Reports & Papers

28 Items

A computer code is seen on displays in the office of Global Cyber Security Company Group-IB in Moscow, Russia, Wednesday, Oct. 25, 2017. A new strain of malicious software has paralyzed computers at a Ukrainian airport, the Ukrainian capital's subway and at some independent Russian media. Moscow-based Global Cyber Security Company Group-IB said in a statement Wednesday the ransomware called BadRabbit also tried to penetrate the computers of major Russian banks but failed.

AP Photo/Pavel Golovkin

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Addressing Russian and Chinese Cyber Threats: A Transatlantic Perspective on Threats to Ukraine and Beyond

| May 2023

In an interconnected world, cyberattacks are becoming more frequent and sophisticated. Building resilience against this asymmetric threat is critical for countries to protect their economies, critical infrastructure, and democratic institutions. However, cyberattacks do not respect borders, and no country can address this threat alone. The strength and longevity of the transatlantic partnership between the EU and the U.S. presents a unique opportunity to address this strategic threat through international cooperation. Through an analysis of cyberwarfare in the ongoing war in Ukraine, this paper proposes policy recommendations to enhance transatlantic coordination and cooperation against current and future adversaries in a new era of strategic competition. Ultimately, a stronger transatlantic partnership is critical for protecting international democratic norms, building resilience against cyber threats, and strengthening global security and stability.

A satellite photo showing heavy snows along the Korean coast, mid-February 2011.

NASA images courtesy MODIS Rapid Response Team at NASA GSFC

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

A Policy of Public Diplomacy with North Korea

| August 2021

The Biden administration has emphasized the importance of alliances and core values of democracy in its foreign policy approach. Given this emphasis, public diplomacy—activities intended to understand, inform, and influence foreign audiences—should be considered an essential tool in achieving our long-term policy objectives in North Korea. Public diplomacy has the potential to spur domestic change in North Korea—change that could result in improved human rights conditions, leading to behavioral change in the Kim regime, and eventually denuclearization.

A representative image of a digital "map"

Adobe Stock

Report

Reconceptualizing Cyber Power

Our intention is to provide the best possible understanding of cyber power capabilities to inform public debate. The Belfer approach proposes eight objectives that countries pursue using cyber means; provides a list of capabilities required to achieve those objectives that demonstrates the breadth of sources of cyber power; and compares countries based on their capability to achieve those objectives. Our work builds on existing cyber indices such as the Economist Intelligence Unit and Booz Allen Hamilton’s 2011 Cyber Power Ranking, by, for example, including a policy dimension and recognizing that cyber capabilities enhance military strength.

Planning for Cyber in the North Atlantic Treaty Organization

US Department of State

Report Chapter - Kosciuszko Institute

Planning for Cyber in the North Atlantic Treaty Organization

| July 08, 2016

While the issue of cyber operations beyond NATO’s own networks is a politically difficult one given the complex mosaic of national, transnational (EU), and international law; the role of national intelligence efforts in certain types of operations; and ever-present disputes over burden-sharing, the Alliance already has invaluable experience in developing policies and procedures for contentious and sensitive tools in the form of the Nuclear Planning Group (NPG). This article begins with a brief overview of actions NATO has already taken to address cyberthreats. It will then explore why these, while important, are insufficient for the present and any imaginable future geopolitical threat environment. Next, it will address the history of the NPG, highlighting some parallels with the present situation regarding cyber and drawing out the challenges faced by, and activities and mechanisms of, the NPG. Finally, it will make the case that a group modeled on the NPG can not only significantly enhance the Alliance’s posture in cyberspace, but can serve as an invaluable space for fostering entente and reconciling differences on key aspects of cyber policy. It concludes that the Alliance needs to consider offensive cyber capabilities and planning, and it needs a Cyber Planning Group to do it.

Winning the Peace

Photo by Martha Stewart

Report

Winning the Peace

May 16, 2014

The last seven decades without war among the great powers – what historians describe as “the long peace” – is a remarkable achievement. “This is a rare and unusual fact if you look at the last few thousand years of history,” said Graham Allison, director of the Belfer Center and moderator of the IDEASpHERE panel “Winning the Peace.” “Furthermore, it is no accident. Wise choices by statesmen have contributed to ‘the long peace,’ which has allowed many generations to live their lives.”

Report - Managing the Atom Project, Belfer Center

Advancing Nuclear Security: Evaluating Progress and Setting New Goals

In the lead-up to the nuclear security summit, Advancing Nuclear Security: Evaluating Progress and Setting New Goals outlines what was accomplished in a four-year effort launched in 2009 to secure nuclear material around the globe—and what remains to be done. The effort made significant progress, but some weapons-usable nuclear materials still remain “dangerously vulnerable." The authors highlight the continuing danger of nuclear and radiological terrorism and call for urgent action.

Report - Managing the Atom Project, Belfer Center

Plutonium Mountain: Inside the 17-Year Mission to Secure a Legacy of Soviet Nuclear Testing

| August 15, 2013

The Belfer Center’s Eben Harrell and Pulitzer Prize-winning author David E. Hoffman for the first time report the details of one of the largest nuclear security operations of the post-Cold War years — a  secret 17-year, $150 million operation to secure plutonium in the tunnels of Degelen Mountain.

Satellite photo of a uranium-enrichment facility near Qom, Iran

Reuters

Paper

Suspension of Nuclear Activities Is Not End of Diversion Risks

| July 14, 2013

A long-standing goal of diplomacy with Iran is persuading Iran to suspend its enrichment operations while it clarifies its past activities and while negotiations proceed on a more permanent resolution to the nuclear crisis. However, there is problem in using suspension of nuclear material production as a negotiating step: The technical details of suspension have never been clearly defined. The international community needs to be aware of the diversion risks during a suspension of enrichment activities and should mitigate these risks by including the necessary verification measures during negotiations and signing of any agreement on suspension.

Discussion Paper - Managing the Atom Project, Belfer Center

Antiproliferation: Tackling Proliferation by Engaging the Private Sector

| November 2012


Illicit trade from the international marketplace plays a direct role in sustaining the nuclear and missile programs of several countries, including Iran, in defiance of UN sanctions. This paper sets out what measures the private sector should take in order to manage the legal, financial and reputational risks associated with involvement in proliferation-related trade, and makes recommendations to national authorities for how for how to help the private sector identify and prevent potential proliferation.