Reports & Papers

17 Items

Ilham Aliyev received OSCE Minsк Group co-chairs, February 2019

The Presidential Press and Information Office's of Azerbaijan

Report

OSCE Minsk Group: Lessons from the Past and Tasks for the Future

| Fall 2020

The international community, acting through the OSCE Minsk Group, has been unable to induce the leaders of Armenia and Azerbaijan to resolve the Karabakh conflict, which began in 1988 and burst into a new round of fighting in September 2020. Leaders and populations on both sides had become increasingly maximalist; any leader willing to compromise could be branded a traitor. The 2020 fighting drastically changed facts on the ground. With Turkey’s assistance, Azerbaijan recovered much of the land it lost a generation previously. But Azerbaijan was compelled to permit Russia to deploy a large peacekeeping force, something it had resisted for 25 years. While its authority is diminished, the Minsk Group can play a role going forward in restoring confidence and communication between the sides, opening borders, and ultimately leading negotiations on the future status of the region.

Donald Trump and Anthony Fauci

AP/Alex Brandon

Paper - Centre for International Governance Innovation

US Intelligence, the Coronavirus and the Age of Globalized Challenges

| Aug. 24, 2020

This essay makes three arguments. First, the US government will need to establish a coronavirus commission, similar to the 9/11 commission, to determine why, since April 2020, the United States has suffered more coronavirus fatalities than any other country in the world. Second, the COVID-19 pandemic represents a watershed for what will be a major national security theme this century: biological threats, both from naturally occurring pathogens and from synthesized biology. Third, intelligence about globalized challenges, such as pandemics, needs to be dramatically reconceptualized, stripping away outmoded levels of secrecy.

Paper - Potomac Institute for Policy Studies

Cyber Readiness Index 2.0

    Authors:
  • Chris Demchak
  • Jason Kerben
  • Jennifer McArdle
  • Francesca Spidalieri
| November 30, 2015

"Building on CRI 1.0, Cyber Readiness Index 2.0 examines one hundred twenty-five countries that have embraced, or are starting to embrace, ICT and the Internet and then applies an objective methodology to evaluate each country's maturity and commitment to cyber security across seven essential elements."

Report

Challenges to U.S. Global Leadership

In a Harvard Kennedy School IDEASpHERE session titled "Challenges to US Global Leadership," Graham Allison, Nicholas Burns, David Gergen, David Ignatius, and Meghan O’Sullivan discussed challenges as well as opportunities facing the United States. Burns moderated the session.

Challenges include the rise of China and the future of the U.S.-China relationship, the crises taking place around the world, and the reputation of the U.S. worldwide. An unexpected opportunity is the increase in available energy sources in the United States.

Paper - American Academy of Arts & Sciences

A Worst Practices Guide to Insider Threats: Lessons from Past Mistakes

| April 2014

Insider threats are perhaps the most serious challenges that nuclear security systems face. Insiders perpetrate a large fraction of thefts from heavily guarded non-nuclear facilities as well, yet organizations often find it difficult to understand and protect against insider threats. Why is this the case? Part of the answer is that there are deep organizational and cognitive biases that lead managers to downplay the threats insiders pose to their nuclear facilities and operations. But another part of the answer is that those managing nuclear security often have limited information about incidents that have happened in other countries or in other industries, and the lessons that might be learned from them.

Paper

Strengthening Global Approaches To Nuclear Security

| July 1, 2013

Despite substantial progress in improving nuclear security in recent years, there is more to be done.  The threats of nuclear theft and terrorism remain very real.  This paper recommends learning from the much stronger national and international efforts in nuclear safety, and in particular taking steps to build international understanding of the threat; establish effective performance objectives; assure performance; train and certify needed personnel; build security culture and exchange best practices; reduce the number of sites that need to be protected; and strengthen the international framework and continue the dialogue once leaders are no longer meeting regularly at the summit level.

This undated handout photo provided by the National Nuclear Security Administration shows the United States' last B53 nuclear bomb. The 10,000-pound bomb was scheduled to be dismantled Oct. 25, 2011 at the Pantex Plant just outside Amarillo, Texas.

AP Photo

Paper

Safe, Secure and Effective Nuclear Operations in the Nuclear Zero Era

| April 2012

Without significant change in the geopolitical landscape, nuclear weapons will remain a relevant portion of America's long-term national security strategy. Therefore, the burdens and responsibilities of maintaining an effective nuclear deterrent force are paramount to ensure credibility for America and her allies. Bottom line: nuclear weapons and nuclear deterrence are still relevant today and for the foreseeable future. Therefore, to maintian international strategic stability we must embrace the necessity of nuclear deterrence, develop strategic policy that supports deterrence as an essential element and adequately resource the enterprise.

Paper

The Need for the Next Special Operations Forces' Mobility Aircraft

| June 2012

The proliferation of threat systems and Anti-Access, Area Denial (A2/AD) strategies make performing special operations forces' (SOF) air mobility missions increasingly complicated and limit the capability to defeat air defenses and penetrate into denied airspace. Combined with an aging inventory, ill suited to evading these threats, Air Force Special Operations Command (AFSOC) and the United States Special Operations Command (USSOCOM) must look to technology to defeat the more modern threat systems and anti-access strategies. The best answer to penetrate future, denied regions is in stealth or low observable (LO) technology.

Employees of the National Security Agency sit in the Threat Operations Center on Jan. 25, 2006, in Fort Meade, Md. The government issued an alert Nov. 30, 2006 to U.S. stock market and banking Web sites about a possible Internet attack.

AP Photo

Discussion Paper

Strategic Advantage: Why America Should Care About Cybersecurity

| October 2009

The internet is an interconnected series of networks--where it is difficult to determine where private security threats end and public ones begin.  These networks deliver power and water to our households and businesses, enable us to access our bank accounts from almost any city in the world, and transform the way our doctors provide healthcare.  For all of these reasons, we need a safe Internet with a strong network infrastructure.