Reports & Papers

64 Items

A computer code is seen on displays in the office of Global Cyber Security Company Group-IB in Moscow, Russia, Wednesday, Oct. 25, 2017. A new strain of malicious software has paralyzed computers at a Ukrainian airport, the Ukrainian capital's subway and at some independent Russian media. Moscow-based Global Cyber Security Company Group-IB said in a statement Wednesday the ransomware called BadRabbit also tried to penetrate the computers of major Russian banks but failed.

AP Photo/Pavel Golovkin

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Addressing Russian and Chinese Cyber Threats: A Transatlantic Perspective on Threats to Ukraine and Beyond

| May 2023

In an interconnected world, cyberattacks are becoming more frequent and sophisticated. Building resilience against this asymmetric threat is critical for countries to protect their economies, critical infrastructure, and democratic institutions. However, cyberattacks do not respect borders, and no country can address this threat alone. The strength and longevity of the transatlantic partnership between the EU and the U.S. presents a unique opportunity to address this strategic threat through international cooperation. Through an analysis of cyberwarfare in the ongoing war in Ukraine, this paper proposes policy recommendations to enhance transatlantic coordination and cooperation against current and future adversaries in a new era of strategic competition. Ultimately, a stronger transatlantic partnership is critical for protecting international democratic norms, building resilience against cyber threats, and strengthening global security and stability.

A representative image of a digital "map"

Adobe Stock

Report

Reconceptualizing Cyber Power

Our intention is to provide the best possible understanding of cyber power capabilities to inform public debate. The Belfer approach proposes eight objectives that countries pursue using cyber means; provides a list of capabilities required to achieve those objectives that demonstrates the breadth of sources of cyber power; and compares countries based on their capability to achieve those objectives. Our work builds on existing cyber indices such as the Economist Intelligence Unit and Booz Allen Hamilton’s 2011 Cyber Power Ranking, by, for example, including a policy dimension and recognizing that cyber capabilities enhance military strength.

Military helicopters fly over the training ground during strategic command and staff exercises Center-2019 at Donguz shooting range near Orenburg, Russia, Friday, Sept. 20, 2019.

AP Photo/Sergei Grits

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Defense Playbook for Campaigns

    Authors:
  • Richard Kuzma
  • David Michelson
  • Jacqueline Parziale
  • Kathryn Reed
  • Ryan Solís
  • Tom Wester
  • William Wright
| March 2020

The 2018 National Defense Strategy (NDS) is predicated on a single organizing principle: America’s military pre-eminence is rapidly eroding. This is not a new concept. For years, experts have warned that the economic and technological advancements of U.S. adversaries, coupled with the 2008 financial crisis and America’s focus on peripheral conflicts, have caused a decline in America’s military dominance. 

In this context, the advances of near-peer competitors such as China and Russia have created plausible “theories of victory” in potential conflicts across Eastern Europe and East Asia. Competitors’ unaddressed improvements in strategic innovation, economic investment, and dual-use technology increases the risk of conflict and strains the U.S. alliance system. It is urgent that the United States reestablish and maintain credible deterrents against these near-peer competitors. After decades of focusing on post-Cold War ‘shaping’ operations, the American military needs to reinvigorate for full spectrum great power competition.

This report is intended as a blueprint on how to begin that process from graduate students at the Belfer Center for Science and International Affairs at Harvard University. Contained inside are 12 memorandums. Each provides a high-level overview and specific recommendations on a key issue of American defense policy. 

Planning for Cyber in the North Atlantic Treaty Organization

US Department of State

Report Chapter - Kosciuszko Institute

Planning for Cyber in the North Atlantic Treaty Organization

| July 08, 2016

While the issue of cyber operations beyond NATO’s own networks is a politically difficult one given the complex mosaic of national, transnational (EU), and international law; the role of national intelligence efforts in certain types of operations; and ever-present disputes over burden-sharing, the Alliance already has invaluable experience in developing policies and procedures for contentious and sensitive tools in the form of the Nuclear Planning Group (NPG). This article begins with a brief overview of actions NATO has already taken to address cyberthreats. It will then explore why these, while important, are insufficient for the present and any imaginable future geopolitical threat environment. Next, it will address the history of the NPG, highlighting some parallels with the present situation regarding cyber and drawing out the challenges faced by, and activities and mechanisms of, the NPG. Finally, it will make the case that a group modeled on the NPG can not only significantly enhance the Alliance’s posture in cyberspace, but can serve as an invaluable space for fostering entente and reconciling differences on key aspects of cyber policy. It concludes that the Alliance needs to consider offensive cyber capabilities and planning, and it needs a Cyber Planning Group to do it.

