Reports & Papers

31 Items

US Climate Policy graphic

Getty Images

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Climate Change Requires New Approaches to Disaster Planning and Response

    Author:
  • David J. Hayes
| June 2023

To date, most of the climate policy attention has been focused on the need to reduce the greenhouse gases that are causing climate change and, as a corollary, to accelerate the U.S. economy’s transition from fossil fuels to clean energy. Yet climate change also is straining our nation’s emergency response capabilities as traditional climate-infused disasters such as hurricanes and floods become more frequent and destructive. At the same time, the emergency response community faces new challenges as slower-to-develop climate impacts like drought, heat, and wildfire increasingly are hitting an acute tipping points and becoming life- and livelihood-threatening disasters.

Earth represented by binary code and lines

Getty Images

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Reach, Choice, and Transparency: Governing the Internet in the 21st Century

| May 2023

As inventions go, the Internet stacks up with the best of them: the lightbulb, the automobile, even fire. In its first thirty years, the Internet’s worldwide adoption and breadth of application has exceeded any other technological advance in history. It expands our reach by bringing people, experiences, and things to us with the click of a mouse. It connects us to an increasing number of gadgets, from smartphones to voice kiosks and soon self-driving vehicles that will no doubt converse with us while we commute, happily oblivious to the traffic around us. We revel in our newfound agility and versatility. Importantly, our precious network kept us sane during a worldwide pandemic and enabled the world to work remotely while most of its population was frozen at home. For resilience against catastrophes alone, the Internet has become indispensable.

An unaccompanied minor looks up as he waits to answer questions from a U.S. Border Patrol agent at an intake site after he was smuggled on an inflatable raft across the Rio Grande river in Roma, Texas, Wednesday, March 24, 2021. 

AP Photo/Dario Lopez-Mills

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Improving Migrant Child Welfare at the Southwest Border

    Author:
  • Andrew R. Lorenzen-Strait
| February 2023

Policymakers need to act now and place child welfare professionals, not law enforcement actors, at the border to effectively screen and interview migrant children. Information sharing practices need to be improved, with a movement away from paper documents that can easily get lost to an approach that is digital, secure, and accessible by the child, their guardian, their lawyer, and their doctor. Further, the enforcement processing facilities need to undergo an immediate infrastructural transformation with the addition of new design features that are necessary and sensitive to the majority demographic that are held within facilities—children and families.

These actions are doable and require no legislative action. Migrant children deserve decisive action to ensure that their health, safety, and well-being is not jeopardized as they seek refuge in the United States.

A worker wearing a mask a performing work

AP Photo/Mark Schiefelbein

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Combatting Forced Labor in Global Supply Chains

    Authors:
  • Sarah Bishop
  • Tom Plotkin
  • Emanuel Ghebregergis
| January 2023

In recent years, the U.S. government has accelerated its efforts to eradicate forced labor from global supply chains. Those efforts have been led primarily by U.S. Customs and Border Protection (CBP), which has been actively enforcing a long-standing statutory prohibition on the importation of goods made with forced labor, bolstered by recent legislation that has provided it with more substantial regulatory authority. CBP’s evolving enforcement regime suffers, however, from certain shortcomings, including a lack of adequate incentives and legal protections for importers and their suppliers to work collaboratively with the government to craft remediation programs that address the root causes of forced labor.

Flooding Red River

Flickr CC/Loozrboy

Paper - Belfer Center for Science and International Affairs and Wilson International Center for Scholars

Emergency Management in North America

| February 2022

North America continues to face evolving challenges to comprehensive emergency management. As climate change, technology, global health, and the nature and scale of emergencies change, so does the need for improved coordination among the United States, Mexico, and Canada. This is further complicated by the distinct federal systems that operate in each country, and the different roles that national, regional, and private corporations can and should play across all of these separate jurisdictions.

teaser image

Paper

Disrupting Transnational Criminal Activity: A Law Enforcement Strategy for Homeland Security

| May 21, 2021

Transnational criminal activity, organized or not, presents a substantial internal security threat to the United States as it does to other nation-states across the world. Combating it remains a critical mission in the homeland security enterprise. Federal efforts across that enterprise, however, remain scattered and largely ineffectual, and many types of transnational crime are resistant to the law enforcement tactics used domestically.

