Reports & Papers

32 Items

Report - International Centre for the Study of Radicalisation and Political Violence

Will ‘We Won’ Become ‘Mission Accomplished’? A US Withdrawal and The Scramble for Northeastern Syria

| Dec. 16, 2019

This report charts some of the major developments in northeastern Syria from the December 2018 withdrawal announcement up until the start of Operation Peace Spring on 9 October 2019. It describes and notes the significance of the bitter dispute between Ankara and Washington over a proposed "safe zone," analyses how the Syrian Democratic Forces (SDF) have sought to navigate the crisis and gauges the strength of the so‑called Islamic State (IS) in Syria. Providing this context enables this report to selectively incorporate more limited analysis on the latest and most pertinent developments in northeastern Syria at the time of this writing.

China’s Nuclear Security: Progress, Challenges, and Next Steps

REUTERS/Kim Kyung-Hoon

Report - Managing the Atom Project, Belfer Center

China’s Nuclear Security: Progress, Challenges, and Next Steps

| March 28, 2016

In a new report from the Project on Managing the Atom, Senior Research Associate Hui Zhang finds that China has made important nuclear security improvements in areas ranging from its legal framework, to its approaches to physical protection and material accounting, to bolstering nuclear security culture. But China also faces ongoing threats. The possibility of insider theft of nuclear materials in China cannot be ruled out, espe­cially as China increasingly grows into a market-oriented society contending with corruption. Zhang also notes that Beijing faces a growing terrorism threat from separatists in China’s autonomous Xinjiang region.

Report - Middle East Initiative, Belfer Center

The Crisis of the Arab State

August 11, 2015

During the spring 2015 semester, Professor Michael C. Hudson assembled eight leading Middle East scholars under the auspices of the Middle East Initiative at the Belfer Center for Science and International Affairs to participate in a study group titled Rethinking the Arab State: the Collapse of Legitimacy in Arab Politics. Over the course of the semester these experts used a variety of interdisciplinary approaches to  analyze the crisis of legitimacy of the Arab state in the wake of the 2011 uprisings.

Report - Managing the Atom Project, Belfer Center

Advancing Nuclear Security: Evaluating Progress and Setting New Goals

In the lead-up to the nuclear security summit, Advancing Nuclear Security: Evaluating Progress and Setting New Goals outlines what was accomplished in a four-year effort launched in 2009 to secure nuclear material around the globe—and what remains to be done. The effort made significant progress, but some weapons-usable nuclear materials still remain “dangerously vulnerable." The authors highlight the continuing danger of nuclear and radiological terrorism and call for urgent action.

Armed guards and police protecting a spent fuel convoy while at a stopping point.

Ministry of Public Security (Ch)

Report - Managing the Atom Project, Belfer Center

Securing China's Nuclear Future

| March 14, 2014

China’s approach to strengthening the security of its nuclear weapons, materials, and facilities plays an important role in facilitating strong global action on nuclear security. This report provides a better understanding of Chinese perceptions of the threat of nuclear terrorism and attitudes toward the nuclear security challenge; describes the current status of nuclear security practices in China and of planned improvements in rules and organization, management, and technologies; and recommends steps for further improvements.

Discussion Paper - Managing the Atom Project, Belfer Center

Beyond Nuclear Summitry: The Role of the IAEA in Nuclear Security Diplomacy After 2016

| March 11, 2014

There has been much speculation as to what might replace the Nuclear Security Summits after 2016. One candidate touted as a suitable inheritor of the summits’ mantle is the International Atomic Energy Agency. In this discussion paper, Trevor Findlay examines whether and to what extent the IAEA could and should do so, what form its role might take, and how the Agency and summiteers might prepare for such an eventuality.

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Steps to Prevent Nuclear Terrorism

| October 2, 2013

The 2011 “U.S. - Russia Joint Threat Assessment” offered both specific conclusions about the nature of the threat and general observations about how it might be addressed. This report builds on that foundation and analyzes the existing framework for action, cites gaps and deficiencies, and makes specific recommendations for improvement.

Report - Managing the Atom Project, Belfer Center

Plutonium Mountain: Inside the 17-Year Mission to Secure a Legacy of Soviet Nuclear Testing

| August 15, 2013

The Belfer Center’s Eben Harrell and Pulitzer Prize-winning author David E. Hoffman for the first time report the details of one of the largest nuclear security operations of the post-Cold War years — a  secret 17-year, $150 million operation to secure plutonium in the tunnels of Degelen Mountain.

Report - Chatham House

Iraq Ten Years On

    Editors:
  • Claire Spencer
  • Jane Kinninmont
  • Omar Sirri
| May 2013

This report brings together a variety of perspectives on the state of Iraq ten years after the US-led invasion in 2003 and sets out some possible scenarios for the country's future.

Delay barriers at the U.S. National Nuclear Security Administration's Y‐12 facility

NNSA Production Office

Discussion Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Defining and Implementing Best Practices in Nuclear Security

| Dec. 14, 2012

This paper analyzes the contribution that best practices can make to the field of nuclear security by doing the following:

  • Defining what is meant by best practice
  • Specifying a methodology for deriving it
  • Understanding the resulting characteristics of the method
  • Comparing its pros and cons to other methods contributing to security, such as guidelines and regulations