Reports & Papers

11 Items

Report - Technology and Public Purpose

Building a 21st-century American Economy

| November 2020

As the world confronts systematic, interrelated challenges from a raging pandemic to devastating climate catastrophes to a growing chasm of inequality, the United States has the opportunity to make deep commitments to new technological foundations that will usher in the next industrial revolution and greater shared prosperity. Or, we can continue along a business-as-usual path, ceding global leadership and the associated economic value creation elsewhere.

In this April 22, 2020 photo, Gerard Bakulikira, right, and captain Tim Daghelet, left, both wear a Romware COVID Radius digital bracelet, which flashes red when people are too close to each other and creates a log of contacts. 

AP Photo/Virginia Mayo

Paper

Considerations for Digital Contact Tracing Tools for COVID-19 Mitigation: Recommendations for Stakeholders and Policymakers

Many are looking to digital contact tracing to assist reopening efforts, especially in light of reports that the U.S. could expect as many as 100,000 more deaths due to the virus by this Fall. This report focuses on how the U.S. might consider various proposed solutions.

We believe there are real benefits, challenges, and even potential harms in using digital solutions in the fight against COVID-19, but we must also acknowledge that the promise of any technology and associated systems to assist manual contact tracing efforts is largely hypothetical in the United States. There is not one catch-all answer; the truth is that technology is not a panacea, but it may be able to assist official efforts at an unprecedented time. However, no technological solution can succeed without two specific factors: public trust and buy-in, and rapid, widespread testing for everyone living in the U.S. To achieve the first, a number of factors must be addressed by officials in the states looking to implement digital solutions, and by technology developers.
 

A MEP walks in the mostly-vacant Plenary chamber of the European Parliament in Brussels, Tuesday, March 10, 2020.

AP Photo/Virginia Mayo

Paper

Transatlantic Dialogue: The Missing Link in Europe’s Post-Covid-19 Green Deal?

| April 2020

This policy brief emphasizes that the European Green Deal's effectiveness in a post Covid-19 world will require the involvement of strategic partners, especially the US. In the context of a potential US withdrawal from the Paris Agreement and the consequential vacuum, it will be even more important to engage the US in implementing the GD. In light of divergence between the US and the EU during past climate negotiations (e.g. Kyoto, Copenhagen, and Paris), we suggest a gradual approach to US engagement with GD initiatives and objectives.

Workers dismantle the Belt and Road Forum logo next to the “Golden Bridge of Silk Road” structure outside the media center as leaders are attending the round table summit of the Belt and Road Forum chaired by Chinese President Xi Jinping in Beijing, Saturday, April 27, 2019

AP Photo/Andy Wong

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

The Triangle in the Long Game

| June 19, 2019

The purpose of this paper is to analyze how China’s new power is reaching Europe, the challenges that it poses, and the European responses to this new reality. This process has to be examined in the context of the current strategic competition between China and the U.S. and its reflection on the transatlantic relationship.

Paper - Cyber Security Project, Belfer Center

A Legislator's Guide to Reauthorizing Section 702

    Author:
  • Anne Boustead
| Aug. 20, 2017

Section 702 of the Foreign Intelligence Surveillance Act (FISA) Amendments Act of 2008, a powerful surveillance tool that allows U.S. government agencies to spy on foreign persons to collect counter-terrorism intelligence, will expire on December 31, 2017 without Congressional reauthorization. This paper has two goals: to concisely describe how agencies obtain information under Section 702, and to provide guidance to legislators and their staffers by examining the core issues they will confront as they consider reauthorizing this legislation.

Planning for Cyber in the North Atlantic Treaty Organization

US Department of State

Report Chapter - Kosciuszko Institute

Planning for Cyber in the North Atlantic Treaty Organization

| July 08, 2016

While the issue of cyber operations beyond NATO’s own networks is a politically difficult one given the complex mosaic of national, transnational (EU), and international law; the role of national intelligence efforts in certain types of operations; and ever-present disputes over burden-sharing, the Alliance already has invaluable experience in developing policies and procedures for contentious and sensitive tools in the form of the Nuclear Planning Group (NPG). This article begins with a brief overview of actions NATO has already taken to address cyberthreats. It will then explore why these, while important, are insufficient for the present and any imaginable future geopolitical threat environment. Next, it will address the history of the NPG, highlighting some parallels with the present situation regarding cyber and drawing out the challenges faced by, and activities and mechanisms of, the NPG. Finally, it will make the case that a group modeled on the NPG can not only significantly enhance the Alliance’s posture in cyberspace, but can serve as an invaluable space for fostering entente and reconciling differences on key aspects of cyber policy. It concludes that the Alliance needs to consider offensive cyber capabilities and planning, and it needs a Cyber Planning Group to do it.

Paper - Potomac Institute for Policy Studies

Cyber Readiness Index 2.0

    Authors:
  • Chris Demchak
  • Jason Kerben
  • Jennifer McArdle
  • Francesca Spidalieri
| November 30, 2015

"Building on CRI 1.0, Cyber Readiness Index 2.0 examines one hundred twenty-five countries that have embraced, or are starting to embrace, ICT and the Internet and then applies an objective methodology to evaluate each country's maturity and commitment to cyber security across seven essential elements."

Report - Global Governance 2022

Securing the Net: Global Governance in the Digital Domain

    Authors:
  • Puji Abbassi
  • Martin Kaul
  • Yi Shen
  • Zev Winkelman
| September 2013

What will be the shape of the internet in 20 years? The authors explore possible futures in global cyber security governance and recommend a robust set of actions that pave a path forward towards establishing an environment in which a more cooperative form of global cyber security governance could evolve.

Paper - Science, Technology, and Public Policy Program, Belfer Center

Internet Fragmentation: Highlighting the Major Technical, Governance and Diplomatic Challenges for U.S. Policy Makers

| May 2012

The Internet is at a crossroads. Today it is generally open, interoperable and unified. Tomorrow, however, we may see an entirely different Internet, one not characterized by openness and global reach, but by restrictions, blockages and cleavages. In order to help ensure that the Internet continues to serve as a source of global integration, democratization, and economic growth, American policymakers must be aware of the most significant technical, political and legal challenges to a unified Internet.

A Pakistani Internet user surfs the YouTube Web site at a local Internet cafe in Islamabad, Pakistan, Feb. 26, 2008. Pakistan defended its clampdown on the YouTube Web site which accidentally interrupted access for Internet users around the globe.

AP Photo

Paper - Munk School of Global Affairs, University of Toronto

Duties for Internet Service Providers

| March 2012

In today's interconnected world, the Internet is no longer a tool. Rather, it is a service that helps generate income and employment, provides access to business and information, enables e-learning, and facilitates government activities. It is an essential service that has been integrated into every part of our society. Our experience begins when an Internet Service Provider (ISP) uses fixed telephony (plain old telephone service), mobile-cellular telephony, or fixed fiber-optic or broadband service to connect us to the global network. From that moment on, the ISP shoulders the responsibility for the instantaneous, reliable, and secure movement of our data over the Internet.