Reports & Papers

145 Items

Technicians in clean room learn to make semiconductors

Photo from ATE Impacts 2022-2023

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

Community Colleges and the Semiconductor Workforce

| June 2023

Over the last several decades, the U.S.’s domestic semiconductor manufacturing capacity has declined. The CHIPS Act aims to reverse this trend by investing over $50 billion in direct funding and loan subsidies to expand semiconductor research and development and manufacturing in the U.S. This primer focuses on the workforce challenges that will be spurred by this microelectronics industry expansion and proposes how community colleges can play a critical role in addressing these challenges. 

guns and missiles burst forth from a laptop screen

Adobe Stock

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Guns, Incels, and Algorithms: Where We Are on Managing Terrorist and Violent Extremist Content Online

| June 12, 2023

Technology companies and governments have spent the past decade trying to better address the evolving threat of terrorist and violent extremist content online (TVEC). This paper examines how effective these efforts have been, where we are today in managing the problem, and wherein lie gaps for improvement.

A computer code is seen on displays in the office of Global Cyber Security Company Group-IB in Moscow, Russia, Wednesday, Oct. 25, 2017. A new strain of malicious software has paralyzed computers at a Ukrainian airport, the Ukrainian capital's subway and at some independent Russian media. Moscow-based Global Cyber Security Company Group-IB said in a statement Wednesday the ransomware called BadRabbit also tried to penetrate the computers of major Russian banks but failed.

AP Photo/Pavel Golovkin

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Addressing Russian and Chinese Cyber Threats: A Transatlantic Perspective on Threats to Ukraine and Beyond

| May 2023

In an interconnected world, cyberattacks are becoming more frequent and sophisticated. Building resilience against this asymmetric threat is critical for countries to protect their economies, critical infrastructure, and democratic institutions. However, cyberattacks do not respect borders, and no country can address this threat alone. The strength and longevity of the transatlantic partnership between the EU and the U.S. presents a unique opportunity to address this strategic threat through international cooperation. Through an analysis of cyberwarfare in the ongoing war in Ukraine, this paper proposes policy recommendations to enhance transatlantic coordination and cooperation against current and future adversaries in a new era of strategic competition. Ultimately, a stronger transatlantic partnership is critical for protecting international democratic norms, building resilience against cyber threats, and strengthening global security and stability.

Earth represented by binary code and lines

Getty Images

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Reach, Choice, and Transparency: Governing the Internet in the 21st Century

| May 2023

As inventions go, the Internet stacks up with the best of them: the lightbulb, the automobile, even fire. In its first thirty years, the Internet’s worldwide adoption and breadth of application has exceeded any other technological advance in history. It expands our reach by bringing people, experiences, and things to us with the click of a mouse. It connects us to an increasing number of gadgets, from smartphones to voice kiosks and soon self-driving vehicles that will no doubt converse with us while we commute, happily oblivious to the traffic around us. We revel in our newfound agility and versatility. Importantly, our precious network kept us sane during a worldwide pandemic and enabled the world to work remotely while most of its population was frozen at home. For resilience against catastrophes alone, the Internet has become indispensable.

German Interior Minister Thomas de Maiziere talks to the media during his visit to the central department of fighting internet criminality (ZIT) in Giessen, Germany, Wednesday, Feb. 8, 2017. In background a map showing the amount of cyber attacks in a30 days.

AP Photo/Michael Probst

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Advancing Cyber Norms Unilaterally: How the U.S. Can Meet its Paris Call Commitments

| January 2023

Establishing norms for state behavior in cyberspace is critical to building a more stable, secure, and safe cyberspace. Norms are defined as “a collective expectation for the proper behavior of actors with a given identity,” and declare what behavior is considered appropriate and when lines have been crossed. Cyberspace is in dire need of such collective expectations. However, despite efforts by the international community and individual states to set boundaries and craft agreements, clear and established cyber norms for state behavior remain elusive. As early as 2005, the UN Group of Governmental Experts (GGE) and UN Open-Ended Working Group (OEWG) both aimed to create shared “rules of the road,” but fundamental disagreements between states and a lack of accountability and enforcement mechanisms have prevented these initiatives from substantively implementing cyber norms. As a result, the international community and individual states are left with no accountability mechanisms or safeguards to protect civilians and critical infrastructure from bad actors in cyberspace.

A person on the left bends to take pictures of a drone showcased on a platform on the right.

AP Photo/Joe Buglewicz

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Buying What Works: An Acquisitions Strategy for the Reality of Dual-Use Technologies

| October 2022

In this student research paper, Harvard Kennedy School student Coen Williams finds that  The Department of Defense should implement an “effects-driven” acquisitions system rather than “capabilities-based” to effectively acquire and utilize commercially developed capabilities. An effects-driven acquisitions system will increase the diversity of solutions, and by appropriating money to effects-driven portfolios, Congress can still maintain control of the purse while the Department of Defense can more effectively allocate its appropriated funds.

An abstract image of locks and electronic wires

Adobe Stock

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

National Cyber Power Index 2022

| September 2022

In his Note to Readers of the 2022 National Cyber Power Index, Eric Rosenbach, Belfer Center Co-Director and former Chief of Staff and Assistant Secretary for the U.S. Department of Defense, writes: “With the challenges in the cyber domain only increasing, it is critical for analytical tools to also be available, presenting the full range of cyber power, and informing critical public debates today. The framework that the NCPI provides is one that allows policymakers to consider a fuller range of challenges and threats from other state actors. The incorporation of both qualitative and quantitative models, with more than 1000 existing sources of data and with 29 indicators to measure a state’s capability, is more comprehensive than any other current measure of cyber power.”

A worker is seen in a tugboat at the Port of Los Angeles on Nov. 10, 2021.

AP Photo/Marcio Jose Sanchez, File

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Never Breaking the Chain: The Economics and Politics of Creating an Effective National Supply Chain Strategy

| August 2022

The creation of a national supply chain strategy is crucial to responding to the challenge and merits specific attention from both policy and business leaders. This paper proposes specific government and business policy steps that would progress the US’s position on a more unified, strategic supply chain approach.

hand pointing at a screen displaying a screenshot from Darkcode

AP Photo/Gene J. Puskar

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

New Risks in Ransomware: Supply Chain Attacks and Cryptocurrency

| May 16, 2022

This paper provides an overview of the current ransomware landscape, such as the rise of Ransomware-as-a-Service (RaaS) and the increase of supply chain attacks, while also gesturing towards potential emerging solutions, such as software bill of materials (SBOM), vulnerability disclosure databases, and stricter cryptocurrency regulations.