Reports & Papers

1732 Items

The U.S. Capitol is seen at sunrise, in Washington, October 10, 2017

AP Photo/J. Scott Applewhite

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Protecting Democracy in an Era of Cyber Information War

| February 2019

Citizens voluntarily carry Big Brother and his relatives in their pockets. Along with big data and artificial intelligence, technology has made the problem of defending democracy from information warfare far more complicated than foreseen two decades ago. And while rule of law, trust, truth and openness make democracies asymmetrically vulnerable, they are also critical values to defend.  Any policy to defend against cyber information war must start with the Hippocratic oath: first, do no harm.

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Ending the Cybersecurity Arms Race

| February 2018

Network security has always been something of balancing act between maximizing sharing and ease of use, and erecting barriers.

When computer networks first emerged, there were few limitations on what could be transmitted over them. However, after the world’s first major network computer security incident—the Morris Worm of 1988—organizations began to retreat behind network-level firewalls and anti-virus software. Some defenders even tried to completely disconnect their networks from the outside world via “air gaps.”

This paper argues that it is time to move beyond the security paradigm of separating networks, as epitomized by the air gap. Instead, network defenders should embrace an approach which allows sharing and connectedness, anticipates that adversaries will penetrate the network, and is able to detect, and ultimately eject those adversaries before they can do harm.

teaser image

Paper - Harvard Business School

In the Shadows? Informal Enterprise in Non-Democracies

| February 2019

Why do regimes allow some low-income business owners to avoid taxes by operating informally? Electoral incentives are central to prevailing explanations of governments’ forbearance of informal enterprise. Yet many unelected regimes host large informal economies. This article examines forbearance in non-democracies. We argue that unelected regimes forbear their supporters’ informal businesses. We test this argument in Jordan. Using survey data of over 3,800 micro and small enterprises (MSEs), we find that informal businesses are more likely to operate in districts with higher rates of public sector employment, the crown jewel of the Jordanian regime’s patronage. Interviews with over sixty of the surveyed firm owners across four strategically paired districts illustrate that business owners covet forbearance, and that kinship ties to public sector employees limit forbearance to regime supporters. Communities that attract higher rates of public sector employment forfeit higher levels of fiscal revenue by permitting informality. This complementarity between public sector employment and forbearance amplifies inequalities between regime supporters and opponents in non-democracies.

A windmill does its work in Stetson Mountain, Maine, July 19, 2009.

Robert F. Bukaty (AP)

Report - Breakthrough Energy

Advancing the Landscape of Clean Energy Innovation

| Feb. 01, 2019

The Energy Futures Initiative and IHS Market organization recently released a report on the future of clean energy in the United States. In this co-authored foreword to the report, Ernest Moniz gives a snapshot of the challenges clean energy faces in the U.S., as well as the ways that it can continue to move forward:

"In this report we convey the need for a comprehensive approach involving both public and private sectors in order to expand the current landscape of clean energy innovation and accelerate its processes [...] We see this report as a contribution to a continuing national dialogue and hope that it will stimulate further discussion, understanding, and action."

A member of the Czech Army takes part in an anti-terrorism drill at the Temelin nuclear power plant near the town of Tyn nad Vltavou, Czech Republic, April 11, 2017.

REUTERS/David W. Cerny

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

Revitalizing Nuclear Security in an Era of Uncertainty

| January 2019

Nuclear security around the world has improved dramatically over the last three decades—which demonstrates that with focused leadership, major progress is possible. But important weaknesses remain, and the evolution of the threat remains unpredictable. The danger that terrorists could get and use a nuclear bomb, or sabotage a major nuclear facility, or spread dangerous radioactive material in a “dirty bomb,” remains too high. The United States and countries around the world need to join together and provide the leadership and resources needed to put global nuclear security on a sustained path of continuous improvement, in the never-ending search for excellence in performance.

(POMEPS Studies)

(POMEPS Studies)

Report Chapter - Project on Middle East Political Science

A landing strategy for Saudi Arabia

| January, 2019

With rising population and incomes, the “rentier” mode of development in Saudi Arabia has long been unsustainable. While the issue of fiscal stabilization will occupy policy-making in Saudi Arabia in the short and medium terms, the long-term challenge of finding new sources of growth to complement oil has only been made starker by the recent drop in oil prices. Analysis of the prospects for such reforms in KSA has long been divided between two opposite camps: those who believe that the inadequacies of the rentier model will necessarily usher a doomsday scenario sooner or later, regardless of economic policies; and those who believe the impending crisis can be met by moving from the current mono-sector economy to a modern and diversified knowledge based economy OECD-style.

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

A Framework for Cybersecurity

| December 2018

In this paper, we propose a way of thinking about cybersecurity that unifies the various forms of attack. The framework is two-dimensional, looking at both the goal of the attack and the mechanism for launching the attack. The first dimension looks at the goal of the attack by using the common “CIA” triad to categorize the target—that is, whether the attack affects a system’s confidentiality, integrity, or availability (CIA). The second dimension is unique to our knowledge and differentiates attacks based on how the attacks obtain a thread of control.

Russia's Energy Foray into Asia: Implications for U.S. Interests

kees torn/Flickr

Paper - National Bureau of Asian Research

Russia's Energy Foray into Asia: Implications for U.S. Interests

This essay examines Russia’s growing role in Asia’s energy markets, assesses the implications for the U.S., and examines the claim that closer Sino-Russian energy ties are adding new incentives for a broader strategic alignment.

Discussion Paper - Harvard Project on Climate Agreements

GHG Cap-and-Trade: Implications for Effective and Efficient Climate Policy in Oregon

| November 2018

Like many other states, Oregon has begun to pursue climate policies to attempt to fill the gap created by the lack of effective climate policy at the Federal level. After adopting a variety of policies to address climate change and other environmental impacts from energy use, Oregon is now contemplating the adoption of a greenhouse gas (GHG) cap-and-trade system. However, interactions between policies can have important consequences for environmental and economic outcomes. Thus, as Oregon considers taking this step, reconsidering the efficacy of its other current climate policies may better position the state to achieve long-run emission reductions at sustainable economic costs.

Discussion Paper - Harvard Project on Climate Agreements

Policy Evolution Under the Clean Air Act

| November 2018

The U.S. Clean Air Act, passed in 1970 with strong bipartisan support, was the first environmental law to give the Federal government a serious regulatory role, established the architecture of the U.S. air pollution control system, and became a model for subsequent environmental laws in the United States and globally. We outline the Act’s key provisions, as well as the main changes Congress has made to it over time. We assess the evolution of air pollution control policy under the Clean Air Act, with particular attention to the types of policy instruments used. We provide a generic assessment of the major types of policy instruments, and we trace and assess the historical evolution of EPA’s policy instrument use, with particular focus on the increased use of market-based policy instruments, beginning in the 1970s and culminating in the 1990s.