This paper proposes that the U.S. Department of Homeland Security (DHS) take the lead in supplementing the traditional “criminal justice” approach to countering transnational crime with strategies that aim to disrupt it and insulate Americans from its harmful effects. We contend the “Disruption Model” outlined here,* if broadly implemented, could significantly complement the current conventional approach, and produce materially improved results in managing the challenges of transnational crime and protecting the homeland from its ravages.

Voters mark their ballots during early voting at the Park Slope Armory in Brooklyn, Tuesday, Oct. 27, 2020.

AP Photo/Mary Altaffer

Report - Defending Digital Democracy

Beyond 2020: Policy Recommendations for the Future of Election Security

| February 2021

The 2020 election presents a paradox. Despite dramatic changes to the election process due to the COVID-19 pandemic and increasingly complex threats since the 2016 election, 2020 is widely regarded as “the most secure [election] in American history.” Operationally, it was also one of the smoothest. State and local election officials overcame unprecedented challenges and scarce resources to administer an election with fewer incidents of cyber compromises, technical failures or long lines than anticipated. After Election Day, recount procedures functioned as designed. Yet, amidst these successes, officials from both parties faced a barrage of mis- and disinformation about the election process that served to undermine confidence in the result.

Though the election security ecosystem survived the triple threat of cybersecurity, physical security, and mis- and disinformation in 2020, this success will prove to be hard to replicate in future election cycles without proper investment and reinforcement.

A staff member in the Kweisi Mfume campaign uses gloves while holding a cell phone during an election night news conference at his campaign headquarters after Mfume, a Democrat, won Maryland’s 7th Congressional District special election, Tuesday, April 28, 2020, in Baltimore.

AP Photo/Julio Cortez

Report

The Election Influence Operations Playbook, Part 1

| September 2020

Influence Operations (IO), also known as Information Operations, are a series of warfare tactics historically used to collect information, influence, or disrupt the decision making of an adversary. IO strategies intentionally disseminate information to manipulate public opinion and/or influence behavior. IO can involve a number of tactics, including spreading false information intentionally. This is known as “disinformation.”   

Skilled influence operations often deliberately spread disinformation in highly public places like social media. This is done in the hope that people who have no connection to the operation will mistakenly share this disinformation. Inaccurate information spread in error without malicious intent is known as “misinformation.” 

This playbook explores mis- and disinformation incidents that specifically focus on elections operations and infrastructure. Election officials may not often see or know what the motivation is behind the incidents encountered or whether they are mis- or disinformation. Throughout these guides we refer to mis/disinformation incidents together, as the strategies for countering or responding to them are the same.  

Voters wait in a line outside Broad Ripple High School to vote in the Indiana primary in Indianapolis, Tuesday, June 2, 2020 after coronavirus concerns prompted officials to delay the primary from its original May 5 date.

AP Photo/Michael Conroy

Report

The Election Influence Operations Playbook, Part 2

| September 2020

This section of the Playbook includes recommendations and materials focused on the response process. It will help election officials respond to election-related mis and disinformation incidents quickly and in a coordinated fashion. 

In this playbook, we refer to mis/disinformation throughout as one concept. Instances of both misinformation and disinformation in the elections process provide incorrect information to voters. Incorrect information can be conveyed intentionally or unintentionally. For election officials, any incorrect information, regardless of source or intention, presented to voters can pose a threat to elections, because it can undermine voters’ understanding of and trust in the election.

In this April 22, 2020 photo, Gerard Bakulikira, right, and captain Tim Daghelet, left, both wear a Romware COVID Radius digital bracelet, which flashes red when people are too close to each other and creates a log of contacts. 

AP Photo/Virginia Mayo

Paper

Considerations for Digital Contact Tracing Tools for COVID-19 Mitigation: Recommendations for Stakeholders and Policymakers

Many are looking to digital contact tracing to assist reopening efforts, especially in light of reports that the U.S. could expect as many as 100,000 more deaths due to the virus by this Fall. This report focuses on how the U.S. might consider various proposed solutions.

We believe there are real benefits, challenges, and even potential harms in using digital solutions in the fight against COVID-19, but we must also acknowledge that the promise of any technology and associated systems to assist manual contact tracing efforts is largely hypothetical in the United States. There is not one catch-all answer; the truth is that technology is not a panacea, but it may be able to assist official efforts at an unprecedented time. However, no technological solution can succeed without two specific factors: public trust and buy-in, and rapid, widespread testing for everyone living in the U.S. To achieve the first, a number of factors must be addressed by officials in the states looking to implement digital solutions, and by technology developers.