Reports & Papers

257 Items

Report - CNA's Center for Naval Analyses

Russia and the Global Nuclear Order

| March 2024

Russia's 2022 invasion of Ukraine illuminated the long profound shadow of nuclear weapons over international security. Russia's nuclear threats have rightfully garnered significant attention because of the unfathomable lethality of nuclear weapons. However, the use of such weapons in Ukraine is only one way—albeit the gravest— that Russia could challenge the global nuclear order. Russia's influence extends deep into the very fabric of this order—a system to which it is inextricably bound by Moscow's position in cornerstone institutions such as the Nuclear Non-Proliferation Treaty (NPT) and the International Atomic Energy Agency (IAEA). From withdrawing from key treaties to stymieing resolutions critical of misconduct, Moscow has demonstrated its ability to challenge the legitimacy, relevance, and interpretations of numerous standards and principles espoused by the West.

guns and missiles burst forth from a laptop screen

Adobe Stock

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Guns, Incels, and Algorithms: Where We Are on Managing Terrorist and Violent Extremist Content Online

| June 12, 2023

Technology companies and governments have spent the past decade trying to better address the evolving threat of terrorist and violent extremist content online (TVEC). This paper examines how effective these efforts have been, where we are today in managing the problem, and wherein lie gaps for improvement.

A computer code is seen on displays in the office of Global Cyber Security Company Group-IB in Moscow, Russia, Wednesday, Oct. 25, 2017. A new strain of malicious software has paralyzed computers at a Ukrainian airport, the Ukrainian capital's subway and at some independent Russian media. Moscow-based Global Cyber Security Company Group-IB said in a statement Wednesday the ransomware called BadRabbit also tried to penetrate the computers of major Russian banks but failed.

AP Photo/Pavel Golovkin

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Addressing Russian and Chinese Cyber Threats: A Transatlantic Perspective on Threats to Ukraine and Beyond

| May 2023

In an interconnected world, cyberattacks are becoming more frequent and sophisticated. Building resilience against this asymmetric threat is critical for countries to protect their economies, critical infrastructure, and democratic institutions. However, cyberattacks do not respect borders, and no country can address this threat alone. The strength and longevity of the transatlantic partnership between the EU and the U.S. presents a unique opportunity to address this strategic threat through international cooperation. Through an analysis of cyberwarfare in the ongoing war in Ukraine, this paper proposes policy recommendations to enhance transatlantic coordination and cooperation against current and future adversaries in a new era of strategic competition. Ultimately, a stronger transatlantic partnership is critical for protecting international democratic norms, building resilience against cyber threats, and strengthening global security and stability.

Earth represented by binary code and lines

Getty Images

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Reach, Choice, and Transparency: Governing the Internet in the 21st Century

| May 2023

As inventions go, the Internet stacks up with the best of them: the lightbulb, the automobile, even fire. In its first thirty years, the Internet’s worldwide adoption and breadth of application has exceeded any other technological advance in history. It expands our reach by bringing people, experiences, and things to us with the click of a mouse. It connects us to an increasing number of gadgets, from smartphones to voice kiosks and soon self-driving vehicles that will no doubt converse with us while we commute, happily oblivious to the traffic around us. We revel in our newfound agility and versatility. Importantly, our precious network kept us sane during a worldwide pandemic and enabled the world to work remotely while most of its population was frozen at home. For resilience against catastrophes alone, the Internet has become indispensable.

A person on the left bends to take pictures of a drone showcased on a platform on the right.

AP Photo/Joe Buglewicz

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Buying What Works: An Acquisitions Strategy for the Reality of Dual-Use Technologies

| October 2022

In this student research paper, Harvard Kennedy School student Coen Williams finds that  The Department of Defense should implement an “effects-driven” acquisitions system rather than “capabilities-based” to effectively acquire and utilize commercially developed capabilities. An effects-driven acquisitions system will increase the diversity of solutions, and by appropriating money to effects-driven portfolios, Congress can still maintain control of the purse while the Department of Defense can more effectively allocate its appropriated funds.

Tomas Roggero via Flickr

Tomas Roggero via Flickr

Report Chapter - Women’s International League for Peace and Freedom

Assuring Destruction Forever: 2022 Edition

| January 2022

Under the guidance of its self-defence nuclear strategy, China will continue to modernise its nuclear force in order to maintain a reliable second-strike retaliatory capability. China’s nuclear weapon modernisation has been responsive to the advances of military capabilities of other countries, particularly the US. As Hu Side emphasised, “The sole purpose for China to maintain a limited nuclear counterattack force is to deter a potential nuclear strike. However, the development of US missile defense and the long-rang strike capability with high accuracy to target mobile missiles is in practice to decrease the effectiveness of Chinese nuclear deterrence. Thus, it surely leads to Chinese attention."

YJ-18 missiles on display (Salah Rashad Zaqzoq/Wikimedia Commons).

