Reports & Papers

14 Items

A staff member in the Kweisi Mfume campaign uses gloves while holding a cell phone during an election night news conference at his campaign headquarters after Mfume, a Democrat, won Maryland’s 7th Congressional District special election, Tuesday, April 28, 2020, in Baltimore.

AP Photo/Julio Cortez

Report

The Election Influence Operations Playbook, Part 1

September 2020

Influence Operations (IO), also known as Information Operations, are a series of warfare tactics historically used to collect information, influence, or disrupt the decision making of an adversary. IO strategies intentionally disseminate information to manipulate public opinion and/or influence behavior. IO can involve a number of tactics, including spreading false information intentionally. This is known as “disinformation.”   

Skilled influence operations often deliberately spread disinformation in highly public places like social media. This is done in the hope that people who have no connection to the operation will mistakenly share this disinformation. Inaccurate information spread in error without malicious intent is known as “misinformation.” 

This playbook explores mis- and disinformation incidents that specifically focus on elections operations and infrastructure. Election officials may not often see or know what the motivation is behind the incidents encountered or whether they are mis- or disinformation. Throughout these guides we refer to mis/disinformation incidents together, as the strategies for countering or responding to them are the same.  

Voters wait in a line outside Broad Ripple High School to vote in the Indiana primary in Indianapolis, Tuesday, June 2, 2020 after coronavirus concerns prompted officials to delay the primary from its original May 5 date.

AP Photo/Michael Conroy

Report

The Election Influence Operations Playbook, Part 2

September 2020

This section of the Playbook includes recommendations and materials focused on the response process. It will help election officials respond to election-related mis and disinformation incidents quickly and in a coordinated fashion. 

In this playbook, we refer to mis/disinformation throughout as one concept. Instances of both misinformation and disinformation in the elections process provide incorrect information to voters. Incorrect information can be conveyed intentionally or unintentionally. For election officials, any incorrect information, regardless of source or intention, presented to voters can pose a threat to elections, because it can undermine voters’ understanding of and trust in the election.

In this April 22, 2020 photo, Gerard Bakulikira, right, and captain Tim Daghelet, left, both wear a Romware COVID Radius digital bracelet, which flashes red when people are too close to each other and creates a log of contacts. 

AP Photo/Virginia Mayo

Paper

Considerations for Digital Contact Tracing Tools for COVID-19 Mitigation: Recommendations for Stakeholders and Policymakers

Many are looking to digital contact tracing to assist reopening efforts, especially in light of reports that the U.S. could expect as many as 100,000 more deaths due to the virus by this Fall. This report focuses on how the U.S. might consider various proposed solutions.

We believe there are real benefits, challenges, and even potential harms in using digital solutions in the fight against COVID-19, but we must also acknowledge that the promise of any technology and associated systems to assist manual contact tracing efforts is largely hypothetical in the United States. There is not one catch-all answer; the truth is that technology is not a panacea, but it may be able to assist official efforts at an unprecedented time. However, no technological solution can succeed without two specific factors: public trust and buy-in, and rapid, widespread testing for everyone living in the U.S. To achieve the first, a number of factors must be addressed by officials in the states looking to implement digital solutions, and by technology developers.
 

Voters line up in voting booths to cast their ballots at Robious Elementary School in Richmond, Va. on Tuesday, Nov. 8, 2016. The mural in the background was painted by 3rd and 4th graders at the school in preparation for Veterans Day.

Shelby Lum/Richmond Times-Dispatch via AP

Paper

The Elections Battle Staff Playbook

December 2019

Our previous Playbooks have focused on the threats posed by cyber attacks and information operations. This Playbook has a broader scope, and equips you with strategies to operationalize the guidance from past Playbooks through effective preparation, communication, incident tracking, and team organization. By compiling best practices from private and public sector actors, we hope to enhance the capacity of your election team, regardless of your staff or jurisdiction size. It will better prepare you to identify issues and respond to incidents of all types during election operations.

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

The Geopolitics of Information

| May 28, 2019

To compete and thrive in the 21st century, democracies, and the United States in particular, must develop new national security and economic strategies that address the geopolitics of information. In the 20th century, market capitalist democracies geared infrastructure, energy, trade, and even social policy to protect and advance that era’s key source of power—manufacturing. In this century, democracies must better account for information geopolitics across all dimensions of domestic policy and national strategy.

Deputy Secretary General Alexander Vershbow and the 28 Permanent Representatives to the North Atlantic Council visit NATO’s cyber defence centre at Supreme Headquarters Allied Powers Europe in Mons, Belgium on Friday, 23 January 2015.

NATO

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

National Counter-Information Operations Strategy

| February 2019

While nation-state competitors have employed propaganda and information operations (IO) targeting the United States for decades, in recent years their efforts have changed dramatically. The rise of the Internet and social media as mechanisms for disseminating news has made our country both more globally interconnected and simultaneously more vulnerable to foreign efforts to destabilize our democracy. There is now clear evidence that Russia used influence operations designed to undermine U.S. democracy and citizens’ trust in its integrity in both the 2016 and 2018 election cycles. Adversaries are actively using information as a weapon to attack the United States, our political system, and citizens’ trust in it.

People vote on the first day of early voting in Miami-Dade County, Monday, Oct. 22, 2018.

AP Photo/Lynne Sladky

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Defending Vote Casting: Using Blockchain-based Mobile Voting Applications in Government Elections

    Author:
  • Irene Solaiman
| October 2018

Threats to U.S. elections, including undermined trust in election infrastructure and vote casting accessibility, necessitate innovation in voting security and accessibility.

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

Catching Swedish Phish: How Sweden is Protecting its 2018 Elections

    Author:
  • Gabriel Cederberg
| Sep. 07, 2018

Alarmed by Russia’s brazen interference in the 2016 US Election, Sweden began preparing for its September 2018 election in earnest. Over the past year and a half, Sweden has created a comprehensive strategy based on a clear understanding of the threat; it has learned lessons from other targeted elections; and it has developed a whole-of-society defense—mobilizing not just the government, but also the Swedish media and Swedish citizens.

Election Cyber Incident Communications Plan Template: International Edition

Adobe Stock

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

Election Cyber Incident Communications Plan Template: International Edition

May 2018

This Template is primarily intended for use by political parties or campaigns as a foundation from which they can develop their own tailored communications response plans, which include best practices, recommended external response processes, and scenarios to anticipate an election cyber incident.