By Ronald G. Allen, Jr., Former Research Fellow, International Security Program/Project on Managing the Atom, 2011–2012
Without significant change in the geopolitical landscape, nuclear weapons will remain a relevant portion of America's long-term national security strategy. Therefore, the burdens and responsibilities of maintaining an effective nuclear deterrent force are paramount to ensure credibility for America and her allies. Bottom line: nuclear weapons and nuclear deterrence are still relevant today and for the foreseeable future. Therefore, to maintian international strategic stability we must embrace the necessity of nuclear deterrence, develop strategic policy that supports deterrence as an essential element and adequately resource the enterprise.
By Joseph K. Michalek, Former Research Fellow, International Security Program, 2011–2012
The proliferation of threat systems and Anti-Access, Area Denial (A2/AD) strategies make performing special operations forces' (SOF) air mobility missions increasingly complicated and limit the capability to defeat air defenses and penetrate into denied airspace. Combined with an aging inventory, ill suited to evading these threats, Air Force Special Operations Command (AFSOC) and the United States Special Operations Command (USSOCOM) must look to technology to defeat the more modern threat systems and anti-access strategies. The best answer to penetrate future, denied regions is in stealth or low observable (LO) technology.
This paper offers analysis and policy recommendations for use and response to various forms of cyber action for Offensive Military Cyber Policy. It establishes a pragmatic policy-relevant, effects-based ontology for categorizing cyber capabilities, and develops a comprehensive framework for cyber policy analysis. Furthermore, it demonstrates the utility of the cyber policy analysis framework by analyzing six key categories of external cyber actions identified by our ontology, which range the entire spectrum of cyber activity. Lastly, this work develops actionable policy recommendations from our analysis for cyber policy makers while identifying critical meta-questions.
"Internet Fragmentation: Highlighting the Major Technical, Governance and Diplomatic Challenges for U.S. Policy Makers"
By Jonah Force Hill, Jonah Hill is a former Belfer Center International and Global Affairs (BIGA) Student Fellow, 2011-12
The Internet is at a crossroads. Today it is generally open, interoperable and unified. Tomorrow, however, we may see an entirely different Internet, one not characterized by openness and global reach, but by restrictions, blockages and cleavages. In order to help ensure that the Internet continues to serve as a source of global integration, democratization, and economic growth, American policymakers must be aware of the most significant technical, political and legal challenges to a unified Internet.
By Steven E. Miller, Director, International Security Program; Editor-in-Chief, International Security; Co-Principal Investigator, Project on Managing the Atom, Wael Al-Assad, Jayantha Dhanapala, C. Raja Mohan and Ta Minh Tuan
Nearly all of the 190 signatories to the Nuclear Non-Proliferation Treaty (NPT) agree that the forty-two-year-old treaty is fragile and in need of fundamental reform. But gaining consensus on how to fix the NPT will require reconciling the sharply differing views of nuclear weapon states and non-nuclear weapon states. Strengthening the international rules is increasingly important as dozens of countries, including some with unstable political environments, explore nuclear energy. The result is an ever-increasing distribution of this technology. In this paper, Steven E. Miller outlines the main points of contention within the NPT regime and identifies the issues that have made reform so difficult.
In today's interconnected world, the Internet is no longer a tool. Rather, it is a service that helps generate income and employment, provides access to business and information, enables e-learning, and facilitates government activities. It is an essential service that has been integrated into every part of our society. Our experience begins when an Internet Service Provider (ISP) uses fixed telephony (plain old telephone service), mobile-cellular telephony, or fixed fiber-optic or broadband service to connect us to the global network. From that moment on, the ISP shoulders the responsibility for the instantaneous, reliable, and secure movement of our data over the Internet.
February 22, 2012
By Leonardo Maugeri, Associate, Environment and Natural Resources Program/Geopolitics of Energy Project
How booming investments, new technologies, new oil frontiers, and ongoing production development may set a surprising paradigm-shift in the energy world
By Melissa Hathaway, Senior Advisor, Project on Technology, Security, and Conflict in the Cyber Age
"Cybersecurity is a means to enable social stability and promote digital democracy; a method by which to govern the Internet; and a process by which to secure critical infrastructure from cybercrime, cyberespionage, cyberterrorism and cyberwar. As nations and corporations recognize their dependence on ICT, policymakers must find the proper balance in protecting their investments without strangling future growth."
By Meghan L. O'Sullivan, Jeane Kirkpatrick Professor of the Practice of International Affairs, Harvard Kennedy School
Iraq could be poised for a dramatic transformation in which it finally escapes the political and technical constraints that have kept it producing less than 4 percent of the world’s oil, writes Meghan L. O'Sullivan. Should Iraq meet its ambitions to bring nearly 10 million more barrels of oil on line by 2017, it would constitute the largest ever capacity increase in the history of the oil industry. Even half this much would represent a massive achievement.
In the Foreword to this paper by Andrei Kokoshin, Belfer Center Director Graham Allison writes: "The global nuclear order is reaching a tipping point. Several trends are advancing along crooked paths, each undermining this order. These trends include North Korea’s expanding nuclear weapons program, Iran’s continuing nuclear ambitions, Pakistan’s increasing instability, growing doubts about the sustainability of the nonproliferation regime in general, and terrorist groups’ enduring aspirations to acquire nuclear weapons. Andrei Kokoshin, deputy of the State Duma and former secretary of Russia’s Security Council, analyzes these challenges that threaten to cause the nuclear order to collapse in the following paper."