Reports & Papers

67 Items

two hands reaching to shake in front of U.S. and North Korean flags.

AP Photo/Evan Vucci

Report

Negotiating with North Korea: Key Lessons Learned from Negotiators' Genesis Period

| March 2024

Only a small handful of people in the world have sat at the negotiating table with the North Koreans and extensively interacted with them. Yet, this knowledge is fragmented and has not been collected or analyzed in a systematic manner. This report captures the findings from in-depth, one-on-one interviews with former senior negotiators from the United States and South Korea, who gained unique knowledge about North Korean negotiating behavior by dealing directly with their high-level North Korean counterparts. 

These negotiators collectively represent a body of negotiation experience and expertise starting from the early 1990s to late 2019, when North Korea ceased all negotiations with the United States. During that time, the conditions for productive negotiation changed dramatically – indeed, the conditions for the 1994 U.S.-North Korea Agreed Framework negotiations were much more favorable than during the Six-Party Talks of the mid-2000s or the Season of Summits during 2018-2019. For the “Negotiating with North Korea: Key Lessons Learned from Negotiators’ Genesis Period” project, a spotlight was placed on former senior negotiators’ early-stage experience preparing for and engaging in negotiations with the North Koreans. In doing so, tacit knowledge was captured to serve as a resource for future negotiators to inform and accelerate their own genesis period.

US Climate Policy graphic

Getty Images

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Climate Change Requires New Approaches to Disaster Planning and Response

    Author:
  • David J. Hayes
| June 2023

To date, most of the climate policy attention has been focused on the need to reduce the greenhouse gases that are causing climate change and, as a corollary, to accelerate the U.S. economy’s transition from fossil fuels to clean energy. Yet climate change also is straining our nation’s emergency response capabilities as traditional climate-infused disasters such as hurricanes and floods become more frequent and destructive. At the same time, the emergency response community faces new challenges as slower-to-develop climate impacts like drought, heat, and wildfire increasingly are hitting an acute tipping points and becoming life- and livelihood-threatening disasters.

Earth represented by binary code and lines

Getty Images

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Reach, Choice, and Transparency: Governing the Internet in the 21st Century

| May 2023

As inventions go, the Internet stacks up with the best of them: the lightbulb, the automobile, even fire. In its first thirty years, the Internet’s worldwide adoption and breadth of application has exceeded any other technological advance in history. It expands our reach by bringing people, experiences, and things to us with the click of a mouse. It connects us to an increasing number of gadgets, from smartphones to voice kiosks and soon self-driving vehicles that will no doubt converse with us while we commute, happily oblivious to the traffic around us. We revel in our newfound agility and versatility. Importantly, our precious network kept us sane during a worldwide pandemic and enabled the world to work remotely while most of its population was frozen at home. For resilience against catastrophes alone, the Internet has become indispensable.

A worker wearing a mask a performing work

AP Photo/Mark Schiefelbein

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Combatting Forced Labor in Global Supply Chains

    Authors:
  • Sarah Bishop
  • Tom Plotkin
  • Emanuel Ghebregergis
| January 2023

In recent years, the U.S. government has accelerated its efforts to eradicate forced labor from global supply chains. Those efforts have been led primarily by U.S. Customs and Border Protection (CBP), which has been actively enforcing a long-standing statutory prohibition on the importation of goods made with forced labor, bolstered by recent legislation that has provided it with more substantial regulatory authority. CBP’s evolving enforcement regime suffers, however, from certain shortcomings, including a lack of adequate incentives and legal protections for importers and their suppliers to work collaboratively with the government to craft remediation programs that address the root causes of forced labor.

Les Droits de l’Homme, 1947 - a surrealist painting showing an anthropomorphic chess piece standing on a bridge next to a flaming tuba.

