Reports & Papers

11 Items

Electricians install solar panels.

AP/Mary Altaffer

Report Chapter - Brookings Institution

Mexico’s Energy Reforms: A Blow to Realizing the Most Competitive and Dynamic Region in the World

| Feb. 28, 2022

In late 2017, Mexico made headlines as Italian company Enel bid what was then a world-record low price for renewable energy in the country’s third such energy auction. This development was possible due to the historical and sweeping energy reforms passed with broad support in Mexico in 2013. Then-President Enrique Peña Nieto had succeeded where previous Mexican presidents had failed, reversing decades of resource nationalism and overhauling the energy sector through constitutional reforms that gave the private sector a larger role and advantaged renewable energy in Mexico’s economy. The 2017 auction seemed to indicate Mexico’s bright future not only as a conventional oil producer, but also as a clean energy power.

Donald Trump and Anthony Fauci

AP/Alex Brandon

Paper - Centre for International Governance Innovation

US Intelligence, the Coronavirus and the Age of Globalized Challenges

| Aug. 24, 2020

This essay makes three arguments. First, the US government will need to establish a coronavirus commission, similar to the 9/11 commission, to determine why, since April 2020, the United States has suffered more coronavirus fatalities than any other country in the world. Second, the COVID-19 pandemic represents a watershed for what will be a major national security theme this century: biological threats, both from naturally occurring pathogens and from synthesized biology. Third, intelligence about globalized challenges, such as pandemics, needs to be dramatically reconceptualized, stripping away outmoded levels of secrecy.

Report - Atlantic Council

The Reverse Cascade: Enforcing Security on the Global IoT Supply Chain

| June 2020

The Internet of Things (IoT) refers to the increasing convergence of the physical and digital worlds and it affects us all. Hundreds of "things" are being connected to the Internet and each other, with more than fifty billion devices expected to be connected by 2030. Many IoT devices are manufactured abroad at low cost with little consideration for security. How can we secure these devices, especially those manufactured outside the United States?

Report: More Climate Change Recognition, Action Among Major Investors

Free-Photos/Pixabay

Report - Axios

More Climate Change Recognition, Action Among Major Investors

| May 10, 2018

Since the Paris Agreement's adoption in 2015, a majority of the world's largest investors have begun to take action on climate change. According to a new report, the 2016–2017 year showed an average improvement in decarbonization within all major investor categories except pension funds.

Solar panels at sunrise.

Karsten Würth

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

The Geopolitics of Renewable Energy

| June 28, 2017

For a century, the geopolitics of energy has been synonymous with the
geopolitics of oil and gas. However, geopolitics and the global energy economy
are both changing. The international order predominant since the
end of World War II faces mounting challenges. At the same time, renewable
energy is growing rapidly. Nevertheless, the geopolitics of renewable
energy has received relatively little attention, especially when considering
the far-reaching consequences of a global shift to renewable energy.

The paper starts with a discussion of seven renewable energy scenarios
for the coming decades: the IEA’s World Energy Outlook 2016, the EIA’s
International Energy Outlook 2016, IRENA’s REmap 2016, Bloomberg’s
New Energy Outlook 2016, BP’s Energy Outlook 2016, Exxon-Mobil’s Outlook
for Energy 2016 and the joint IEA and IRENA G20 de-carbonization
scenario.

Planning for Cyber in the North Atlantic Treaty Organization

US Department of State

Report Chapter - Kosciuszko Institute

Planning for Cyber in the North Atlantic Treaty Organization

| July 08, 2016

While the issue of cyber operations beyond NATO’s own networks is a politically difficult one given the complex mosaic of national, transnational (EU), and international law; the role of national intelligence efforts in certain types of operations; and ever-present disputes over burden-sharing, the Alliance already has invaluable experience in developing policies and procedures for contentious and sensitive tools in the form of the Nuclear Planning Group (NPG). This article begins with a brief overview of actions NATO has already taken to address cyberthreats. It will then explore why these, while important, are insufficient for the present and any imaginable future geopolitical threat environment. Next, it will address the history of the NPG, highlighting some parallels with the present situation regarding cyber and drawing out the challenges faced by, and activities and mechanisms of, the NPG. Finally, it will make the case that a group modeled on the NPG can not only significantly enhance the Alliance’s posture in cyberspace, but can serve as an invaluable space for fostering entente and reconciling differences on key aspects of cyber policy. It concludes that the Alliance needs to consider offensive cyber capabilities and planning, and it needs a Cyber Planning Group to do it.

Taavi Rõivas, Prime Minister of Estonia

Bennett Craig, Belfer Center

Report

Photo Gallery: Estonia's Prime Minister, Taavi Rõivas, On "The 21st Century State"

Apr. 11, 2016

On March 21, The Future of Diplomacy Project jointly hosted a public seminar with the Belfer Center's Cyber Security Project titled "A 21st Century State: Anything is Possible." As the speaker for the public event, Prime Minister of Estonia, TaaviRõivas, spoke at length on the role that digital technology has played in the global competitiveness of Estonia's economy and the robustness of his country's governance and public sector services. The Prime Minister spoke to a large audience comprising of Harvard Kennedy School students, national security fellows, and local Estonian start-up entrepreneurs.

Drax Power Station in the Vale of York, where the Government devised plans for the future of coal-fired power stations and the technology which could be used to massively cut their emissions.

AP Photo/John Giles

Discussion Paper

"Post-Durban Climate Policy Architecture Based on Linkage of Cap-and-Trade Systems"

| July 2012

The outcome of the December 2011 United Nations climate negotiations in Durban, South Africa, provides an important new opportunity to move toward an international climate policy architecture that is capable of delivering broad international participation and significant global CO2 emissions reductions at reasonable cost. This paper addresses an important component of potential climate policy architecture for the post-Durban era: links among independent tradable permit systems for greenhouse gases.

A Pakistani Internet user surfs the YouTube Web site at a local Internet cafe in Islamabad, Pakistan, Feb. 26, 2008. Pakistan defended its clampdown on the YouTube Web site which accidentally interrupted access for Internet users around the globe.

AP Photo

Paper - Munk School of Global Affairs, University of Toronto

Duties for Internet Service Providers

| March 2012

In today's interconnected world, the Internet is no longer a tool. Rather, it is a service that helps generate income and employment, provides access to business and information, enables e-learning, and facilitates government activities. It is an essential service that has been integrated into every part of our society. Our experience begins when an Internet Service Provider (ISP) uses fixed telephony (plain old telephone service), mobile-cellular telephony, or fixed fiber-optic or broadband service to connect us to the global network. From that moment on, the ISP shoulders the responsibility for the instantaneous, reliable, and secure movement of our data over the Internet.

Discussion Paper - Science, Technology, and Public Policy Program, Belfer Center

WikiLeaks 2010: A Glimpse of the Future?

    Author:
  • Tim Maurer
| August 2011

The recent publications on WikiLeaks reveal a story about money, fame, sex, underground hackers, and betrayal. But it also involves fundamental questions regarding cyber-security and foreign policy. This paper argues WikiLeaks is only the symptom of a new, larger problem which is the result of technological advances that allow a large quantity of data to be 'stolen' at low or no cost by one or more individuals and to be potentially made public and to go 'viral', spreading exponentially online.