Reports & Papers

16 Items

A representative image of a digital "map"

Adobe Stock

Report

Reconceptualizing Cyber Power

Our intention is to provide the best possible understanding of cyber power capabilities to inform public debate. The Belfer approach proposes eight objectives that countries pursue using cyber means; provides a list of capabilities required to achieve those objectives that demonstrates the breadth of sources of cyber power; and compares countries based on their capability to achieve those objectives. Our work builds on existing cyber indices such as the Economist Intelligence Unit and Booz Allen Hamilton’s 2011 Cyber Power Ranking, by, for example, including a policy dimension and recognizing that cyber capabilities enhance military strength.

Planning for Cyber in the North Atlantic Treaty Organization

US Department of State

Report Chapter - Kosciuszko Institute

Planning for Cyber in the North Atlantic Treaty Organization

| July 08, 2016

While the issue of cyber operations beyond NATO’s own networks is a politically difficult one given the complex mosaic of national, transnational (EU), and international law; the role of national intelligence efforts in certain types of operations; and ever-present disputes over burden-sharing, the Alliance already has invaluable experience in developing policies and procedures for contentious and sensitive tools in the form of the Nuclear Planning Group (NPG). This article begins with a brief overview of actions NATO has already taken to address cyberthreats. It will then explore why these, while important, are insufficient for the present and any imaginable future geopolitical threat environment. Next, it will address the history of the NPG, highlighting some parallels with the present situation regarding cyber and drawing out the challenges faced by, and activities and mechanisms of, the NPG. Finally, it will make the case that a group modeled on the NPG can not only significantly enhance the Alliance’s posture in cyberspace, but can serve as an invaluable space for fostering entente and reconciling differences on key aspects of cyber policy. It concludes that the Alliance needs to consider offensive cyber capabilities and planning, and it needs a Cyber Planning Group to do it.

Representatives of participating companies sign containers with uranium to be used as fuel for nuclear reactors, prior to loading them aboard Atlantic Navigator ship, in St. Petersburg, Russia, November 14, 2013.

AP

Report - National Academies Press

Reducing the Use of Highly Enriched Uranium in Civilian Research Reactors

| January 28, 2016

Reducing the Use of Highly Enriched Uranium in Civilian Research Reactors is a report of the Committee on the Current Status of and Progress Toward Eliminating Highly Enriched Uranium Use in Fuel for Civilian Research and Test Reactors. The committee was established by the Nuclear and Radiation Studies Board, Division on Earth and Life Studies and the National Academies of Sciences, Engineering, and Medicine. The report is the result of a congressionally mandated study (P.L. 112-239, Section 31781) to assess improvement in reducing highly enriched uranium use in fuel for civilian research and test reactors.

 

Belfer Center Senior Fellow William Tobey is a member of the Committee that produced the report.

Negotiations over Iran's nuclear program in Lausanne, Switzerland, Mar. 2015.

AP

Report

Inspections in Iran: What Would Inspectors Need? What Are the Lessons Learned from Iraq?

| June 3, 2015

As nuclear negotiations with Iran near their final stage, the question of inspections has come to the fore. If a final agreement is reached, inspections will be a principal means of assuring that Iran does not develop nuclear weapons, either by “breakout” at declared facilities, or by “sneakout” using secret sites. Given the importance being placed on inspections, what type will be necessary?  What inspection and verification regime will be needed to facilitate compliance, detect violations, and ensure effective enforcement?

Global diplomats after reaching an interim agreement with Iran over its nuclear program on November 24, 2013.

AFP/Getty Images

Report

A Final Deal with Iran: Filling the Gaps

| May 14, 2014

What would be the consequences if the interim deal became, de facto, permanent?  Does the interim deal have gaps that would be fatal to any long-term arrangement?  What are the consequences if no deal is reached?  And, are such consequences better or worse than those resulting from an extension of the interim deal, or from a deal that fails to meet minimum acceptable standards? These questions, among others, were addressed at a private roundtable discussion hosted by the Wisconsin Project on Nuclear Arms Control on April 25, 2014.

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Transcending Mutual Deterrence in the U.S.-Russian Relationship

| September 30, 2013

Even as this paper was being written and edited, U.S.-Russian relations have warmed and chilled. Today, as we are about to go to press, marks a particularly chilly period in recent history, with the cancellation of a planned Moscow Summit in September 2013. To some, this cold spell might signal an inapt moment to consider issues related to transcending mutual deterrence. Such a view would overlook the aims of the paper, which attempts to assess the central and enduring interests of the United States and Russia, the extent to which they coincide or conflict, and whether or not in light of these interests mutual deterrence should remain a fundamental feature of the relationship.

Delay barriers at the U.S. National Nuclear Security Administration's Y‐12 facility

NNSA Production Office

Discussion Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Defining and Implementing Best Practices in Nuclear Security

| Dec. 14, 2012

This paper analyzes the contribution that best practices can make to the field of nuclear security by doing the following:

  • Defining what is meant by best practice
  • Specifying a methodology for deriving it
  • Understanding the resulting characteristics of the method
  • Comparing its pros and cons to other methods contributing to security, such as guidelines and regulations

Report - Center for Strategic and International Studies

The U.S.-Japan Alliance: Anchoring Stability in Asia

| August 2012

The following report presents a consensus view of the members of a bipartisan study group on the U.S.-Japan alliance. The report specifically addresses energy, economics and global trade, relations with neighbors, and security-related issues. Within these areas, the study group offers policy recommendations for Japan and the United States, which span near- and long-term time frames. These recommendations are intended to bolster the alliance as a force for peace, stability, and prosperity in the Asia-Pacific region and beyond.

Paper - Science, Technology, and Public Policy Program, Belfer Center

Internet Fragmentation: Highlighting the Major Technical, Governance and Diplomatic Challenges for U.S. Policy Makers

| May 2012

The Internet is at a crossroads. Today it is generally open, interoperable and unified. Tomorrow, however, we may see an entirely different Internet, one not characterized by openness and global reach, but by restrictions, blockages and cleavages. In order to help ensure that the Internet continues to serve as a source of global integration, democratization, and economic growth, American policymakers must be aware of the most significant technical, political and legal challenges to a unified Internet.

teaser image

Discussion Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

What Happened to the Soviet Superpower’s Nuclear Arsenal? Clues for the Nuclear Security Summit

| March 2012

Twenty years ago Russia and fourteen other newly-independent states emerged from the ruins of the Soviet empire, many as nations for the first time in history. As is typical in the aftermath of the collapse of an empire, this was followed by a period of chaos, confusion, and corruption. As the saying went at the time, “everything is for sale.” At that same moment, as the Soviet state imploded, 35,000 nuclear weapons remained at thousands of sites across a vast Eurasian landmass that stretched across eleven time zones. 

Today, fourteen of the fifteen successor states to the Soviet Union are nuclear weapons-free. This paper will address the question: how did this happen? Looking ahead, it will consider what clues we can extract from the success in denuclearizing fourteen post-Soviet states that can inform our non-proliferation and nuclear security efforts in the future. These clues may inform leaders of the U.S., Russia, and other responsible nations attending the Seoul Nuclear Security Summit on March 26-27, 2012. The paper will conclude with specific recommendations, some exceedingly ambitious that world leaders could follow to build on the Seoul summit’s achievements against nuclear terrorism in the period before the next summit in 2014. One of these would be to establish a Global Alliance Against Nuclear Terrorism.