Reports & Papers

20 Items

Hijacked airliner headed toward World Trade Towers on September 11, 2001

REUTERS/Sean Adair

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

Countering Terrorism With "Blue Sky" Thinking

| May 19, 2022

In the past, strategic surprise has often stemmed from a failure of imagination. Most intelligence failures are rooted in a lack of foresight or early warning of impending events. Blue sky thinking seeks to prevent these surprises by devoting more attention not just to known risks and likely scenarios, but also to low probability, high impact events. In an unprecedented step in forging ongoing global collaboration, 129 global experts gathered in Amman, Jordan, in December 2021. The conference was held under the auspices of Jordan’s Aqaba Process and facilitated by representatives from the Harvard Kennedy School Belfer Center’s Intelligence Project. Attendees included intelligence officers, diplomats, military officers, private sector practitioners, and academics representing 29 countries, 5 continents, and 68 government and private sector organizations. Through presentations and discussion under Chatham House Rules, the conference facilitated an open exchange of ideas on the possible next big threats from terrorism and on strategies for moving forward.

Donald Trump and Anthony Fauci

AP/Alex Brandon

Paper - Centre for International Governance Innovation

US Intelligence, the Coronavirus and the Age of Globalized Challenges

| Aug. 24, 2020

This essay makes three arguments. First, the US government will need to establish a coronavirus commission, similar to the 9/11 commission, to determine why, since April 2020, the United States has suffered more coronavirus fatalities than any other country in the world. Second, the COVID-19 pandemic represents a watershed for what will be a major national security theme this century: biological threats, both from naturally occurring pathogens and from synthesized biology. Third, intelligence about globalized challenges, such as pandemics, needs to be dramatically reconceptualized, stripping away outmoded levels of secrecy.

Report - Atlantic Council

The Reverse Cascade: Enforcing Security on the Global IoT Supply Chain

| June 2020

The Internet of Things (IoT) refers to the increasing convergence of the physical and digital worlds and it affects us all. Hundreds of "things" are being connected to the Internet and each other, with more than fifty billion devices expected to be connected by 2030. Many IoT devices are manufactured abroad at low cost with little consideration for security. How can we secure these devices, especially those manufactured outside the United States?

Planning for Cyber in the North Atlantic Treaty Organization

US Department of State

Report Chapter - Kosciuszko Institute

Planning for Cyber in the North Atlantic Treaty Organization

| July 08, 2016

While the issue of cyber operations beyond NATO’s own networks is a politically difficult one given the complex mosaic of national, transnational (EU), and international law; the role of national intelligence efforts in certain types of operations; and ever-present disputes over burden-sharing, the Alliance already has invaluable experience in developing policies and procedures for contentious and sensitive tools in the form of the Nuclear Planning Group (NPG). This article begins with a brief overview of actions NATO has already taken to address cyberthreats. It will then explore why these, while important, are insufficient for the present and any imaginable future geopolitical threat environment. Next, it will address the history of the NPG, highlighting some parallels with the present situation regarding cyber and drawing out the challenges faced by, and activities and mechanisms of, the NPG. Finally, it will make the case that a group modeled on the NPG can not only significantly enhance the Alliance’s posture in cyberspace, but can serve as an invaluable space for fostering entente and reconciling differences on key aspects of cyber policy. It concludes that the Alliance needs to consider offensive cyber capabilities and planning, and it needs a Cyber Planning Group to do it.

Taavi Rõivas, Prime Minister of Estonia

Bennett Craig, Belfer Center

Report

Photo Gallery: Estonia's Prime Minister, Taavi Rõivas, On "The 21st Century State"

Apr. 11, 2016

On March 21, The Future of Diplomacy Project jointly hosted a public seminar with the Belfer Center's Cyber Security Project titled "A 21st Century State: Anything is Possible." As the speaker for the public event, Prime Minister of Estonia, TaaviRõivas, spoke at length on the role that digital technology has played in the global competitiveness of Estonia's economy and the robustness of his country's governance and public sector services. The Prime Minister spoke to a large audience comprising of Harvard Kennedy School students, national security fellows, and local Estonian start-up entrepreneurs.

Paper - International Security Program, Belfer Center

They Believed They Were Doing No Wrong: NSA and the Snowden Documents

| March 26, 2015

"At the conclusion of this research, and to summarize my bottom line, I would say that the NSA, while operating under the direction of higher authority, nevertheless had a mindset—typically American—of overdoing things and with it, a reflex of protecting the secrets of the organization."

A Pakistani Internet user surfs the YouTube Web site at a local Internet cafe in Islamabad, Pakistan, Feb. 26, 2008. Pakistan defended its clampdown on the YouTube Web site which accidentally interrupted access for Internet users around the globe.

AP Photo

Paper - Munk School of Global Affairs, University of Toronto

Duties for Internet Service Providers

| March 2012

In today's interconnected world, the Internet is no longer a tool. Rather, it is a service that helps generate income and employment, provides access to business and information, enables e-learning, and facilitates government activities. It is an essential service that has been integrated into every part of our society. Our experience begins when an Internet Service Provider (ISP) uses fixed telephony (plain old telephone service), mobile-cellular telephony, or fixed fiber-optic or broadband service to connect us to the global network. From that moment on, the ISP shoulders the responsibility for the instantaneous, reliable, and secure movement of our data over the Internet.

Discussion Paper - Science, Technology, and Public Policy Program, Belfer Center

WikiLeaks 2010: A Glimpse of the Future?

    Author:
  • Tim Maurer
| August 2011

The recent publications on WikiLeaks reveal a story about money, fame, sex, underground hackers, and betrayal. But it also involves fundamental questions regarding cyber-security and foreign policy. This paper argues WikiLeaks is only the symptom of a new, larger problem which is the result of technological advances that allow a large quantity of data to be 'stolen' at low or no cost by one or more individuals and to be potentially made public and to go 'viral', spreading exponentially online.

Report - Institute for Social Policy and Understanding

Tackling Muslim Radicalization: Lessons from Scotland

| June 2010

THE 9/11 ATTACK upon the United States awakened Washington to the danger of violent Muslim radicalization on its soil. In the long term, the only way to defeat radical Islamists is to reduce the motivation for Muslims to radicalize in the first place. The report explains the cutting-edge solution currently operating in Scotland.

Masjid Wali Hassan Islamic Society of Decatur members listen as Imam Johnnie Shabazz holds a news conference, Sep. 25, 2009, in Decatur, Ill. Michael Finton, the man accused of planning to bomb the Springfield Federal Courthouse, attended the mosque.

AP Photo

Paper - Real Instituto Elcano

The Homegrown Terrorist Threat to the US Homeland

| December 21, 2009

"...[F]or a long time the American authorities and commentators seemed unable to acknowledge the existence of radicalisation among small segments of the American Muslim population. In the FBI's parlance, for example, until 2005, the term ‘homegrown terrorism' was still reserved for domestic organisations such as anti-government militias, white supremacists and eco-terrorist groups such as the Earth Liberation Front. Such groups were termed ‘homegrown' to distinguish them from jihadist terrorist networks, even though some of the latter possessed some of the very same characteristics (membership born and raised in the US and a focus on US targets). Since the cause of the jihadists was perceived to be foreign, the US government did not label them as ‘homegrown', despite the typically homegrown characteristics of many of them."