Reports & Papers

73 Items

US Climate Policy graphic

Getty Images

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Climate Change Requires New Approaches to Disaster Planning and Response

    Author:
  • David J. Hayes
| June 2023

To date, most of the climate policy attention has been focused on the need to reduce the greenhouse gases that are causing climate change and, as a corollary, to accelerate the U.S. economy’s transition from fossil fuels to clean energy. Yet climate change also is straining our nation’s emergency response capabilities as traditional climate-infused disasters such as hurricanes and floods become more frequent and destructive. At the same time, the emergency response community faces new challenges as slower-to-develop climate impacts like drought, heat, and wildfire increasingly are hitting an acute tipping points and becoming life- and livelihood-threatening disasters.

Earth represented by binary code and lines

Getty Images

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Reach, Choice, and Transparency: Governing the Internet in the 21st Century

| May 2023

As inventions go, the Internet stacks up with the best of them: the lightbulb, the automobile, even fire. In its first thirty years, the Internet’s worldwide adoption and breadth of application has exceeded any other technological advance in history. It expands our reach by bringing people, experiences, and things to us with the click of a mouse. It connects us to an increasing number of gadgets, from smartphones to voice kiosks and soon self-driving vehicles that will no doubt converse with us while we commute, happily oblivious to the traffic around us. We revel in our newfound agility and versatility. Importantly, our precious network kept us sane during a worldwide pandemic and enabled the world to work remotely while most of its population was frozen at home. For resilience against catastrophes alone, the Internet has become indispensable.

A worker wearing a mask a performing work

AP Photo/Mark Schiefelbein

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Combatting Forced Labor in Global Supply Chains

    Authors:
  • Sarah Bishop
  • Tom Plotkin
  • Emanuel Ghebregergis
| January 2023

In recent years, the U.S. government has accelerated its efforts to eradicate forced labor from global supply chains. Those efforts have been led primarily by U.S. Customs and Border Protection (CBP), which has been actively enforcing a long-standing statutory prohibition on the importation of goods made with forced labor, bolstered by recent legislation that has provided it with more substantial regulatory authority. CBP’s evolving enforcement regime suffers, however, from certain shortcomings, including a lack of adequate incentives and legal protections for importers and their suppliers to work collaboratively with the government to craft remediation programs that address the root causes of forced labor.

Les Droits de l’Homme, 1947 - a surrealist painting showing an anthropomorphic chess piece standing on a bridge next to a flaming tuba.

Rene Magritte

Report

Whose Streets? Our Streets! (Tech Edition)

    Author:
  • Rebecca Williams
| August 2021

This report is an urgent warning of where we are headed if we maintain our current trajectory of augmenting our public space with trackers of all kinds. In this report, I outline how current “smart city” technologies can watch you. I argue that all “smart city” technology trends toward corporate and state surveillance and that if we don’t stop and blunt these trends now that totalitarianism, panopticonism, discrimination, privatization, and solutionism will challenge our democratic possibilities. This report examines these harms through cautionary trends supported by examples from this last year and provides 10 calls to action for advocates, legislatures, and technology companies to prevent these harms. If we act now, we can ensure the technology in our public spaces protect and promote democracy and that we do not continue down this path of an elite few tracking the many. 

A miniature of “The War Room” as depicted in the 1964 classic film Dr. Strangelove

Courtesy Eric Chan  and the Los Angeles County Museum of Art, CC-BY 2.0

Paper

Toward a Collaborative Cyber Defense and Enhanced Threat Intelligence Structure

| August 2021

National security structures envisioned in the 20th century are inadequate for the cyber threats that America faces in the 21st century. These structures, created to address strategic, external threats on one end, and homeland security emergencies on the other, cannot protect us from ambient cyber conflict, because they were designed for different times and threats. Our nation—comprising the federal government, private sector companies, critical infrastructure operators, state and local governments, nonprofits and universities, and even private citizens—are constantly under attack by a myriad of cyber actors with ever-increasing capabilities. 

teaser image

Paper

Disrupting Transnational Criminal Activity: A Law Enforcement Strategy for Homeland Security

| May 21, 2021

Transnational criminal activity, organized or not, presents a substantial internal security threat to the United States as it does to other nation-states across the world. Combating it remains a critical mission in the homeland security enterprise. Federal efforts across that enterprise, however, remain scattered and largely ineffectual, and many types of transnational crime are resistant to the law enforcement tactics used domestically.

