Reports & Papers

73 Items

The Arleigh Burke-class guided-missile destroyer USS Dewey (DDG 105), front, and the Independence-variant littoral combat ship USS Gabrielle Giffords (LCS 10), rear, conduct joint operations with the Japan Maritime Self-Defense Force destroyer JS Akebono (DD-108) in the South China Sea

U.S. Navy photo by Aviation Electronics Technician 2nd Class Lucas Herzog

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

Navigating China’s Opportunistic Approach to Overseas Naval Base Acquisition

| November 2023

This report, by Maxwell Simon (MPP '23) and Jayaram Ravi (MPP '23), explores the drivers of setback and success that China has encountered in the process of developing dual-use and military-dedicated naval installations abroad. It looks at cases where China has considered or actively pursued military-dedicated installations to characterize Beijing’s general approach to overseas naval base acquisition.

A computer code is seen on displays in the office of Global Cyber Security Company Group-IB in Moscow, Russia, Wednesday, Oct. 25, 2017. A new strain of malicious software has paralyzed computers at a Ukrainian airport, the Ukrainian capital's subway and at some independent Russian media. Moscow-based Global Cyber Security Company Group-IB said in a statement Wednesday the ransomware called BadRabbit also tried to penetrate the computers of major Russian banks but failed.

AP Photo/Pavel Golovkin

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Addressing Russian and Chinese Cyber Threats: A Transatlantic Perspective on Threats to Ukraine and Beyond

| May 2023

In an interconnected world, cyberattacks are becoming more frequent and sophisticated. Building resilience against this asymmetric threat is critical for countries to protect their economies, critical infrastructure, and democratic institutions. However, cyberattacks do not respect borders, and no country can address this threat alone. The strength and longevity of the transatlantic partnership between the EU and the U.S. presents a unique opportunity to address this strategic threat through international cooperation. Through an analysis of cyberwarfare in the ongoing war in Ukraine, this paper proposes policy recommendations to enhance transatlantic coordination and cooperation against current and future adversaries in a new era of strategic competition. Ultimately, a stronger transatlantic partnership is critical for protecting international democratic norms, building resilience against cyber threats, and strengthening global security and stability.

A worker cleans glass panels of the Bank of China headquarters building near a decoration setup for the Forum on China-Africa Cooperation (FOCAC) in Beijing, Sunday, Aug. 26, 2018. Chinese President Xi Jinping will chair the forum held in the capital city from Sept. 3-4, 2023.

AP Photo/Andy Wong

Paper

China's 21st Century Aspirational Empire

| May 2023

This paper addresses the question of how the Chinese party-state chooses to exercise its economic, financial, diplomatic, military and soft power in the next 25 years will make a great difference to US national security and foreign policy, and to developments in the rest of the world. The paper makes three key points:

The core argument of this paper is that Beijing will likely aspire to pursue an empire-like position globally, not just seek an Asia-Pacific sphere of influence, and that this aspiration will founder. Achieving an empire-like position is both an imperative and is infeasible. The tensions between goal and reality will likely characterize China’s role in the world in coming decades and will be central to the difficulties of US-China relations. Second, there is heuristic value for US policymakers and analysts to consider a 20-year outlook on the rise of China that encompasses China’s pursuit of a global empire-like position. Third, paying close attention to how Beijing organizes its own government, corporate, and non-governmental organizations to seek an empire-like position will provide important signposts emerging tension and trends.

This combination image shows U.S. President Joe Biden in Washington, Nov. 6, 2021, and China's President Xi Jinping in Brasília, Brazil, Nov. 13, 2019.

AP Photo/Alex Brandon, Eraldo Peres

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

The Great Diplomatic Rivalry: China vs the U.S.

This report is not about current U.S. and Chinese diplomatic efforts to meet challenges posed by Putin’s invasion of Ukraine and the ongoing war. Instead, it is an assessment of both nations’ statecraft and diplomacy in addressing the challenges posed by the first 20 years of the 21st century—before Putin invaded Ukraine.

In this June 24, 2020 file photo, soldiers from China's People's Liberation Army march toward Red Square during the Victory Day military parade marking the 75th anniversary of the Nazi defeat in Red Square in Moscow, Russia. Chinese and Russian forces will take part in joint military exercises in southern Russia later in September.

(AP Photo/Alexander Zemlianichenko, File).

