Reports & Papers

58 Items

two hands reaching to shake in front of U.S. and North Korean flags.

AP Photo/Evan Vucci

Report

Negotiating with North Korea: Key Lessons Learned from Negotiators' Genesis Period

| March 2024

Only a small handful of people in the world have sat at the negotiating table with the North Koreans and extensively interacted with them. Yet, this knowledge is fragmented and has not been collected or analyzed in a systematic manner. This report captures the findings from in-depth, one-on-one interviews with former senior negotiators from the United States and South Korea, who gained unique knowledge about North Korean negotiating behavior by dealing directly with their high-level North Korean counterparts. 

These negotiators collectively represent a body of negotiation experience and expertise starting from the early 1990s to late 2019, when North Korea ceased all negotiations with the United States. During that time, the conditions for productive negotiation changed dramatically – indeed, the conditions for the 1994 U.S.-North Korea Agreed Framework negotiations were much more favorable than during the Six-Party Talks of the mid-2000s or the Season of Summits during 2018-2019. For the “Negotiating with North Korea: Key Lessons Learned from Negotiators’ Genesis Period” project, a spotlight was placed on former senior negotiators’ early-stage experience preparing for and engaging in negotiations with the North Koreans. In doing so, tacit knowledge was captured to serve as a resource for future negotiators to inform and accelerate their own genesis period.

Les Droits de l’Homme, 1947 - a surrealist painting showing an anthropomorphic chess piece standing on a bridge next to a flaming tuba.

Rene Magritte

Report

Whose Streets? Our Streets! (Tech Edition)

    Author:
  • Rebecca Williams
| August 2021

This report is an urgent warning of where we are headed if we maintain our current trajectory of augmenting our public space with trackers of all kinds. In this report, I outline how current “smart city” technologies can watch you. I argue that all “smart city” technology trends toward corporate and state surveillance and that if we don’t stop and blunt these trends now that totalitarianism, panopticonism, discrimination, privatization, and solutionism will challenge our democratic possibilities. This report examines these harms through cautionary trends supported by examples from this last year and provides 10 calls to action for advocates, legislatures, and technology companies to prevent these harms. If we act now, we can ensure the technology in our public spaces protect and promote democracy and that we do not continue down this path of an elite few tracking the many. 

Donald Trump and Anthony Fauci

AP/Alex Brandon

Paper - Centre for International Governance Innovation

US Intelligence, the Coronavirus and the Age of Globalized Challenges

| Aug. 24, 2020

This essay makes three arguments. First, the US government will need to establish a coronavirus commission, similar to the 9/11 commission, to determine why, since April 2020, the United States has suffered more coronavirus fatalities than any other country in the world. Second, the COVID-19 pandemic represents a watershed for what will be a major national security theme this century: biological threats, both from naturally occurring pathogens and from synthesized biology. Third, intelligence about globalized challenges, such as pandemics, needs to be dramatically reconceptualized, stripping away outmoded levels of secrecy.

Report - Atlantic Council

The Reverse Cascade: Enforcing Security on the Global IoT Supply Chain

| June 2020

The Internet of Things (IoT) refers to the increasing convergence of the physical and digital worlds and it affects us all. Hundreds of "things" are being connected to the Internet and each other, with more than fifty billion devices expected to be connected by 2030. Many IoT devices are manufactured abroad at low cost with little consideration for security. How can we secure these devices, especially those manufactured outside the United States?

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Attacking Artificial Intelligence: AI’s Security Vulnerability and What Policymakers Can Do About It

| August 2019

The terrorist of the 21st century will not necessarily need bombs, uranium, or biological weapons. He will need only electrical tape and a good pair of walking shoes. Placing a few small pieces of tape inconspicuously on a stop sign at an intersection, he can magically transform the stop sign into a green light in the eyes of a self-driving car. Done at one sleepy intersection, this would cause an accident. Done at the largest intersections in leading metropolitan areas, it would bring the transportation system to its knees. It’s hard to argue with that type of return on a $1.50 investment in tape.

In this image made on Friday, April 27, 2012, pages of rival Taiwan newspapers Apple Daily, top half, and The China Times, bottom, are seen depicting each other’s owners in a fight for ownership of a major chunk of Taiwan’s media outlets. (AP)

AP Photo

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

Disinformation Threat Watch

While disinformation is a relatively new priority for Western democracies, countries such as Taiwan and South Korea have spent decades battling influence operations from internal and external actors. As democracies, they share structural strengths and challenges with the US, such as the free-flow of information and protections for civil liberties. Based on interviews with over fifty government officials, journalists, and civil society members, the Taiwan and South Korea case studies outline the many specific disinformation characteristics. By highlighting lessons learned from Taiwan and South Korea’s experiences, we hope to equip US policymakers with a wider portfolio of potential solutions.

Paper - Cyber Security Project, Belfer Center

Too Connected to Fail

| May 2017

This paper argues that threats to core internet infrastructure and services can, in fact, rise to the level of a serious national security threat to the United States and will explore scenarios where this may be the case. The paper will discuss several kinds of core internet services and infrastructure and explore the challenges with understanding interdependencies between the internet and critical infrastructure; review recent attack techniques that can cause systemic risk to the internet; discuss various nation state capabilities, intentions and recent activities in this area; and describe how these attacks could be used against the United States to deter the U.S., control escalation, or potentially degrade U.S. warfighting capabilities in a conflict. Finally, the paper concludes with recommendations for what the United States and other governments can do to build defenses and resiliency against systemic threats to the internet.

Paper - Centre for International Governance Innovation

Getting beyond Norms: When Violating the Agreement Becomes Customary Practice

| Apr. 20, 2017

This paper offers five standards of care that can be used to test individual states' true commitment to the international norms of behaviour. Only with a concerted and coordinated effort across the global community will it be possible to change the new normal of "anything goes" and move forward to ensure the future safety and security of the Internet and Internet-based infrastructures.

Paper - Carnegie Endowment for International Peace

Russia and Cyber Operations: Challenges and Opportunities for the Next U.S. Administration

| December 13, 2016

Russian cyber operations against the United States aim to both collect information and develop offensive capabilities against future targets. Washington must strengthen its defenses in response.