Reports & Papers

23 Items

U.S. and UK flags

Alex Brandon | AP

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

Forging a Democratic Decision Advantage

| October 2023

2023 marked eighty years since the wartime adoption of the BRUSA Agreement between Great Britain and the United States. This 1943 document codified the growing relationship between U.S. and U.K. signals intelligence organizations and included policies governing the exchange of personnel and joint regulations for handling sensitive material. Security directives and protocols aligned operational processes between the democratic governments, setting new cooperative standards for nation-states battling authoritarian regimes.

Donald Trump and Anthony Fauci

AP/Alex Brandon

Paper - Centre for International Governance Innovation

US Intelligence, the Coronavirus and the Age of Globalized Challenges

| Aug. 24, 2020

This essay makes three arguments. First, the US government will need to establish a coronavirus commission, similar to the 9/11 commission, to determine why, since April 2020, the United States has suffered more coronavirus fatalities than any other country in the world. Second, the COVID-19 pandemic represents a watershed for what will be a major national security theme this century: biological threats, both from naturally occurring pathogens and from synthesized biology. Third, intelligence about globalized challenges, such as pandemics, needs to be dramatically reconceptualized, stripping away outmoded levels of secrecy.

A representative image of a digital "map"

Adobe Stock

Report

Reconceptualizing Cyber Power

Our intention is to provide the best possible understanding of cyber power capabilities to inform public debate. The Belfer approach proposes eight objectives that countries pursue using cyber means; provides a list of capabilities required to achieve those objectives that demonstrates the breadth of sources of cyber power; and compares countries based on their capability to achieve those objectives. Our work builds on existing cyber indices such as the Economist Intelligence Unit and Booz Allen Hamilton’s 2011 Cyber Power Ranking, by, for example, including a policy dimension and recognizing that cyber capabilities enhance military strength.

Discussion Paper - Cyber Security Project, Belfer Center

Government's Role in Vulnerability Disclosure: Creating a Permanent and Accountable Vulnerability Equities Process

| June 2016

"When government agencies discover or purchase zero day vulnerabilities, they confront a dilemma: should the government disclose such vulnerabilities, and thus allow them to be fixed, or should the government retain them for national security purposes?"

Report - Managing the Atom Project, Belfer Center

Fresh Ideas for the Future: Symposium on the NPT

| April 26, 2015

The abstracts in this booklet summarise the research presented at an academic symposium convened on the sidelines of the 2015 NPT Review Conference. As we write this, journalists and seasoned experts in the nuclear policy field have been speculating about the particularly difficult challenges facing the Review Conference this year. To address those challenges, we would urge all concerned to consider the ideas and analyses presented at this symposium. Experts would be hard-pressed to find a better collection of fresh ideas and approaches for assessing and strengthening the NPT.

Paper - American Academy of Arts & Sciences

A Worst Practices Guide to Insider Threats: Lessons from Past Mistakes

| April 2014

Insider threats are perhaps the most serious challenges that nuclear security systems face. Insiders perpetrate a large fraction of thefts from heavily guarded non-nuclear facilities as well, yet organizations often find it difficult to understand and protect against insider threats. Why is this the case? Part of the answer is that there are deep organizational and cognitive biases that lead managers to downplay the threats insiders pose to their nuclear facilities and operations. But another part of the answer is that those managing nuclear security often have limited information about incidents that have happened in other countries or in other industries, and the lessons that might be learned from them.

Report - Managing the Atom Project, Belfer Center

Advancing Nuclear Security: Evaluating Progress and Setting New Goals

In the lead-up to the nuclear security summit, Advancing Nuclear Security: Evaluating Progress and Setting New Goals outlines what was accomplished in a four-year effort launched in 2009 to secure nuclear material around the globe—and what remains to be done. The effort made significant progress, but some weapons-usable nuclear materials still remain “dangerously vulnerable." The authors highlight the continuing danger of nuclear and radiological terrorism and call for urgent action.

This undated handout photo provided by the National Nuclear Security Administration shows the United States' last B53 nuclear bomb. The 10,000-pound bomb was scheduled to be dismantled Oct. 25, 2011 at the Pantex Plant just outside Amarillo, Texas.

AP Photo

Paper

Safe, Secure and Effective Nuclear Operations in the Nuclear Zero Era

| April 2012

Without significant change in the geopolitical landscape, nuclear weapons will remain a relevant portion of America's long-term national security strategy. Therefore, the burdens and responsibilities of maintaining an effective nuclear deterrent force are paramount to ensure credibility for America and her allies. Bottom line: nuclear weapons and nuclear deterrence are still relevant today and for the foreseeable future. Therefore, to maintian international strategic stability we must embrace the necessity of nuclear deterrence, develop strategic policy that supports deterrence as an essential element and adequately resource the enterprise.

Report - Centre for International Governance Innovation

Unleashing the Nuclear Watchdog: Strengthening and Reform of the IAEA

| June 2012

This report marks the culmination of a two-year research project that examined all aspects of the mandate and operations of the International Atomic Energy Agency, from major programs on safeguards, safety, security, and the peaceful uses of nuclear energy to governance, management, and finance.

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Cyber Power

| May 2010

Power depends upon context, and the rapid growth of cyber space is an important new context in world politics. The low price of entry, anonymity, and asymmetries in vulnerability means that smaller actors have more capacity to exercise hard and soft power in cyberspace than in many more traditional domains of world politics. The largest powers are unlikely to be able to dominate this domain as much as they have others like sea or air. But cyberspace also illustrates the point that diffusion of power does not mean equality of power or the replacement of governments as the most powerful actors in world politics.