Salah Rashad Zaqzoq/Wikimedia Commons

Report Chapter - International Network of Engineers and Scientists for Global Responsibility

China's Nuclear Weapons Strategy and Modernization Program

| Fall 2021

Recently published documents, news reports, and other sources of open source information indicate that China is accelerating its current nuclear force modernization programme. It is clear that it is driven largely in response to the growing United States (U.S.) missile defense program, which China perceives as a threat to its minimum credible deterrence. While China is not altering its nuclear doctrine, it believes that it needs to enhance the reliability, survivability, and effectiveness of its retaliatory capability in response to a first-strike. In addition to expanding the size of its nuclear arsenal, it is enhancing its delivery capabilities, for example, by increasing the number of ICBMs and making them more sophisticated. It is building more Multiple Independently Targetable Reentry Vehicle (MIRV) warheads as well as a new class of ballistic missile submarines. China’s ongoing nuclear modernization aims to increase the survivability, reliability, safety, and penetration capability of its small nuclear arsenal and thereby assures a limited, reliable, and effective counterattack capability that will deter a nuclear first-strike. China’s nuclear modernization program will likely continue to be guided by its nuclear policy, which is characterized by a no-first-use pledge and a commitment to “minimum nuclear deterrence.” Finally, while China supports the total elimination of nuclear weapons, it does not believe it is in China’s interest to participate in discussions about nuclear disarmament until the U.S. and Russia reduce their arsenals to one thousand each, or lower.

A miniature of “The War Room” as depicted in the 1964 classic film Dr. Strangelove

Courtesy Eric Chan  and the Los Angeles County Museum of Art, CC-BY 2.0

Paper

Toward a Collaborative Cyber Defense and Enhanced Threat Intelligence Structure

| August 2021

National security structures envisioned in the 20th century are inadequate for the cyber threats that America faces in the 21st century. These structures, created to address strategic, external threats on one end, and homeland security emergencies on the other, cannot protect us from ambient cyber conflict, because they were designed for different times and threats. Our nation—comprising the federal government, private sector companies, critical infrastructure operators, state and local governments, nonprofits and universities, and even private citizens—are constantly under attack by a myriad of cyber actors with ever-increasing capabilities. 

A missile on display during a military parade in Moscow's Red Square in 2016.

Wikimedia Commons

Report Chapter - American Academy of Arts & Sciences

The Rise and Decline of Global Nuclear Order?

| April 2021

The first half century of the nuclear age witnessed the gradual construction of a global nuclear order designed to mitigate nuclear dangers, inhibit arms racing, and prevent the spread of nuclear weapons to additional states. Spurred by the experiences, the dangers, the crises, the near misses, and the frightening risks on display in the early years of the Cold War, sustained efforts were made, in McGeorge Bundy’s vivid phrase, “to cap the volcano.” The time had arrived, Bundy wrote in 1969, for the two great nuclear superpowers “to limit their extravagant contest in strategic weapons,” a contest that had “led the two greatest powers of our generation into an arms race totally unprecedented in size and danger.” In the subsequent twenty-five years after Bundy’s appeal, an increasingly elaborate and institutionalized arms control process produced, with many ups and downs, a detailed web of constraints on the nuclear behavior of the superpowers. The articulated goal was to stabilize the superpower nuclear balance by reinforcing mutual deterrence. The vast nuclear arsenals of the superpowers, however, were not the only source of nuclear danger. In a world in which the number of states armed with nuclear weapons was slowly growing and many additional states had interest in acquiring such weapons or the technology to produce them, there was reason, as Albert Wohlstetter warned in 1961, to be “concerned with the enormous instabilities and dangers of a world with many nuclear powers.” Such a world—“life in a nuclear armed crowd”—Wohlstetter wrote in a later famous study, was widely believed to be “vastly more dangerous than today’s world.” The desire to prevent this unattractive world led to the negotiation of the Nuclear Nonproliferation Treaty (NPT), which entered into force in 1970, and to the subsequent development of an associated regime intended to create legal and technical barriers to the spread of nuclear weapons. Thus, in reaction to the major perceived dangers of the nuclear age, there emerged what Lawrence Freedman calls the “twin pillars” of the global nuclear order: mutual stability in the major nuclear rivalry and nonproliferation to inhibit or prevent the spread of nuclear weapons to additional states.

Voters mark their ballots during early voting at the Park Slope Armory in Brooklyn, Tuesday, Oct. 27, 2020.

AP Photo/Mary Altaffer

Report - Defending Digital Democracy

Beyond 2020: Policy Recommendations for the Future of Election Security

| February 2021

The 2020 election presents a paradox. Despite dramatic changes to the election process due to the COVID-19 pandemic and increasingly complex threats since the 2016 election, 2020 is widely regarded as “the most secure [election] in American history.” Operationally, it was also one of the smoothest. State and local election officials overcame unprecedented challenges and scarce resources to administer an election with fewer incidents of cyber compromises, technical failures or long lines than anticipated. After Election Day, recount procedures functioned as designed. Yet, amidst these successes, officials from both parties faced a barrage of mis- and disinformation about the election process that served to undermine confidence in the result.

Though the election security ecosystem survived the triple threat of cybersecurity, physical security, and mis- and disinformation in 2020, this success will prove to be hard to replicate in future election cycles without proper investment and reinforcement.