Reports & Papers

18 Items

Paper - Potomac Institute for Policy Studies

Cyber Readiness Index 2.0

    Authors:
  • Chris Demchak
  • Jason Kerben
  • Jennifer McArdle
  • Francesca Spidalieri
| November 30, 2015

"Building on CRI 1.0, Cyber Readiness Index 2.0 examines one hundred twenty-five countries that have embraced, or are starting to embrace, ICT and the Internet and then applies an objective methodology to evaluate each country's maturity and commitment to cyber security across seven essential elements."

Soldiers quickly march to the ramp of the CH-47 Chinook helicopter that will return them to Kandahar Army Air Field on Sept. 4, 2003. The Soldiers were searching in Daychopan district, Afghanistan, for Taliban fighters and illegal weapons caches.

U.S. Army Photo

Report - New America Foundation

Strategic Empathy: The Afghanistan Intervention Shows Why the U.S. Must Empathize with its Adversaries

| April 2014

"...[H]ow did such vast and sustained investments not deliver a more favorable outcome? Conditions were undoubtedly challenging, but most observers — and indeed U.S. officials — agree that major mistakes were made....But the most egregious error of the United States was to pursue a strategy founded on a misreading of its enemy."

Paper - American Academy of Arts & Sciences

A Worst Practices Guide to Insider Threats: Lessons from Past Mistakes

| April 2014

Insider threats are perhaps the most serious challenges that nuclear security systems face. Insiders perpetrate a large fraction of thefts from heavily guarded non-nuclear facilities as well, yet organizations often find it difficult to understand and protect against insider threats. Why is this the case? Part of the answer is that there are deep organizational and cognitive biases that lead managers to downplay the threats insiders pose to their nuclear facilities and operations. But another part of the answer is that those managing nuclear security often have limited information about incidents that have happened in other countries or in other industries, and the lessons that might be learned from them.

Paper

Strengthening Global Approaches To Nuclear Security

| July 1, 2013

Despite substantial progress in improving nuclear security in recent years, there is more to be done.  The threats of nuclear theft and terrorism remain very real.  This paper recommends learning from the much stronger national and international efforts in nuclear safety, and in particular taking steps to build international understanding of the threat; establish effective performance objectives; assure performance; train and certify needed personnel; build security culture and exchange best practices; reduce the number of sites that need to be protected; and strengthen the international framework and continue the dialogue once leaders are no longer meeting regularly at the summit level.

This undated handout photo provided by the National Nuclear Security Administration shows the United States' last B53 nuclear bomb. The 10,000-pound bomb was scheduled to be dismantled Oct. 25, 2011 at the Pantex Plant just outside Amarillo, Texas.

AP Photo

Paper

Safe, Secure and Effective Nuclear Operations in the Nuclear Zero Era

| April 2012

Without significant change in the geopolitical landscape, nuclear weapons will remain a relevant portion of America's long-term national security strategy. Therefore, the burdens and responsibilities of maintaining an effective nuclear deterrent force are paramount to ensure credibility for America and her allies. Bottom line: nuclear weapons and nuclear deterrence are still relevant today and for the foreseeable future. Therefore, to maintian international strategic stability we must embrace the necessity of nuclear deterrence, develop strategic policy that supports deterrence as an essential element and adequately resource the enterprise.

Paper

The Need for the Next Special Operations Forces' Mobility Aircraft

| June 2012

The proliferation of threat systems and Anti-Access, Area Denial (A2/AD) strategies make performing special operations forces' (SOF) air mobility missions increasingly complicated and limit the capability to defeat air defenses and penetrate into denied airspace. Combined with an aging inventory, ill suited to evading these threats, Air Force Special Operations Command (AFSOC) and the United States Special Operations Command (USSOCOM) must look to technology to defeat the more modern threat systems and anti-access strategies. The best answer to penetrate future, denied regions is in stealth or low observable (LO) technology.

Discussion Paper - Science, Technology, and Public Policy Program, Belfer Center

Cyber Norm Emergence at the United Nations—An Analysis of the UN's Activities Regarding Cyber-security

    Author:
  • Tim Maurer
| September 2011

Cyber-warfare is no longer science fiction and the debate among policy-makers on what norms will guide behavior in cyber-space is in full swing. The United Nations (UN) is one of the fora where this debate is taking place exhibiting an astonishing rate of norm emergence in cyber-space. Most recently, Russia together with China proposed an “International code of conduct for information security” in September 2011 after the U.S. reversed its long-standing policy position in 2010.

Norton Cybercrime Index

AP Photo

Paper - Science, Technology, and Public Policy Program, Belfer Center

Taking a Byte Out of Cybercrime

| October 2011

"Cybersecurity is a means to enable social stability and promote digital democracy; a method by which to govern the Internet; and a process by which to secure critical infrastructure from cybercrime, cyberespionage, cyberterrorism and cyberwar. As nations and corporations recognize their dependence on ICT, policymakers must find the proper balance in protecting their investments without strangling future growth."

Pakistani police officers escort an armored car carrying Mumtaz Qadri, the alleged killer of Punjab governor Salman Taseer, to an Anti-Terrorist Court in Rawalpindi, Pakistan, Jan. 6, 2011.

AP Photo

Report - United States Institute of Peace

Reforming Pakistan's Police and Law Enforcement Infrastructure: Is It Too Flawed to Fix?

| February 2011

An effective police force is critical to countering insurgency. In Pakistan, an understaffed and underequipped police force is increasingly called on to manage rising insecurity and militant violence. This report evaluates the obstacles to upgrading the existing police system and recommends traditional and innovative reform options, including major restructuring of the total civilian law enforcement infrastructure, without which the police force cannot be effectively improved.

Nov. 17, 2009: Pakistani army troops patrol in a damaged market in Sararogha, in the Pakistani tribal region of South Waziristan along the Afghan border.

AP Photo

Report - Century Foundation

Militancy in Pakistan's Borderlands: Implications for the Nation and for Afghan Policy

| 2010

This paper provides a critical perspective on past Pakistani policy toward jihadist militant groups, the growth of their influence in Federally Administered Tribal Areas (FATA) and Kyber Pukhtunkhwa Province (KPP), and what steps need to be taken in order to reverse their momentum. Abbas argues that Pakistan's civilian and military leadership will have to transition from a short-term strategy of deal-making and army offensives to a long-term political solution that will erode the gains made by militant groups in these areas since 2002.