Reports & Papers

43 Items

An unaccompanied minor looks up as he waits to answer questions from a U.S. Border Patrol agent at an intake site after he was smuggled on an inflatable raft across the Rio Grande river in Roma, Texas, Wednesday, March 24, 2021. 

AP Photo/Dario Lopez-Mills

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Improving Migrant Child Welfare at the Southwest Border

    Author:
  • Andrew R. Lorenzen-Strait
| February 2023

Policymakers need to act now and place child welfare professionals, not law enforcement actors, at the border to effectively screen and interview migrant children. Information sharing practices need to be improved, with a movement away from paper documents that can easily get lost to an approach that is digital, secure, and accessible by the child, their guardian, their lawyer, and their doctor. Further, the enforcement processing facilities need to undergo an immediate infrastructural transformation with the addition of new design features that are necessary and sensitive to the majority demographic that are held within facilities—children and families.

These actions are doable and require no legislative action. Migrant children deserve decisive action to ensure that their health, safety, and well-being is not jeopardized as they seek refuge in the United States.

Donald Trump and Anthony Fauci

AP/Alex Brandon

Paper - Centre for International Governance Innovation

US Intelligence, the Coronavirus and the Age of Globalized Challenges

| Aug. 24, 2020

This essay makes three arguments. First, the US government will need to establish a coronavirus commission, similar to the 9/11 commission, to determine why, since April 2020, the United States has suffered more coronavirus fatalities than any other country in the world. Second, the COVID-19 pandemic represents a watershed for what will be a major national security theme this century: biological threats, both from naturally occurring pathogens and from synthesized biology. Third, intelligence about globalized challenges, such as pandemics, needs to be dramatically reconceptualized, stripping away outmoded levels of secrecy.

Tractors on Westminster bridge

AP/Matt Dunham

Paper - Institut für Sicherheitspolitik

The Global Order After COVID-19

| 2020

Despite the far-reaching effects of the current pandemic,  the essential nature of world politics will not be transformed. The territorial state will remain the basic building-block of international affairs, nationalism will remain a powerful political force, and the major powers will continue to compete for influence in myriad ways. Global institutions, transnational networks, and assorted non-state actors will still play important roles, of course, but the present crisis will not produce a dramatic and enduring increase in global governance or significantly higher levels of international cooperation. In short, the post-COVID-19 world will be less open, less free, less prosperous, and more competitive than the world many people expected to emerge only a few years ago.

Report - Atlantic Council

The Reverse Cascade: Enforcing Security on the Global IoT Supply Chain

| June 2020

The Internet of Things (IoT) refers to the increasing convergence of the physical and digital worlds and it affects us all. Hundreds of "things" are being connected to the Internet and each other, with more than fifty billion devices expected to be connected by 2030. Many IoT devices are manufactured abroad at low cost with little consideration for security. How can we secure these devices, especially those manufactured outside the United States?

Paper - Carnegie Endowment for International Peace

Russia and Cyber Operations: Challenges and Opportunities for the Next U.S. Administration

| December 13, 2016

Russian cyber operations against the United States aim to both collect information and develop offensive capabilities against future targets. Washington must strengthen its defenses in response.

Panel: What does Brexit mean for Europe's security architecture?

Thomas Lobenwein

Report

Brave new world? What Trump and Brexit mean for European foreign policy

| Dec. 08, 2016

On 24 and 25 November 2016 experts from politics and academia, including FDP Executive director Cathryn Clüver, discussed the impact of Brexit on several policy areas in a series of workshops at the Hertie School of Governance in Berlin. All events took place under Chatham House rules.

Planning for Cyber in the North Atlantic Treaty Organization

US Department of State

Report Chapter - Kosciuszko Institute

Planning for Cyber in the North Atlantic Treaty Organization

| July 08, 2016

While the issue of cyber operations beyond NATO’s own networks is a politically difficult one given the complex mosaic of national, transnational (EU), and international law; the role of national intelligence efforts in certain types of operations; and ever-present disputes over burden-sharing, the Alliance already has invaluable experience in developing policies and procedures for contentious and sensitive tools in the form of the Nuclear Planning Group (NPG). This article begins with a brief overview of actions NATO has already taken to address cyberthreats. It will then explore why these, while important, are insufficient for the present and any imaginable future geopolitical threat environment. Next, it will address the history of the NPG, highlighting some parallels with the present situation regarding cyber and drawing out the challenges faced by, and activities and mechanisms of, the NPG. Finally, it will make the case that a group modeled on the NPG can not only significantly enhance the Alliance’s posture in cyberspace, but can serve as an invaluable space for fostering entente and reconciling differences on key aspects of cyber policy. It concludes that the Alliance needs to consider offensive cyber capabilities and planning, and it needs a Cyber Planning Group to do it.

Discussion Paper - Cyber Security Project, Belfer Center

Government's Role in Vulnerability Disclosure: Creating a Permanent and Accountable Vulnerability Equities Process

| June 2016

"When government agencies discover or purchase zero day vulnerabilities, they confront a dilemma: should the government disclose such vulnerabilities, and thus allow them to be fixed, or should the government retain them for national security purposes?"