Reports & Papers

100 Items

Report - CNA's Center for Naval Analyses

Russia and the Global Nuclear Order

| March 2024

Russia's 2022 invasion of Ukraine illuminated the long profound shadow of nuclear weapons over international security. Russia's nuclear threats have rightfully garnered significant attention because of the unfathomable lethality of nuclear weapons. However, the use of such weapons in Ukraine is only one way—albeit the gravest— that Russia could challenge the global nuclear order. Russia's influence extends deep into the very fabric of this order—a system to which it is inextricably bound by Moscow's position in cornerstone institutions such as the Nuclear Non-Proliferation Treaty (NPT) and the International Atomic Energy Agency (IAEA). From withdrawing from key treaties to stymieing resolutions critical of misconduct, Moscow has demonstrated its ability to challenge the legitimacy, relevance, and interpretations of numerous standards and principles espoused by the West.

U.S. and UK flags

Alex Brandon | AP

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

Forging a Democratic Decision Advantage

| October 2023

2023 marked eighty years since the wartime adoption of the BRUSA Agreement between Great Britain and the United States. This 1943 document codified the growing relationship between U.S. and U.K. signals intelligence organizations and included policies governing the exchange of personnel and joint regulations for handling sensitive material. Security directives and protocols aligned operational processes between the democratic governments, setting new cooperative standards for nation-states battling authoritarian regimes.

A lighthouse, battered by waves, sits at the center of this dark and stormy seascape.

AP Photo/Matt Dunham

Report - Belfer Center for Science and International Affairs

Democracy and the Liberal World Order Amid the Rise of Authoritarianism

| Aug. 14, 2023

The entanglement and feedback loops among the domestic and the geopolitical cycles of distrust have resulted in a cohesive threat to democracy: a downward political spiral that is pulling societies towards enmity. This spiral feeds on and generates destructive human emotions at massive scale, such as outrage and hatred, that lead to violence, war, and autocracy, so it can be better understood as a dangerous global maelstrom of distrust, which could sink democracy worldwide. As showcased by historical evidence, domestic and international forces do not act in isolation from each other. Democratic backsliding, the rise of authoritarianism and totalitarianism, and the politics of aggression generated feedback loops in the 1930s, that resulted in WWII. Similar forces are again working in the 2020s. If massive distrust can wreck democracy worldwide, it follows that the regeneration of trust is the path to democratic revitalization.

The countries' flags are seen on the table during a meeting between Secretary of Defense Lloyd Austin and Australian Deputy Prime Minister and Minister of Defense Richard Marles at the Pentagon, Monday, Dec. 5, 2022, in Washington.

AP Photo/Alex Brandon

Paper - Australian Strategic Policy Institute

Australia-US Technology Collaboration for Defense

| Nov. 29, 2022

In this paper, I propose five key science and technology areas for greater US-Australia collaboration that carry significant national security and defence risks for both countries. Rapid progress against these challenges will position us for success and strengthen our resilience against groups that seek to undermine the global rules-based order. 

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

Technology Primer: Social Media Recommendation Algorithms

| Aug. 25, 2022

The use of social media platforms like Facebook, Twitter, YouTube, and TikTok is increasingly widespread, currently amounting to billions of users worldwide. Social media companies deploy proprietary recommendation algorithms to automate the selection, ranking, and presentation of content on the platform’s “feed” or recommended content section, every time a user opens or refreshes the site or app. However, social media recommendation algorithms have a range of privacy, security, information quality, and psychological concerns for users. 

A successful approach to the regulation of social media recommendation algorithms will require a combination of government regulation, self governance, and external oversight to facilitate value alignment across these diverse actors and tackle the various challenges associated with this technology. This publication explores the technical components of social media recommendation systems, as well as their public purpose considerations. 

teaser image

Report

Digital Crime Scenes: The Role of Digital Evidence in the Persecution of LGBTQ People in Egypt, Lebanon, and Tunisia

    Author:
  • Afsaneh Rigot
| Mar. 07, 2022

Digital evidence–primarily from device searches–has made it easier for law enforcement to identify, harass, and prosecute LGBTQ people on the basis of their identity. This new report by Technology and Public Purpose fellow and Berkman Klein Center affiliate Afsaneh Rigot draws on years of in-depth research, including reviews of individual court case files and interviews with defense attorneys in Egypt, Lebanon, and Tunisia, to demonstrate the painful and unjust impacts of these developments, as well as the communities’ resilience. 

Afsaneh Rigot has deep experience with both the needs and views of queer people in MENA as well as engaging tech companies to make meaningful change. She advocates for a methodology she terms Design from the Margins. Rigot calls on companies to use the findings of this report to build from the essential needs of those most impacted by their tools, creating better tech for all users in the process.

Les Droits de l’Homme, 1947 - a surrealist painting showing an anthropomorphic chess piece standing on a bridge next to a flaming tuba.

Rene Magritte

Report

Whose Streets? Our Streets! (Tech Edition)

    Author:
  • Rebecca Williams
| August 2021

This report is an urgent warning of where we are headed if we maintain our current trajectory of augmenting our public space with trackers of all kinds. In this report, I outline how current “smart city” technologies can watch you. I argue that all “smart city” technology trends toward corporate and state surveillance and that if we don’t stop and blunt these trends now that totalitarianism, panopticonism, discrimination, privatization, and solutionism will challenge our democratic possibilities. This report examines these harms through cautionary trends supported by examples from this last year and provides 10 calls to action for advocates, legislatures, and technology companies to prevent these harms. If we act now, we can ensure the technology in our public spaces protect and promote democracy and that we do not continue down this path of an elite few tracking the many. 

Report - Technology and Public Purpose

Building a 21st Century Congress: A Playbook for Modern Technology Assessment

| June 2021

How can United States policymakers better understand the next generation of emerging technologies and their societal implications? How can we make more educated decisions on the basic and applied research needed to solve the next generation of emerging threats? 

The 117th Congress and the Biden Administration must urgently address these questions to protect the lives and livelihoods of those living in the United States.
 

A scene of the Bay Bridge with San Francisco in the background

Adobe Stock

Paper

Venture Capital and Public Purpose Playbook

    Authors:
  • Liz Sisson 
  • Nathalie Gazzaneo
  • Campbell Howe
| April 2021

The Venture Capital Public Purpose Indicator and this accompanying playbook provide guidance to VCs and startups that are interested in preventing negative consequences and in laying a public purpose foundation.  They can be used alongside other existing diligence or planning processes.

Paper

The Coming AI Hackers

| April 2021

Hacking is generally thought of as something done to computer systems, but this conceptualization can be extended to any system of rules. The tax code, financial markets, and any system of laws can be hacked. This essay considers a world where AIs can be hackers. This is a generalization of specification gaming, where vulnerabilities and exploits of our social, economic, and political systems are discovered and exploited at computer speeds and scale.