Rene Magritte

Report

Whose Streets? Our Streets! (Tech Edition)

    Author:
  • Rebecca Williams
| August 2021

This report is an urgent warning of where we are headed if we maintain our current trajectory of augmenting our public space with trackers of all kinds. In this report, I outline how current “smart city” technologies can watch you. I argue that all “smart city” technology trends toward corporate and state surveillance and that if we don’t stop and blunt these trends now that totalitarianism, panopticonism, discrimination, privatization, and solutionism will challenge our democratic possibilities. This report examines these harms through cautionary trends supported by examples from this last year and provides 10 calls to action for advocates, legislatures, and technology companies to prevent these harms. If we act now, we can ensure the technology in our public spaces protect and promote democracy and that we do not continue down this path of an elite few tracking the many. 

A miniature of “The War Room” as depicted in the 1964 classic film Dr. Strangelove

Courtesy Eric Chan  and the Los Angeles County Museum of Art, CC-BY 2.0

Paper

Toward a Collaborative Cyber Defense and Enhanced Threat Intelligence Structure

| August 2021

National security structures envisioned in the 20th century are inadequate for the cyber threats that America faces in the 21st century. These structures, created to address strategic, external threats on one end, and homeland security emergencies on the other, cannot protect us from ambient cyber conflict, because they were designed for different times and threats. Our nation—comprising the federal government, private sector companies, critical infrastructure operators, state and local governments, nonprofits and universities, and even private citizens—are constantly under attack by a myriad of cyber actors with ever-increasing capabilities. 

A satellite photo showing heavy snows along the Korean coast, mid-February 2011.

NASA images courtesy MODIS Rapid Response Team at NASA GSFC

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

A Policy of Public Diplomacy with North Korea

| August 2021

The Biden administration has emphasized the importance of alliances and core values of democracy in its foreign policy approach. Given this emphasis, public diplomacy—activities intended to understand, inform, and influence foreign audiences—should be considered an essential tool in achieving our long-term policy objectives in North Korea. Public diplomacy has the potential to spur domestic change in North Korea—change that could result in improved human rights conditions, leading to behavioral change in the Kim regime, and eventually denuclearization.

teaser image

Paper

Disrupting Transnational Criminal Activity: A Law Enforcement Strategy for Homeland Security

| May 21, 2021

Transnational criminal activity, organized or not, presents a substantial internal security threat to the United States as it does to other nation-states across the world. Combating it remains a critical mission in the homeland security enterprise. Federal efforts across that enterprise, however, remain scattered and largely ineffectual, and many types of transnational crime are resistant to the law enforcement tactics used domestically.

This paper proposes that the U.S. Department of Homeland Security (DHS) take the lead in supplementing the traditional “criminal justice” approach to countering transnational crime with strategies that aim to disrupt it and insulate Americans from its harmful effects. We contend the “Disruption Model” outlined here,* if broadly implemented, could significantly complement the current conventional approach, and produce materially improved results in managing the challenges of transnational crime and protecting the homeland from its ravages.

Voters mark their ballots during early voting at the Park Slope Armory in Brooklyn, Tuesday, Oct. 27, 2020.

AP Photo/Mary Altaffer

Report - Defending Digital Democracy

Beyond 2020: Policy Recommendations for the Future of Election Security

| February 2021

The 2020 election presents a paradox. Despite dramatic changes to the election process due to the COVID-19 pandemic and increasingly complex threats since the 2016 election, 2020 is widely regarded as “the most secure [election] in American history.” Operationally, it was also one of the smoothest. State and local election officials overcame unprecedented challenges and scarce resources to administer an election with fewer incidents of cyber compromises, technical failures or long lines than anticipated. After Election Day, recount procedures functioned as designed. Yet, amidst these successes, officials from both parties faced a barrage of mis- and disinformation about the election process that served to undermine confidence in the result.

Though the election security ecosystem survived the triple threat of cybersecurity, physical security, and mis- and disinformation in 2020, this success will prove to be hard to replicate in future election cycles without proper investment and reinforcement.