Reports & Papers

13 Items

Office workers using sticky notes on a wall

Adobe Stock

Paper

Human-Centered Policymaking

| April 2020

Human-centered design (HCD) is a complementary discipline that has its roots in industrial design, the discipline that crafts physical products like phones, guitars, and potato peelers. It leverages the qualitative research methods honed in the social sciences—such as ethnography, contextual inquiry, and targeted observations and interviews—to better understand people and interactions. HCD also considers environments, processes, systems, and tools outside of the digital realm. Practitioners often map out customer “journeys” to understand customer experiences across an entire system or ecosystem, not merely a single interface or piece of software. As in agile software development, practitioners of human-centered design iteratively develop solutions to the challenges they uncover, and they rigorously test their solutions with real “users.”

Travelers from China’s Wuhan and other cities go through body temperature scanners at Narita international airport in Narita, near Tokyo, Thursday, Jan. 23, 2020.

AP Photo/Eugene Hoshiko

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Weaponizing Digital Health Intelligence

| January 2020

This paper argues that these potential vulnerabilities deserve rigorous, urgent, and thorough investigation. First, it draws from cybersecurity literature, and reviews general sources of vulnerability in digital systems. Next, with these sources of vulnerability in mind, it reviews the health intelligence systems used in the US as well as in a current Public Health Emergency of International Concern (PHEIC), the Ebola outbreak in the Democratic Republic of the Congo (DRC). It then It then reviews the possible motives state actors have to attack health intelligence systems, drawing on recent examples of state-led efforts to manipulate, conceal, or undermine health information. It then speculates about what an attack on a health intelligence system might look like. It concludes by proposing a research and education agenda to thoroughly interrogate these issues and generate policy recommendations needed to address them.

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Attacking Artificial Intelligence: AI’s Security Vulnerability and What Policymakers Can Do About It

| August 2019

The terrorist of the 21st century will not necessarily need bombs, uranium, or biological weapons. He will need only electrical tape and a good pair of walking shoes. Placing a few small pieces of tape inconspicuously on a stop sign at an intersection, he can magically transform the stop sign into a green light in the eyes of a self-driving car. Done at one sleepy intersection, this would cause an accident. Done at the largest intersections in leading metropolitan areas, it would bring the transportation system to its knees. It’s hard to argue with that type of return on a $1.50 investment in tape.

PRC flag with digital overlay

Adobe Stock

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Governing Cyberspace: State Control vs. The Multistakeholder Model

| August 2019

This paper is part of a Track-II dialogue between the Belfer Center’s China Cyber Policy Initiative and the China Institute for International Strategic Studies (CIISS) to manage the risk of cyber conflict between the two countries through dialogue and concrete policy recommendations. The paper includes two parts: a cyber governance theory written by Chinese People’s Liberation Army Major General (ret.) Hao Yeli, a senior adviser to CIISS, and a response prepared by Belfer Center Co-Director Eric Rosenbach and Research Assistant Shu Min Chong.

In this image made on Friday, April 27, 2012, pages of rival Taiwan newspapers Apple Daily, top half, and The China Times, bottom, are seen depicting each other’s owners in a fight for ownership of a major chunk of Taiwan’s media outlets. (AP)

AP Photo

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

Disinformation Threat Watch

While disinformation is a relatively new priority for Western democracies, countries such as Taiwan and South Korea have spent decades battling influence operations from internal and external actors. As democracies, they share structural strengths and challenges with the US, such as the free-flow of information and protections for civil liberties. Based on interviews with over fifty government officials, journalists, and civil society members, the Taiwan and South Korea case studies outline the many specific disinformation characteristics. By highlighting lessons learned from Taiwan and South Korea’s experiences, we hope to equip US policymakers with a wider portfolio of potential solutions.

Report - Belfer Center for Science and International Affairs and Arthur Rock Center for Entrepreneurship

Reimagining Investing in Frontier Technology

| June 12, 2019

Harvard Kennedy School’s Belfer Center for Science and International Affairs’ Technology and Public Purpose Project (TAPP) and Harvard Business School’s Arthur Rock Center for Entrepreneurship co-hosted Reimagining Investing in Frontier Technology on May 15, 2019. This workshop convened over 70 investors (Limited Partners and General Partners), entrepreneurs, technologists, and others investing in and building frontier technologies in areas including artificial intelligence, genome engineering, advanced computing technologies, and more. The workshop explored the challenges investors and entrepreneurs face in bringing products to market in ways that maximize their benefits to society while minimizing harms.

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

The Geopolitics of Information

| May 28, 2019

To compete and thrive in the 21st century, democracies, and the United States in particular, must develop new national security and economic strategies that address the geopolitics of information. In the 20th century, market capitalist democracies geared infrastructure, energy, trade, and even social policy to protect and advance that era’s key source of power—manufacturing. In this century, democracies must better account for information geopolitics across all dimensions of domestic policy and national strategy.

Deputy Secretary General Alexander Vershbow and the 28 Permanent Representatives to the North Atlantic Council visit NATO’s cyber defence centre at Supreme Headquarters Allied Powers Europe in Mons, Belgium on Friday, 23 January 2015.

NATO

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

National Counter-Information Operations Strategy

| February 2019

While nation-state competitors have employed propaganda and information operations (IO) targeting the United States for decades, in recent years their efforts have changed dramatically. The rise of the Internet and social media as mechanisms for disseminating news has made our country both more globally interconnected and simultaneously more vulnerable to foreign efforts to destabilize our democracy. There is now clear evidence that Russia used influence operations designed to undermine U.S. democracy and citizens’ trust in its integrity in both the 2016 and 2018 election cycles. Adversaries are actively using information as a weapon to attack the United States, our political system, and citizens’ trust in it.

The U.S. Capitol is seen at sunrise, in Washington, October 10, 2017

AP Photo/J. Scott Applewhite

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Protecting Democracy in an Era of Cyber Information War

| February 2019

Citizens voluntarily carry Big Brother and his relatives in their pockets. Along with big data and artificial intelligence, technology has made the problem of defending democracy from information warfare far more complicated than foreseen two decades ago. And while rule of law, trust, truth and openness make democracies asymmetrically vulnerable, they are also critical values to defend.  Any policy to defend against cyber information war must start with the Hippocratic oath: first, do no harm.

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Ending the Cybersecurity Arms Race

| February 2018

Network security has always been something of balancing act between maximizing sharing and ease of use, and erecting barriers.

When computer networks first emerged, there were few limitations on what could be transmitted over them. However, after the world’s first major network computer security incident—the Morris Worm of 1988—organizations began to retreat behind network-level firewalls and anti-virus software. Some defenders even tried to completely disconnect their networks from the outside world via “air gaps.”

This paper argues that it is time to move beyond the security paradigm of separating networks, as epitomized by the air gap. Instead, network defenders should embrace an approach which allows sharing and connectedness, anticipates that adversaries will penetrate the network, and is able to detect, and ultimately eject those adversaries before they can do harm.