feb. 26, 2008. Pakistan defended its clampdown on the YouTube Web site which accidentally interrupted access for Internet users around the globe.

    AP Photo

    Paper - Munk School of Global Affairs, University of Toronto

    Duties for Internet Service Providers

    | March 2012

    In today's interconnected world, the Internet is no longer a tool. Rather, it is a service that helps generate income and employment, provides access to business and information, enables e-learning, and facilitates government activities. It is an essential service that has been integrated into every part of our society. Our experience begins when an Internet Service Provider (ISP) uses fixed telephony (plain old telephone service), mobile-cellular telephony, or fixed fiber-optic or broadband service to connect us to the global network. From that moment on, the ISP shoulders the responsibility for the instantaneous, reliable, and secure movement of our data over the Internet.

    Discussion Paper - Science, Technology, and Public Policy Program, Belfer Center

    New Threats, Old Technology: Vulnerabilities in Undersea Communication Cable Network Management Systems

    | February 2012

    This paper explores the vulnerabilities to cyber attacks of infrastructure that today carries nearly all the world's data and voice traffic: undersea communications cables. Long-standing physical vulnerabilities in cable infrastructure have been compounded by new risk found in the network management systems that monitor and control cable operations. Unlike an attack on a water treatment plant's control systems, however, an attack on the cables' control systems could devastate the world's economies — presenting a different kind of Internet "kill switch" altogether — shutting down world commerce, and doing it all with the click of a mouse.

    Norton Cybercrime Index

    AP Photo

    Paper - Science, Technology, and Public Policy Program, Belfer Center

    Taking a Byte Out of Cybercrime

    | October 2011

    "Cybersecurity is a means to enable social stability and promote digital democracy; a method by which to govern the Internet; and a process by which to secure critical infrastructure from cybercrime, cyberespionage, cyberterrorism and cyberwar. As nations and corporations recognize their dependence on ICT, policymakers must find the proper balance in protecting their investments without strangling future growth."