Reports & Papers

13 Items

Donald Trump and Anthony Fauci

AP/Alex Brandon

Paper - Centre for International Governance Innovation

US Intelligence, the Coronavirus and the Age of Globalized Challenges

| Aug. 24, 2020

This essay makes three arguments. First, the US government will need to establish a coronavirus commission, similar to the 9/11 commission, to determine why, since April 2020, the United States has suffered more coronavirus fatalities than any other country in the world. Second, the COVID-19 pandemic represents a watershed for what will be a major national security theme this century: biological threats, both from naturally occurring pathogens and from synthesized biology. Third, intelligence about globalized challenges, such as pandemics, needs to be dramatically reconceptualized, stripping away outmoded levels of secrecy.

Report - Atlantic Council

The Reverse Cascade: Enforcing Security on the Global IoT Supply Chain

| June 2020

The Internet of Things (IoT) refers to the increasing convergence of the physical and digital worlds and it affects us all. Hundreds of "things" are being connected to the Internet and each other, with more than fifty billion devices expected to be connected by 2030. Many IoT devices are manufactured abroad at low cost with little consideration for security. How can we secure these devices, especially those manufactured outside the United States?

Planning for Cyber in the North Atlantic Treaty Organization

US Department of State

Report Chapter - Kosciuszko Institute

Planning for Cyber in the North Atlantic Treaty Organization

| July 08, 2016

While the issue of cyber operations beyond NATO’s own networks is a politically difficult one given the complex mosaic of national, transnational (EU), and international law; the role of national intelligence efforts in certain types of operations; and ever-present disputes over burden-sharing, the Alliance already has invaluable experience in developing policies and procedures for contentious and sensitive tools in the form of the Nuclear Planning Group (NPG). This article begins with a brief overview of actions NATO has already taken to address cyberthreats. It will then explore why these, while important, are insufficient for the present and any imaginable future geopolitical threat environment. Next, it will address the history of the NPG, highlighting some parallels with the present situation regarding cyber and drawing out the challenges faced by, and activities and mechanisms of, the NPG. Finally, it will make the case that a group modeled on the NPG can not only significantly enhance the Alliance’s posture in cyberspace, but can serve as an invaluable space for fostering entente and reconciling differences on key aspects of cyber policy. It concludes that the Alliance needs to consider offensive cyber capabilities and planning, and it needs a Cyber Planning Group to do it.

Taavi Rõivas, Prime Minister of Estonia

Bennett Craig, Belfer Center

Report

Photo Gallery: Estonia's Prime Minister, Taavi Rõivas, On "The 21st Century State"

Apr. 11, 2016

On March 21, The Future of Diplomacy Project jointly hosted a public seminar with the Belfer Center's Cyber Security Project titled "A 21st Century State: Anything is Possible." As the speaker for the public event, Prime Minister of Estonia, TaaviRõivas, spoke at length on the role that digital technology has played in the global competitiveness of Estonia's economy and the robustness of his country's governance and public sector services. The Prime Minister spoke to a large audience comprising of Harvard Kennedy School students, national security fellows, and local Estonian start-up entrepreneurs.

Report - Managing the Atom Project, Belfer Center

IAEA Verification of Fissile Material in Support of Nuclear Disarmament

| Apr. 27, 2015

This report proposes a framework for IAEA verification of steps toward nuclear disarmament, premised on IAEA verification of fissile material, in any form, whether classified or not, submitted by any state possessing nuclear weapons. It identifies technical, legal, and financial solutions to the challenges posed by such verification, and offers a way forward to the implementation of the proposed framework. The tool that Rockwood and Shea offer is ready for any state with nuclear weapons to take up, finish the final details, and implement.

Report - Managing the Atom Project, Belfer Center

Fresh Ideas for the Future: Symposium on the NPT

| April 26, 2015

The abstracts in this booklet summarise the research presented at an academic symposium convened on the sidelines of the 2015 NPT Review Conference. As we write this, journalists and seasoned experts in the nuclear policy field have been speculating about the particularly difficult challenges facing the Review Conference this year. To address those challenges, we would urge all concerned to consider the ideas and analyses presented at this symposium. Experts would be hard-pressed to find a better collection of fresh ideas and approaches for assessing and strengthening the NPT.

Paper

Nuclear Disarmament: The Legacy of the Trilateral Initiative

| March 23, 2015

In 1996, the International Atomic Energy Agency (IAEA), the United States and the Russian Federation entered into a cooperative effort – the Trilateral Initiative – aimed at investigating the feasibility and requirements for a verification system under which the IAEA could accept and monitor nuclear warheads or nuclear warhead components pursuant to the NPT Article VI commitments of both States. Although the Initiative ended in 2002, the Model Verification Agreement produced could still serve as the basis for bilateral or multilateral agreements between the IAEA and nuclear-weapon States.

In this paper, Thomas E. Shea and Laura Rockwood examine the potential role for international verification of fissile material in relation to nuclear disarmament, what was accomplished under the Trilateral Initiative and, more importantly, what should be done now to preserve its legacy and take concrete steps towards such verification.

Paper

Strengthening Global Approaches To Nuclear Security

| July 1, 2013

Despite substantial progress in improving nuclear security in recent years, there is more to be done.  The threats of nuclear theft and terrorism remain very real.  This paper recommends learning from the much stronger national and international efforts in nuclear safety, and in particular taking steps to build international understanding of the threat; establish effective performance objectives; assure performance; train and certify needed personnel; build security culture and exchange best practices; reduce the number of sites that need to be protected; and strengthen the international framework and continue the dialogue once leaders are no longer meeting regularly at the summit level.

Discussion Paper - Managing the Atom Project, Belfer Center

Antiproliferation: Tackling Proliferation by Engaging the Private Sector

| November 2012


Illicit trade from the international marketplace plays a direct role in sustaining the nuclear and missile programs of several countries, including Iran, in defiance of UN sanctions. This paper sets out what measures the private sector should take in order to manage the legal, financial and reputational risks associated with involvement in proliferation-related trade, and makes recommendations to national authorities for how for how to help the private sector identify and prevent potential proliferation.

A Pakistani Internet user surfs the YouTube Web site at a local Internet cafe in Islamabad, Pakistan, Feb. 26, 2008. Pakistan defended its clampdown on the YouTube Web site which accidentally interrupted access for Internet users around the globe.

AP Photo

Paper - Munk School of Global Affairs, University of Toronto

Duties for Internet Service Providers

| March 2012

In today's interconnected world, the Internet is no longer a tool. Rather, it is a service that helps generate income and employment, provides access to business and information, enables e-learning, and facilitates government activities. It is an essential service that has been integrated into every part of our society. Our experience begins when an Internet Service Provider (ISP) uses fixed telephony (plain old telephone service), mobile-cellular telephony, or fixed fiber-optic or broadband service to connect us to the global network. From that moment on, the ISP shoulders the responsibility for the instantaneous, reliable, and secure movement of our data over the Internet.