Reports & Papers

60 Items

Technicians in clean room learn to make semiconductors

Photo from ATE Impacts 2022-2023

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

Community Colleges and the Semiconductor Workforce

| June 2023

Over the last several decades, the U.S.’s domestic semiconductor manufacturing capacity has declined. The CHIPS Act aims to reverse this trend by investing over $50 billion in direct funding and loan subsidies to expand semiconductor research and development and manufacturing in the U.S. This primer focuses on the workforce challenges that will be spurred by this microelectronics industry expansion and proposes how community colleges can play a critical role in addressing these challenges. 

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

Technology Primer: Smart Wearables and Health

    Editors:
  • Zhenan Bao
  • Lisa Cadmus-Bertram
  • Charles Odonkor
  • Jessica Rich
  • David A. Simon
  • Ariel D. Stern
| June 05, 2023

Smart wearables are quickly becoming the next wave of ubiquitous technologies due to their vast market penetration and broad utility. In the healthcare setting, smart wearables may be used to advance preventative health measures, emergency medicine, and primary care. This technology has the potential to revolutionize the way that healthcare is done, but major technical and nontechnical limitations exist and the regulation of these technologies is still underdeveloped.

A computer code is seen on displays in the office of Global Cyber Security Company Group-IB in Moscow, Russia, Wednesday, Oct. 25, 2017. A new strain of malicious software has paralyzed computers at a Ukrainian airport, the Ukrainian capital's subway and at some independent Russian media. Moscow-based Global Cyber Security Company Group-IB said in a statement Wednesday the ransomware called BadRabbit also tried to penetrate the computers of major Russian banks but failed.

AP Photo/Pavel Golovkin

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Addressing Russian and Chinese Cyber Threats: A Transatlantic Perspective on Threats to Ukraine and Beyond

| May 2023

In an interconnected world, cyberattacks are becoming more frequent and sophisticated. Building resilience against this asymmetric threat is critical for countries to protect their economies, critical infrastructure, and democratic institutions. However, cyberattacks do not respect borders, and no country can address this threat alone. The strength and longevity of the transatlantic partnership between the EU and the U.S. presents a unique opportunity to address this strategic threat through international cooperation. Through an analysis of cyberwarfare in the ongoing war in Ukraine, this paper proposes policy recommendations to enhance transatlantic coordination and cooperation against current and future adversaries in a new era of strategic competition. Ultimately, a stronger transatlantic partnership is critical for protecting international democratic norms, building resilience against cyber threats, and strengthening global security and stability.

A person on the left bends to take pictures of a drone showcased on a platform on the right.

AP Photo/Joe Buglewicz

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Buying What Works: An Acquisitions Strategy for the Reality of Dual-Use Technologies

| October 2022

In this student research paper, Harvard Kennedy School student Coen Williams finds that  The Department of Defense should implement an “effects-driven” acquisitions system rather than “capabilities-based” to effectively acquire and utilize commercially developed capabilities. An effects-driven acquisitions system will increase the diversity of solutions, and by appropriating money to effects-driven portfolios, Congress can still maintain control of the purse while the Department of Defense can more effectively allocate its appropriated funds.

teaser image

Report

Digital Crime Scenes: The Role of Digital Evidence in the Persecution of LGBTQ People in Egypt, Lebanon, and Tunisia

    Author:
  • Afsaneh Rigot
| Mar. 07, 2022

Digital evidence–primarily from device searches–has made it easier for law enforcement to identify, harass, and prosecute LGBTQ people on the basis of their identity. This new report by Technology and Public Purpose fellow and Berkman Klein Center affiliate Afsaneh Rigot draws on years of in-depth research, including reviews of individual court case files and interviews with defense attorneys in Egypt, Lebanon, and Tunisia, to demonstrate the painful and unjust impacts of these developments, as well as the communities’ resilience. 

Afsaneh Rigot has deep experience with both the needs and views of queer people in MENA as well as engaging tech companies to make meaningful change. She advocates for a methodology she terms Design from the Margins. Rigot calls on companies to use the findings of this report to build from the essential needs of those most impacted by their tools, creating better tech for all users in the process.

Les Droits de l’Homme, 1947 - a surrealist painting showing an anthropomorphic chess piece standing on a bridge next to a flaming tuba.

Rene Magritte

Report

Whose Streets? Our Streets! (Tech Edition)

    Author:
  • Rebecca Williams
| August 2021

This report is an urgent warning of where we are headed if we maintain our current trajectory of augmenting our public space with trackers of all kinds. In this report, I outline how current “smart city” technologies can watch you. I argue that all “smart city” technology trends toward corporate and state surveillance and that if we don’t stop and blunt these trends now that totalitarianism, panopticonism, discrimination, privatization, and solutionism will challenge our democratic possibilities. This report examines these harms through cautionary trends supported by examples from this last year and provides 10 calls to action for advocates, legislatures, and technology companies to prevent these harms. If we act now, we can ensure the technology in our public spaces protect and promote democracy and that we do not continue down this path of an elite few tracking the many. 

A miniature of “The War Room” as depicted in the 1964 classic film Dr. Strangelove

Courtesy Eric Chan  and the Los Angeles County Museum of Art, CC-BY 2.0

Paper

Toward a Collaborative Cyber Defense and Enhanced Threat Intelligence Structure

| August 2021

National security structures envisioned in the 20th century are inadequate for the cyber threats that America faces in the 21st century. These structures, created to address strategic, external threats on one end, and homeland security emergencies on the other, cannot protect us from ambient cyber conflict, because they were designed for different times and threats. Our nation—comprising the federal government, private sector companies, critical infrastructure operators, state and local governments, nonprofits and universities, and even private citizens—are constantly under attack by a myriad of cyber actors with ever-increasing capabilities. 

Report - Technology and Public Purpose

Building a 21st Century Congress: A Playbook for Modern Technology Assessment

| June 2021

How can United States policymakers better understand the next generation of emerging technologies and their societal implications? How can we make more educated decisions on the basic and applied research needed to solve the next generation of emerging threats? 

The 117th Congress and the Biden Administration must urgently address these questions to protect the lives and livelihoods of those living in the United States.
 

Report - Cyber Project

Zero Botnets: An Observe-Pursue-Counter Approach

June 2021

Adversarial Internet robots (botnets) represent a growing threat to the safe use and stability of the Internet. Botnets can play a role in launching adversary reconnaissance (scanning and phishing), influence operations (upvoting), and financing operations (ransomware, market manipulation, denial of service, spamming, and ad click fraud) while obfuscating tailored tactical operations. Reducing the presence of botnets on the Internet, with the aspirational target of zero, is a powerful vision for galvanizing policy action. Setting a global goal, encouraging international cooperation, creating incentives for improving networks, and supporting entities for botnet takedowns are among several policies that could advance this goal.