This paper proposes that the U.S. Department of Homeland Security (DHS) take the lead in supplementing the traditional “criminal justice” approach to countering transnational crime with strategies that aim to disrupt it and insulate Americans from its harmful effects. We contend the “Disruption Model” outlined here,* if broadly implemented, could significantly complement the current conventional approach, and produce materially improved results in managing the challenges of transnational crime and protecting the homeland from its ravages.

People stand in a line outside a bank in Beirut, Lebanon, amid a financial crisis and a lockdown imposed by the government to help stem the spread of the coronavirus in Lebanon, March 28, 2020.

AP Photo/Zeina Karam

Paper

Reform Chatter and Democracy

    Authors:
  • Simeon Djankov
  • Ha Nguyen
  • Ivan Yotzov
| March 2021

This paper explores the dynamics of media chatter about economic reforms using text analysis from about a billion newspaper articles in 28 languages. The paper shows that the intensity of reform chatter increases during economic downturns. This increase is more significant in democracies. Using instrumental variable techniques, the analysis finds the relationship to be causal. The paper also documents that reform chatter is followed by actual reforms, suggesting that democracies benefit from a “self-correcting” mechanism stemming from changing popular attitudes toward reform. 

Voters mark their ballots during early voting at the Park Slope Armory in Brooklyn, Tuesday, Oct. 27, 2020.

AP Photo/Mary Altaffer

Report - Defending Digital Democracy

Beyond 2020: Policy Recommendations for the Future of Election Security

| February 2021

The 2020 election presents a paradox. Despite dramatic changes to the election process due to the COVID-19 pandemic and increasingly complex threats since the 2016 election, 2020 is widely regarded as “the most secure [election] in American history.” Operationally, it was also one of the smoothest. State and local election officials overcame unprecedented challenges and scarce resources to administer an election with fewer incidents of cyber compromises, technical failures or long lines than anticipated. After Election Day, recount procedures functioned as designed. Yet, amidst these successes, officials from both parties faced a barrage of mis- and disinformation about the election process that served to undermine confidence in the result.

Though the election security ecosystem survived the triple threat of cybersecurity, physical security, and mis- and disinformation in 2020, this success will prove to be hard to replicate in future election cycles without proper investment and reinforcement.

A staff member in the Kweisi Mfume campaign uses gloves while holding a cell phone during an election night news conference at his campaign headquarters after Mfume, a Democrat, won Maryland’s 7th Congressional District special election, Tuesday, April 28, 2020, in Baltimore.

AP Photo/Julio Cortez

Report

The Election Influence Operations Playbook, Part 1

| September 2020

Influence Operations (IO), also known as Information Operations, are a series of warfare tactics historically used to collect information, influence, or disrupt the decision making of an adversary. IO strategies intentionally disseminate information to manipulate public opinion and/or influence behavior. IO can involve a number of tactics, including spreading false information intentionally. This is known as “disinformation.”   

Skilled influence operations often deliberately spread disinformation in highly public places like social media. This is done in the hope that people who have no connection to the operation will mistakenly share this disinformation. Inaccurate information spread in error without malicious intent is known as “misinformation.” 

This playbook explores mis- and disinformation incidents that specifically focus on elections operations and infrastructure. Election officials may not often see or know what the motivation is behind the incidents encountered or whether they are mis- or disinformation. Throughout these guides we refer to mis/disinformation incidents together, as the strategies for countering or responding to them are the same.