Reports & Papers

47 Items

A convoy of Israeli army tanks maneuvers near Israel's border after leaving Gaza, southern Israel, on Friday, Nov. 24, 2023.

AP Photo/Tsafrir Abayov

Discussion Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Lessons from Israel’s Forever Wars

| Jan. 16, 2024

Since its founding in 1948, Israel has been engaged in a series of forever wars. After each war, the IDF, Mossad, Shin Bet, and others in the intelligence and security community analyze what happened and summarize their findings in after-action, or “lessons learned,” reports. Former leaders from these institutions, many of whom retain close relations with their successors, also produce reports on what happened and identify takeaways for the future. Thus, in trying to make sense of what’s happening now, lessons these experts have distilled from their experiences provide a sound starting point.

President Truman signs National Security Act Amendments

NARA

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

Imagining a New U.S. National Security Act for the 21st Century: Winning Essays

| July 19, 2022

The Intelligence and Applied History Projects hosted a National Security Act Essay Contest in 2022 entitled: “Imagining a New National Security Act for the 21st Century.” The contest sought to generate new ideas for improving the intelligence and national security community in the US based on the dynamic security environment we face in the 21st century. The essay prompt offered a variety of hypothetical scenarios where intelligence failure contributed to catastrophic failure and posed the question: what you would change now to improve the intelligence and national security posture of the US?

The winning essays, from a field of approximately 75 applicants, were authored by (1) Russell Travers, (2) Sophie Faaborg-Andersen, and (3) Marie Couture and Laurie LaPorte. The authors' winning essays appear in this report.

A satellite photo showing heavy snows along the Korean coast, mid-February 2011.

NASA images courtesy MODIS Rapid Response Team at NASA GSFC

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

A Policy of Public Diplomacy with North Korea

| August 2021

The Biden administration has emphasized the importance of alliances and core values of democracy in its foreign policy approach. Given this emphasis, public diplomacy—activities intended to understand, inform, and influence foreign audiences—should be considered an essential tool in achieving our long-term policy objectives in North Korea. Public diplomacy has the potential to spur domestic change in North Korea—change that could result in improved human rights conditions, leading to behavioral change in the Kim regime, and eventually denuclearization.

Paper

US-Russian Contention in Cyberspace

| June 2021

The overarching question imparting urgency to this exploration is: Can U.S.-Russian contention in cyberspace cause the two nuclear superpowers to stumble into war? In considering this question we were constantly reminded of recent comments by a prominent U.S. arms control expert: At least as dangerous as the risk of an actual cyberattack, he observed, is cyber operations’ “blurring of the line between peace and war.” Or, as Nye wrote, “in the cyber realm, the difference between a weapon and a non-weapon may come down to a single line of code, or simply the intent of a computer program’s user.”

Workers prepare mail-in ballots for counting, Wednesday, Nov. 4, 2020, at the convention center in Lancaster, Pa., following Tuesday's election.

AP Photo/Julio Cortez

Report

The Pandemic Election

    Author:
  • Anna Sakellariadis
| April 2021

Mis and disinformation thrive by capturing imaginations through obfuscation, oversimplification, and speculation. In contrast, this report documents and analyzes five key areas related to the shifting information threat landscape in the 2020 U.S. general election with clarity, in their complexity, and on the basis of rigorously collected data. Our goal is to provide relevant insights for future elections in an evolving information and threat landscape.

Voters mark their ballots during early voting at the Park Slope Armory in Brooklyn, Tuesday, Oct. 27, 2020.

AP Photo/Mary Altaffer

Report - Defending Digital Democracy

Beyond 2020: Policy Recommendations for the Future of Election Security

| February 2021

The 2020 election presents a paradox. Despite dramatic changes to the election process due to the COVID-19 pandemic and increasingly complex threats since the 2016 election, 2020 is widely regarded as “the most secure [election] in American history.” Operationally, it was also one of the smoothest. State and local election officials overcame unprecedented challenges and scarce resources to administer an election with fewer incidents of cyber compromises, technical failures or long lines than anticipated. After Election Day, recount procedures functioned as designed. Yet, amidst these successes, officials from both parties faced a barrage of mis- and disinformation about the election process that served to undermine confidence in the result.

