41 Items

teaser image

Analysis & Opinions

Intel community weighs role of open source intelligence amid Ukraine conflict

| Apr. 21, 2022

Intelligence agencies have struggled to define how open source intelligence fits into its broader work, but the wide breadth of publicly available information about the Ukraine conflict, combined with proactive disclosures of classified information, are providing some clarity about OSINT’s role. Lauren Zabierek and Maria Robson Morrow spoke with the Federal News Network on how the public and private sectors are leveraging open source intelligence, including challenges and opportunities.

3D rendering of cyber security and system crash

Adobe Stock

Analysis & Opinions - Harvard Business Review

The Cybersecurity Risks of an Escalating Russia-Ukraine Conflict

With the looming threat of increased conflict in Ukraine, businesses around the world should be preparing now, write Paul R. Kolbe, Maria Robson Morrow, and Lauren Zabierek. Corporate security and intelligence teams have said they’re seeing an increase in cyber probes, and the U.S. Cybersecurity and Infrastructure Security Agency and the European Central Bank have both issued warnings about potential Russian cyberattacks. At this point, companies should be taking the following steps: 1) Review business continuity plans; 2) