Science & Technology

260 Items

Image of Vladimir Putin standing in front of a podium

AP Photo

President Joe Biden delivers remarks about government regulations on artificial intelligence systems during an event in the East Room of the White House, Monday, Oct. 30, 2023, in Washington.

(AP Photo/Evan Vucci)

Policy Brief

Action on AI: Unpacking the Executive Order’s Security Implications and the Road Ahead

| Nov. 08, 2023

On October 30, 2023, President Biden issued the Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence, aimed at realizing the benefits of AI, while mitigating critical risks. This article provides an overview of its key national security initiatives and explores issues relevant to implementation.

A lighthouse, battered by waves, sits at the center of this dark and stormy seascape.

AP Photo/Matt Dunham

Report - Belfer Center for Science and International Affairs

Democracy and the Liberal World Order Amid the Rise of Authoritarianism

| Aug. 14, 2023

The entanglement and feedback loops among the domestic and the geopolitical cycles of distrust have resulted in a cohesive threat to democracy: a downward political spiral that is pulling societies towards enmity. This spiral feeds on and generates destructive human emotions at massive scale, such as outrage and hatred, that lead to violence, war, and autocracy, so it can be better understood as a dangerous global maelstrom of distrust, which could sink democracy worldwide. As showcased by historical evidence, domestic and international forces do not act in isolation from each other. Democratic backsliding, the rise of authoritarianism and totalitarianism, and the politics of aggression generated feedback loops in the 1930s, that resulted in WWII. Similar forces are again working in the 2020s. If massive distrust can wreck democracy worldwide, it follows that the regeneration of trust is the path to democratic revitalization.

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

Technology Primer: Social Media Recommendation Algorithms

| Aug. 25, 2022

The use of social media platforms like Facebook, Twitter, YouTube, and TikTok is increasingly widespread, currently amounting to billions of users worldwide. Social media companies deploy proprietary recommendation algorithms to automate the selection, ranking, and presentation of content on the platform’s “feed” or recommended content section, every time a user opens or refreshes the site or app. However, social media recommendation algorithms have a range of privacy, security, information quality, and psychological concerns for users. 

A successful approach to the regulation of social media recommendation algorithms will require a combination of government regulation, self governance, and external oversight to facilitate value alignment across these diverse actors and tackle the various challenges associated with this technology. This publication explores the technical components of social media recommendation systems, as well as their public purpose considerations. 

A security guard stands near a sculpture of the Chinese Communist Party flag at the Museum of the Communist Party of China on May 26, 2022, in Beijing.

AP Photo/Ng Han Guan

Journal Article - Quarterly Journal: International Security

Strategic Substitution: China’s Search for Coercive Leverage in the Information Age

    Author:
  • Fiona Cunningham
| Summer 2022

After the mistaken U.S. bombing of the Chinese Embassy in Belgrade in 1999, China turned to information-age weapons to create a risk of escalation to nuclear war with the United States. This shift helps compensate for its conventional military inferiority.

teaser image

Report

Digital Crime Scenes: The Role of Digital Evidence in the Persecution of LGBTQ People in Egypt, Lebanon, and Tunisia

    Author:
  • Afsaneh Rigot
| Mar. 07, 2022

Digital evidence–primarily from device searches–has made it easier for law enforcement to identify, harass, and prosecute LGBTQ people on the basis of their identity. This new report by Technology and Public Purpose fellow and Berkman Klein Center affiliate Afsaneh Rigot draws on years of in-depth research, including reviews of individual court case files and interviews with defense attorneys in Egypt, Lebanon, and Tunisia, to demonstrate the painful and unjust impacts of these developments, as well as the communities’ resilience. 

Afsaneh Rigot has deep experience with both the needs and views of queer people in MENA as well as engaging tech companies to make meaningful change. She advocates for a methodology she terms Design from the Margins. Rigot calls on companies to use the findings of this report to build from the essential needs of those most impacted by their tools, creating better tech for all users in the process.

U.S. Military Academy cadets watch data on computers

AP Photo

Journal Article - Quarterly Journal: International Security

Prediction and Judgment: Why Artificial Intelligence Increases the Importance of Humans in War

    Authors:
  • Avi Goldfarb
  • Jon R. Lindsay
| Winter 2021/22

Rather than rapid robotic wars and decisive shifts in military power, AI-enabled conflict will likely involve significant uncertainty, organizational friction, and chronic controversy. Greater military reliance on AI will therefore make the human element in war even more important, not less.

A boy plays with his toy soldiers inside a school that is being used as a shelter for people who fled the war, in Dnipro city, Ukraine, on Tuesday, April 12, 2022.

AP Photo/Petros Giannakouris

Analysis & Opinions - Offensive Cyber Working Group

Subversion over Offense: Why the Practice of Cyber Conflict Looks Nothing Like Its Theory and What This Means for Strategy and Scholarship

    Author:
  • Lennart Maschmeyer
| Jan. 19, 2022

Cyber attacks are both exciting and terrifying, but the ongoing obsession with ‘cyber warfare’ clouds analysis and hampers strategy development. Much commentary and analysis of cyber conflict continues to use the language of war, where actors use ‘offensive cyber operations’ to meet adversaries in ‘engagements’ striving for victory on the ‘battlefield’ in the ‘cyber domain’. This discourse persists despite a growing consensus that cyber operations are primarily relevant in conflict short of war.

Les Droits de l’Homme, 1947 - a surrealist painting showing an anthropomorphic chess piece standing on a bridge next to a flaming tuba.

Rene Magritte

Report

Whose Streets? Our Streets! (Tech Edition)

    Author:
  • Rebecca Williams
| August 2021

This report is an urgent warning of where we are headed if we maintain our current trajectory of augmenting our public space with trackers of all kinds. In this report, I outline how current “smart city” technologies can watch you. I argue that all “smart city” technology trends toward corporate and state surveillance and that if we don’t stop and blunt these trends now that totalitarianism, panopticonism, discrimination, privatization, and solutionism will challenge our democratic possibilities. This report examines these harms through cautionary trends supported by examples from this last year and provides 10 calls to action for advocates, legislatures, and technology companies to prevent these harms. If we act now, we can ensure the technology in our public spaces protect and promote democracy and that we do not continue down this path of an elite few tracking the many.