Reports & Papers

12 Items

Donald Trump and Anthony Fauci

AP/Alex Brandon

Paper - Centre for International Governance Innovation

US Intelligence, the Coronavirus and the Age of Globalized Challenges

| Aug. 24, 2020

This essay makes three arguments. First, the US government will need to establish a coronavirus commission, similar to the 9/11 commission, to determine why, since April 2020, the United States has suffered more coronavirus fatalities than any other country in the world. Second, the COVID-19 pandemic represents a watershed for what will be a major national security theme this century: biological threats, both from naturally occurring pathogens and from synthesized biology. Third, intelligence about globalized challenges, such as pandemics, needs to be dramatically reconceptualized, stripping away outmoded levels of secrecy.

Report - Atlantic Council

The Reverse Cascade: Enforcing Security on the Global IoT Supply Chain

| June 2020

The Internet of Things (IoT) refers to the increasing convergence of the physical and digital worlds and it affects us all. Hundreds of "things" are being connected to the Internet and each other, with more than fifty billion devices expected to be connected by 2030. Many IoT devices are manufactured abroad at low cost with little consideration for security. How can we secure these devices, especially those manufactured outside the United States?

Planning for Cyber in the North Atlantic Treaty Organization

US Department of State

Report Chapter - Kosciuszko Institute

Planning for Cyber in the North Atlantic Treaty Organization

| July 08, 2016

While the issue of cyber operations beyond NATO’s own networks is a politically difficult one given the complex mosaic of national, transnational (EU), and international law; the role of national intelligence efforts in certain types of operations; and ever-present disputes over burden-sharing, the Alliance already has invaluable experience in developing policies and procedures for contentious and sensitive tools in the form of the Nuclear Planning Group (NPG). This article begins with a brief overview of actions NATO has already taken to address cyberthreats. It will then explore why these, while important, are insufficient for the present and any imaginable future geopolitical threat environment. Next, it will address the history of the NPG, highlighting some parallels with the present situation regarding cyber and drawing out the challenges faced by, and activities and mechanisms of, the NPG. Finally, it will make the case that a group modeled on the NPG can not only significantly enhance the Alliance’s posture in cyberspace, but can serve as an invaluable space for fostering entente and reconciling differences on key aspects of cyber policy. It concludes that the Alliance needs to consider offensive cyber capabilities and planning, and it needs a Cyber Planning Group to do it.

Taavi Rõivas, Prime Minister of Estonia

Bennett Craig, Belfer Center

Report

Photo Gallery: Estonia's Prime Minister, Taavi Rõivas, On "The 21st Century State"

Apr. 11, 2016

On March 21, The Future of Diplomacy Project jointly hosted a public seminar with the Belfer Center's Cyber Security Project titled "A 21st Century State: Anything is Possible." As the speaker for the public event, Prime Minister of Estonia, TaaviRõivas, spoke at length on the role that digital technology has played in the global competitiveness of Estonia's economy and the robustness of his country's governance and public sector services. The Prime Minister spoke to a large audience comprising of Harvard Kennedy School students, national security fellows, and local Estonian start-up entrepreneurs.

Acting Under Secretary Rose Gottemoeller with P5 Counterparts at the State Department, 2012

US Dept. of State

Paper - Institute for Nuclear Materials Management

International Cooperation to Secure Military Nuclear Materials

| October 7, 2015

"One category of nuclear material that has not yet been adequately addressed throughout recent Nuclear Security Summits is military stockpiles.2 Instead, the Summit process has focused primarily on reducing the risk of civilian nuclear material theft..."

Report - Managing the Atom Project, Belfer Center

Fresh Ideas for the Future: Symposium on the NPT

| April 26, 2015

The abstracts in this booklet summarise the research presented at an academic symposium convened on the sidelines of the 2015 NPT Review Conference. As we write this, journalists and seasoned experts in the nuclear policy field have been speculating about the particularly difficult challenges facing the Review Conference this year. To address those challenges, we would urge all concerned to consider the ideas and analyses presented at this symposium. Experts would be hard-pressed to find a better collection of fresh ideas and approaches for assessing and strengthening the NPT.

The National Nuclear Security Administration’s Pantex Plant is the only U.S. serial  production facility.

NNSA

Report - Nuclear Threat Initiative

Innovating Verification: New Tools & New Actors to Reduce Nuclear Risks

    Author:
  • Verifying Baseline Declarations of Nuclear Warheads and Materials Working Group
| July 2014

Part of NTI's Innovating Verification reports series, Verifying Baseline Declarations of Nuclear Warheads and Materials analyzes how baseline declarations can contribute to near- and long-term arms control and non-proliferation goals and how to verify them without compromising sensitive information.

A Pakistani Internet user surfs the YouTube Web site at a local Internet cafe in Islamabad, Pakistan, Feb. 26, 2008. Pakistan defended its clampdown on the YouTube Web site which accidentally interrupted access for Internet users around the globe.

AP Photo

Paper - Munk School of Global Affairs, University of Toronto

Duties for Internet Service Providers

| March 2012

In today's interconnected world, the Internet is no longer a tool. Rather, it is a service that helps generate income and employment, provides access to business and information, enables e-learning, and facilitates government activities. It is an essential service that has been integrated into every part of our society. Our experience begins when an Internet Service Provider (ISP) uses fixed telephony (plain old telephone service), mobile-cellular telephony, or fixed fiber-optic or broadband service to connect us to the global network. From that moment on, the ISP shoulders the responsibility for the instantaneous, reliable, and secure movement of our data over the Internet.

Discussion Paper - Science, Technology, and Public Policy Program, Belfer Center

WikiLeaks 2010: A Glimpse of the Future?

    Author:
  • Tim Maurer
| August 2011

The recent publications on WikiLeaks reveal a story about money, fame, sex, underground hackers, and betrayal. But it also involves fundamental questions regarding cyber-security and foreign policy. This paper argues WikiLeaks is only the symptom of a new, larger problem which is the result of technological advances that allow a large quantity of data to be 'stolen' at low or no cost by one or more individuals and to be potentially made public and to go 'viral', spreading exponentially online.

The Security of Medical and Industrial Radioactive Sources

Petr Pavelicek/IAEA

Paper - Institute for Nuclear Materials Management

The Security of Medical and Industrial Radioactive Sources

| July 17, 2008

Recent foiled and successful terrorist plots in Europe and the US (including two cases in the UK and Germany which included plans to design radiological dispersal devices in 2004 and 2005), clearly demonstrate that domestic or locally acting terrorist cells have become an important part of the terrorist threat picture. The uncovered “dirty bomb” – plots involved radioactive material of type or quantity that would not have caused much damage. Still, these observations underscore the necessity to revisit the issue of radioactive sources security in countries which may become the target of a radiological attack. This includes in particular countries in Europe, many of which in the past relied on sophisticated — but safety centred — regulations and functioning oversight institutions.