Science & Technology

106 Items

teaser image

Report

Digital Crime Scenes: The Role of Digital Evidence in the Persecution of LGBTQ People in Egypt, Lebanon, and Tunisia

    Author:
  • Afsaneh Rigot
| Mar. 07, 2022

Digital evidence–primarily from device searches–has made it easier for law enforcement to identify, harass, and prosecute LGBTQ people on the basis of their identity. This new report by Technology and Public Purpose fellow and Berkman Klein Center affiliate Afsaneh Rigot draws on years of in-depth research, including reviews of individual court case files and interviews with defense attorneys in Egypt, Lebanon, and Tunisia, to demonstrate the painful and unjust impacts of these developments, as well as the communities’ resilience. 

Afsaneh Rigot has deep experience with both the needs and views of queer people in MENA as well as engaging tech companies to make meaningful change. She advocates for a methodology she terms Design from the Margins. Rigot calls on companies to use the findings of this report to build from the essential needs of those most impacted by their tools, creating better tech for all users in the process.

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

A worker helps to pump gas

AP/Chris Carlson

Analysis & Opinions - Harvard Law Today

Is the U.S. in a Cyber War?

    Author:
  • Jeff Neal
| July 14, 2021

In the wake of a series of damaging cyber intrusions on private businesses controlling critical pieces of U.S. infrastructure, Harvard Kennedy School Senior Lecturer Juliette Kayyem says that countering the growing threat will require erasing the "legal fiction" that cyberattacks are different than physical attacks on American civilians.

Computer code on monitors

AP/Pavel Golovkin

Analysis & Opinions - Project Syndicate

What Did Biden Achieve in Geneva?

| July 07, 2021

Even if formal cybersecurity treaties are unworkable, it may still be possible to set limits on certain types of civilian targets, and to negotiate rough rules of the road. Whether U.S. President Joe Biden succeeded in launching such a process at his meeting last month with Russian President Vladimir Putin may become clear soon.

Report - Technology and Public Purpose

Building a 21st Century Congress: A Playbook for Modern Technology Assessment

| June 2021

How can United States policymakers better understand the next generation of emerging technologies and their societal implications? How can we make more educated decisions on the basic and applied research needed to solve the next generation of emerging threats? 

The 117th Congress and the Biden Administration must urgently address these questions to protect the lives and livelihoods of those living in the United States.
 

Report - Atlantic Council

The Reverse Cascade: Enforcing Security on the Global IoT Supply Chain

| June 2020

The Internet of Things (IoT) refers to the increasing convergence of the physical and digital worlds and it affects us all. Hundreds of "things" are being connected to the Internet and each other, with more than fifty billion devices expected to be connected by 2030. Many IoT devices are manufactured abroad at low cost with little consideration for security. How can we secure these devices, especially those manufactured outside the United States?

The Montenegro, left, and NATO flags

AP/Risto Bozovic

Analysis & Opinions - Project Syndicate

Eight Norms for Stability in Cyberspace

| Dec. 04, 2019

At last month's Paris Peace Forum, the Global Commission on the Stability of Cyberspace (GSCS) issued its report on how to provide an overarching cyber stability framework. Combined with norms, principles, and confidence-building measures suggested by others, the GCSC's conclusions are an important step forward.