Reports & Papers

34 Items

Report - Atlantic Council

The Reverse Cascade: Enforcing Security on the Global IoT Supply Chain

| June 2020

The Internet of Things (IoT) refers to the increasing convergence of the physical and digital worlds and it affects us all. Hundreds of "things" are being connected to the Internet and each other, with more than fifty billion devices expected to be connected by 2030. Many IoT devices are manufactured abroad at low cost with little consideration for security. How can we secure these devices, especially those manufactured outside the United States?

teaser image

Paper

The Case for Transatlantic Cooperation in the Indo-Pacific

| Dec. 18, 2019

The evolving strategic dynamics in the Indo-Pacific are of paramount importance for the future of the rules-based international order. While the United States is redirecting strategic focus to the region as part of its Free and Open Indo-Pacific strategy, Europe is also stepping up its role—leveraging a strong economic profile, long-standing bilateral ties, and active engagement in various regional multilateral forums. The European Union (EU) and its member states can make distinct contributions to an open, transparent, inclusive, and rules-based regional order, though not necessarily always in lockstep with Washington.

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Attacking Artificial Intelligence: AI’s Security Vulnerability and What Policymakers Can Do About It

| August 2019

The terrorist of the 21st century will not necessarily need bombs, uranium, or biological weapons. He will need only electrical tape and a good pair of walking shoes. Placing a few small pieces of tape inconspicuously on a stop sign at an intersection, he can magically transform the stop sign into a green light in the eyes of a self-driving car. Done at one sleepy intersection, this would cause an accident. Done at the largest intersections in leading metropolitan areas, it would bring the transportation system to its knees. It’s hard to argue with that type of return on a $1.50 investment in tape.

Tokyo at night

Flickr / Agustin Rafael Reyes

Paper - London School of Economics

Global Review of Finance For Sustainable Urban Infrastructure

    Authors:
  • Graham Floater
  • Dan Dowling
  • Denise Chan
  • Matthew Ulterino
  • Tim McMinn
  • Ehtisham Ahmad
| December 2017

This paper is a background review representing part of the initial phase of the Financing the Urban Transition work program. The review builds on a growing body of research that highlights both the importance of national sustainable infrastructure and the need to develop more effective and efficient financing mechanisms for delivering compact, connected cities that meet the UN’s Sustainable Development Goals. While progress has been made in both these areas over the last five years, there remains a policy gap between the international/national level and the municipal level.

Paper - Cyber Security Project, Belfer Center

Too Connected to Fail

| May 2017

This paper argues that threats to core internet infrastructure and services can, in fact, rise to the level of a serious national security threat to the United States and will explore scenarios where this may be the case. The paper will discuss several kinds of core internet services and infrastructure and explore the challenges with understanding interdependencies between the internet and critical infrastructure; review recent attack techniques that can cause systemic risk to the internet; discuss various nation state capabilities, intentions and recent activities in this area; and describe how these attacks could be used against the United States to deter the U.S., control escalation, or potentially degrade U.S. warfighting capabilities in a conflict. Finally, the paper concludes with recommendations for what the United States and other governments can do to build defenses and resiliency against systemic threats to the internet.

Paper - Centre for International Governance Innovation

Getting beyond Norms: When Violating the Agreement Becomes Customary Practice

| Apr. 20, 2017

This paper offers five standards of care that can be used to test individual states' true commitment to the international norms of behaviour. Only with a concerted and coordinated effort across the global community will it be possible to change the new normal of "anything goes" and move forward to ensure the future safety and security of the Internet and Internet-based infrastructures.

Paper - Carnegie Endowment for International Peace

Russia and Cyber Operations: Challenges and Opportunities for the Next U.S. Administration

| December 13, 2016

Russian cyber operations against the United States aim to both collect information and develop offensive capabilities against future targets. Washington must strengthen its defenses in response.

Discussion Paper - Cyber Security Project, Belfer Center

Government's Role in Vulnerability Disclosure: Creating a Permanent and Accountable Vulnerability Equities Process

| June 2016

"When government agencies discover or purchase zero day vulnerabilities, they confront a dilemma: should the government disclose such vulnerabilities, and thus allow them to be fixed, or should the government retain them for national security purposes?"