The information assembled here is for any campaign in any party. It was designed to give you simple, actionable information that will make your campaign’s information more secure from adversaries trying to attack your organization—and our democracy
This report recommends policies and actions to improve the return on investment the U.S. government makes in sponsoring research and development (R&D) at the Department of Energy's (DOE) seventeen National Laboratories ("Labs"). While the Labs make a unique and significant contribution to all of the Department of Energy's missions, the authors develop the idea that for the Labs to fully support DOE's energy transformation goals, their R&D management practices need to be updated to better reflect current research into innovation systems and management. They also highlight the necessity of Lab interactions with industry in order to impact the nation's energy infrastructure investment, which is, for the most part, privately held.
Xi is now not only the most powerful leader of China since Mao. He is also the most ambitious leader of any country today. In the past five years, he has proved himself the most effective in advancing his nation’s position in the world. And among all of the competitors on the international stage, he is the most likely to leave a lasting mark on history.
Undaunted, a group of young civil servants is working directly with political operatives and state and local officials to fortify campaigns and elections against cyberattacks and information operations: Harvard Kennedy School students affiliated with the Belfer Center’s Defending Digital Democracy Project (D3P).
- Belfer Center for Science and International Affairs, Harvard Kennedy School Belfer Center Newsletter
A sampling of articles in the Winter 2017/18 issue of the Belfer Center's journal International Security.
International Security is America’s leading journal of security affairs. The International Security journal is edited at Harvard Kennedy School’s Belfer Center and published quarterly by the MIT Press. Questions may be directed to IS@harvard.edu.
And that is the real danger lurking behind a Trump-Kim summit (assuming, of course, it ever takes place). Having already given Kim a significant propaganda coup — no matter how much Trump's staff tries to deny it — the president will be under enormous pressure to come away with an agreement that makes the gamble seem worth it.
The nearly 17-year-old Afghanistan conflict, the longest war in United States history, will not end on the battlefield. It can be resolved only at the negotiating table. So, the bold offer last month from President Ashraf Ghani of Afghanistan to negotiate with the Taliban “without preconditions” is a welcome initiative. But it faces daunting obstacles.
From Ankara to Beijing to Moscow, the world's powerful autocrats are consolidating personalized control with no clear succession plan—a trend that portends greater internal and international volatility.
If Haspel is to protect American spies and even citizens abroad, she needs to be as clear-eyed as Tillerson about the Russian threat. In her upcoming confirmation hearing, she must share her assessment of the Skripal poisoning and how to temper Russian aggression in light of President Vladimir Putin's conduct. She will represent all of the agents at the CIA; she must stand up for them.
Cold War histories tend to discuss KGB covert action — including assassinations — in passing, if at all. My research on intelligence and Cold War superpowers, drawing on previously classified KGB material, reveals the importance that successive Soviet leaders attached to 'liquidating' traitors.
Kori Schake’s essay (and the book from which it is adapted) provides a serious, penetrating, and provocative invitation to debate the overriding geostrategic challenge of our time: what to do about the rise of China. Safe Passage is an outstanding example of the sort of work we champion at the Harvard Belfer Center’s Applied History Project. It illuminates current challenges by careful analysis of the historical record. And the case she examines in which the United States rose to rival and eventually surpass the British global hegemony is among the most instructive of the 16 cases in the HarvardThucydides’ Trap case file for policymakers seeking to cope with the current U.S.-China competition.
Many observers have called for laws and norms to secure this new environment. But developing such standards in the cyber domain faces a number of difficult hurdles. Although Moore's law about the doubling of computing power every two years means that cyber time moves quickly, human habits, norms, and state practices change more slowly.