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

Putin's Choice for Russia

    Author:
  • Stephen R. Covington
| August 2015

This paper was written by Stephen R. Covington, with a Foreword written by Kevin Ryan.

In Putin’s view, any solution short of changing the European security system—including full integration, separation by erecting new walls, freezing the status quo around Russia, or partnering with other countries to counter-balance the powers in the European system—only means Russia’s inevitable loss of great power status and the loss of his personal power at home.

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

Sanctions Against Iran: A Guide to Targets, Terms, and Timetables

| June 2015

To assist Members of Congress and observers in analyzing these issues and judging a potential comprehensive agreement, the Belfer Center prepared this brief to outline the key facets of sanctions against Iran. Written as an addendum to our April policy brief, ‘Decoding the Iran Nuclear Deal,’ this report is driven by the policy debate’s leading questions.

Report - Managing the Atom Project, Belfer Center

IAEA Verification of Fissile Material in Support of Nuclear Disarmament

| Apr. 27, 2015

This report proposes a framework for IAEA verification of steps toward nuclear disarmament, premised on IAEA verification of fissile material, in any form, whether classified or not, submitted by any state possessing nuclear weapons. It identifies technical, legal, and financial solutions to the challenges posed by such verification, and offers a way forward to the implementation of the proposed framework. The tool that Rockwood and Shea offer is ready for any state with nuclear weapons to take up, finish the final details, and implement.

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

Decoding the Iran Nuclear Deal

| April 2015

On April 2, 2015, the E.U. (speaking on behalf of the P5+1 countries) and Iran announced agreement on “key parameters” for a comprehensive agreement on Iran’s nuclear program. The E.U.-Iran Joint Statement is buttressed by unilateral facts sheets issued by the U.S. and Iran, which provide further details of the framework accord. Negotiators now turn to translating this framework accord into a final comprehensive agreement by June 30, 2015. Members of Congress and their staffs, as well as informed citizens, are now focusing on the Iranian challenge and assessing the framework accord. The Belfer Center for Science and International Affairs at the Harvard Kennedy School has prepared this Policy Brief summarizing key facts, core concepts, and major arguments for and against the current deal aimed at stopping Iran from developing nuclear weapons. The purpose of this Policy Brief is not to advocate support for or opposition to the tentative deal that has been negotiated, but rather to provide an objective, nonpartisan summary to inform Members and others in coming to their own conclusions. The team of experts who prepared this report includes Democrats, Republicans, Independents, and internationals, who have many disagreements among themselves but who agree that this Brief presents the essentials objectively.

Paper

Nuclear Disarmament: The Legacy of the Trilateral Initiative

| March 23, 2015

In 1996, the International Atomic Energy Agency (IAEA), the United States and the Russian Federation entered into a cooperative effort – the Trilateral Initiative – aimed at investigating the feasibility and requirements for a verification system under which the IAEA could accept and monitor nuclear warheads or nuclear warhead components pursuant to the NPT Article VI commitments of both States. Although the Initiative ended in 2002, the Model Verification Agreement produced could still serve as the basis for bilateral or multilateral agreements between the IAEA and nuclear-weapon States.

In this paper, Thomas E. Shea and Laura Rockwood examine the potential role for international verification of fissile material in relation to nuclear disarmament, what was accomplished under the Trilateral Initiative and, more importantly, what should be done now to preserve its legacy and take concrete steps towards such verification.

Paper - Managing the Atom Project, Belfer Center

Shadow Wars of Weapons Acquisition: Arms Denial and its Strategic Implications

| July 01, 2014

In trying to prevent adversaries from acquiring new military capabilities, countries often employ strategies of arms denial; e.g., “unilateral diplomacy,” supply chain interdiction, covert sabotage, and targeted military strikes. Using a game-theoretical model of weapons acquisition and denial, the authors posit that the prevalence of this approach gives rise to strategic effects that affect all players’ behavior.