Though the election security ecosystem survived the triple threat of cybersecurity, physical security, and mis- and disinformation in 2020, this success will prove to be hard to replicate in future election cycles without proper investment and reinforcement.

A staff member in the Kweisi Mfume campaign uses gloves while holding a cell phone during an election night news conference at his campaign headquarters after Mfume, a Democrat, won Maryland’s 7th Congressional District special election, Tuesday, April 28, 2020, in Baltimore.

AP Photo/Julio Cortez

Report

The Election Influence Operations Playbook, Part 1

| September 2020

Influence Operations (IO), also known as Information Operations, are a series of warfare tactics historically used to collect information, influence, or disrupt the decision making of an adversary. IO strategies intentionally disseminate information to manipulate public opinion and/or influence behavior. IO can involve a number of tactics, including spreading false information intentionally. This is known as “disinformation.”   

Skilled influence operations often deliberately spread disinformation in highly public places like social media. This is done in the hope that people who have no connection to the operation will mistakenly share this disinformation. Inaccurate information spread in error without malicious intent is known as “misinformation.” 

This playbook explores mis- and disinformation incidents that specifically focus on elections operations and infrastructure. Election officials may not often see or know what the motivation is behind the incidents encountered or whether they are mis- or disinformation. Throughout these guides we refer to mis/disinformation incidents together, as the strategies for countering or responding to them are the same.  

Voters wait in a line outside Broad Ripple High School to vote in the Indiana primary in Indianapolis, Tuesday, June 2, 2020 after coronavirus concerns prompted officials to delay the primary from its original May 5 date.

AP Photo/Michael Conroy

Report

The Election Influence Operations Playbook, Part 2

| September 2020

This section of the Playbook includes recommendations and materials focused on the response process. It will help election officials respond to election-related mis and disinformation incidents quickly and in a coordinated fashion. 

In this playbook, we refer to mis/disinformation throughout as one concept. Instances of both misinformation and disinformation in the elections process provide incorrect information to voters. Incorrect information can be conveyed intentionally or unintentionally. For election officials, any incorrect information, regardless of source or intention, presented to voters can pose a threat to elections, because it can undermine voters’ understanding of and trust in the election.

Donald Trump and Anthony Fauci

AP/Alex Brandon

Paper - Centre for International Governance Innovation

US Intelligence, the Coronavirus and the Age of Globalized Challenges

| Aug. 24, 2020

This essay makes three arguments. First, the US government will need to establish a coronavirus commission, similar to the 9/11 commission, to determine why, since April 2020, the United States has suffered more coronavirus fatalities than any other country in the world. Second, the COVID-19 pandemic represents a watershed for what will be a major national security theme this century: biological threats, both from naturally occurring pathogens and from synthesized biology. Third, intelligence about globalized challenges, such as pandemics, needs to be dramatically reconceptualized, stripping away outmoded levels of secrecy.

In this April 22, 2020 photo, Gerard Bakulikira, right, and captain Tim Daghelet, left, both wear a Romware COVID Radius digital bracelet, which flashes red when people are too close to each other and creates a log of contacts. 

AP Photo/Virginia Mayo

Paper

Considerations for Digital Contact Tracing Tools for COVID-19 Mitigation: Recommendations for Stakeholders and Policymakers

Many are looking to digital contact tracing to assist reopening efforts, especially in light of reports that the U.S. could expect as many as 100,000 more deaths due to the virus by this Fall. This report focuses on how the U.S. might consider various proposed solutions.

We believe there are real benefits, challenges, and even potential harms in using digital solutions in the fight against COVID-19, but we must also acknowledge that the promise of any technology and associated systems to assist manual contact tracing efforts is largely hypothetical in the United States. There is not one catch-all answer; the truth is that technology is not a panacea, but it may be able to assist official efforts at an unprecedented time. However, no technological solution can succeed without two specific factors: public trust and buy-in, and rapid, widespread testing for everyone living in the U.S. To achieve the first, a number of factors must be addressed by officials in the states looking to implement digital solutions, and by technology developers.