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

How the U.S. Can Assist NATO and its European Alliance Members in Addressing the China Security Challenge

| June 2022

Based upon NATO’s new focus and the pending release of the NATO 2030 Strategic Concept, this paper specifically examines the security challenges that China poses to NATO and its alliance members.  It also highlights China’s opposition to democratic principles and its efforts to disrupt the rules-based international order. Finally, the paper identifies possible actions the U.S. can take to help NATO and its alliance members address the China challenge to preserve NATO’s fundamental values of individual liberty, democracy, human rights and the rule of law.

People stand in a line outside a bank in Beirut, Lebanon, amid a financial crisis and a lockdown imposed by the government to help stem the spread of the coronavirus in Lebanon, March 28, 2020.

AP Photo/Zeina Karam

Paper

Reform Chatter and Democracy

    Authors:
  • Simeon Djankov
  • Ha Nguyen
  • Ivan Yotzov
| March 2021

This paper explores the dynamics of media chatter about economic reforms using text analysis from about a billion newspaper articles in 28 languages. The paper shows that the intensity of reform chatter increases during economic downturns. This increase is more significant in democracies. Using instrumental variable techniques, the analysis finds the relationship to be causal. The paper also documents that reform chatter is followed by actual reforms, suggesting that democracies benefit from a “self-correcting” mechanism stemming from changing popular attitudes toward reform. 

Voters mark their ballots during early voting at the Park Slope Armory in Brooklyn, Tuesday, Oct. 27, 2020.

AP Photo/Mary Altaffer

Report - Defending Digital Democracy

Beyond 2020: Policy Recommendations for the Future of Election Security

| February 2021

The 2020 election presents a paradox. Despite dramatic changes to the election process due to the COVID-19 pandemic and increasingly complex threats since the 2016 election, 2020 is widely regarded as “the most secure [election] in American history.” Operationally, it was also one of the smoothest. State and local election officials overcame unprecedented challenges and scarce resources to administer an election with fewer incidents of cyber compromises, technical failures or long lines than anticipated. After Election Day, recount procedures functioned as designed. Yet, amidst these successes, officials from both parties faced a barrage of mis- and disinformation about the election process that served to undermine confidence in the result.

Though the election security ecosystem survived the triple threat of cybersecurity, physical security, and mis- and disinformation in 2020, this success will prove to be hard to replicate in future election cycles without proper investment and reinforcement.

A 10 Squadron AP-3C awaits its crew as the sun rises over RAAF Base Edinburgh, Australia.

Wade Roberts

Paper

Winning Strategic Competition in the Indo-Pacific

| September 2020

The strategic competition in the Indo-Pacific involving the United States, Australia and the Chinese Communist Party (CCP) is arguably the most significant contemporary international relations issue. It spans all aspects of state power: hard, sharp and soft; diplomatic, information, military and economic; and all domains: air, sea, land, space, cyber, technology and innovation. But in their rush to recover ground perceived to be already lost to the CCP, neither the U.S. nor Australia have paused to devote sufficient attention to understanding the nature of strategic competition, to comprehend what winning it actually means, and therefore to grasp how best to approach it. As a result, they both continue to cede the initiative to the CCP, while it continues to compete on the terms most favorable to it.

A staff member in the Kweisi Mfume campaign uses gloves while holding a cell phone during an election night news conference at his campaign headquarters after Mfume, a Democrat, won Maryland’s 7th Congressional District special election, Tuesday, April 28, 2020, in Baltimore.

AP Photo/Julio Cortez

Report

The Election Influence Operations Playbook, Part 1

| September 2020

Influence Operations (IO), also known as Information Operations, are a series of warfare tactics historically used to collect information, influence, or disrupt the decision making of an adversary. IO strategies intentionally disseminate information to manipulate public opinion and/or influence behavior. IO can involve a number of tactics, including spreading false information intentionally. This is known as “disinformation.”   

Skilled influence operations often deliberately spread disinformation in highly public places like social media. This is done in the hope that people who have no connection to the operation will mistakenly share this disinformation. Inaccurate information spread in error without malicious intent is known as “misinformation.” 

This playbook explores mis- and disinformation incidents that specifically focus on elections operations and infrastructure. Election officials may not often see or know what the motivation is behind the incidents encountered or whether they are mis- or disinformation. Throughout these guides we refer to mis/disinformation incidents together, as the strategies for countering or responding to them are the same.