Reports & Papers

12 Items

Paper - Cyber Security Project, Belfer Center

A Legislator's Guide to Reauthorizing Section 702

    Author:
  • Anne Boustead
| Aug. 20, 2017

Section 702 of the Foreign Intelligence Surveillance Act (FISA) Amendments Act of 2008, a powerful surveillance tool that allows U.S. government agencies to spy on foreign persons to collect counter-terrorism intelligence, will expire on December 31, 2017 without Congressional reauthorization. This paper has two goals: to concisely describe how agencies obtain information under Section 702, and to provide guidance to legislators and their staffers by examining the core issues they will confront as they consider reauthorizing this legislation.

Paper - Potomac Institute for Policy Studies

Cyber Readiness Index 2.0

    Authors:
  • Chris Demchak
  • Jason Kerben
  • Jennifer McArdle
  • Francesca Spidalieri
| November 30, 2015

"Building on CRI 1.0, Cyber Readiness Index 2.0 examines one hundred twenty-five countries that have embraced, or are starting to embrace, ICT and the Internet and then applies an objective methodology to evaluate each country's maturity and commitment to cyber security across seven essential elements."

Report - Global Governance 2022

Securing the Net: Global Governance in the Digital Domain

    Authors:
  • Puji Abbassi
  • Martin Kaul
  • Yi Shen
  • Zev Winkelman
| September 2013

What will be the shape of the internet in 20 years? The authors explore possible futures in global cyber security governance and recommend a robust set of actions that pave a path forward towards establishing an environment in which a more cooperative form of global cyber security governance could evolve.

Discussion Paper - Science, Technology, and Public Policy Program, Belfer Center

The Discovery-Invention Cycle: Bridging the Basic/Applied Dichotomy

| February 2013

In this paper we hope to provide an alternative point of view. By examining both the evolution of the famous "linear model of innovation" — which holds that scientific research precedes technological innovation — and the problematic description of engineering being "applied science" we seek to challenge the existing dichotomies between basic / applied research, science and engineering, tracing how knowledge travels between different knowledge domains through a case study of a selected group of Nobel Prizes in physics.

Paper - Science, Technology, and Public Policy Program, Belfer Center

Internet Fragmentation: Highlighting the Major Technical, Governance and Diplomatic Challenges for U.S. Policy Makers

| May 2012

The Internet is at a crossroads. Today it is generally open, interoperable and unified. Tomorrow, however, we may see an entirely different Internet, one not characterized by openness and global reach, but by restrictions, blockages and cleavages. In order to help ensure that the Internet continues to serve as a source of global integration, democratization, and economic growth, American policymakers must be aware of the most significant technical, political and legal challenges to a unified Internet.

A Pakistani Internet user surfs the YouTube Web site at a local Internet cafe in Islamabad, Pakistan, Feb. 26, 2008. Pakistan defended its clampdown on the YouTube Web site which accidentally interrupted access for Internet users around the globe.

AP Photo

Paper - Munk School of Global Affairs, University of Toronto

Duties for Internet Service Providers

| March 2012

In today's interconnected world, the Internet is no longer a tool. Rather, it is a service that helps generate income and employment, provides access to business and information, enables e-learning, and facilitates government activities. It is an essential service that has been integrated into every part of our society. Our experience begins when an Internet Service Provider (ISP) uses fixed telephony (plain old telephone service), mobile-cellular telephony, or fixed fiber-optic or broadband service to connect us to the global network. From that moment on, the ISP shoulders the responsibility for the instantaneous, reliable, and secure movement of our data over the Internet.

Discussion Paper - Science, Technology, and Public Policy Program, Belfer Center

Cloud and Mobile Privacy: The Electronic Communications Privacy Act

| February 2012

Consumer expectations of online and mobile privacy have in recent years diverged significantly from reality. In certain circumstances, the United States government has the ability to access a consumer's cloud-based email, location data gathered from their mobile phones, and information about what calls a user places on a mobile device—without a warrant. While a broad coalition is spearheading reform efforts in Washington, providers of these services should take proactive steps to bring consumer understanding of their privacy more in line with reality.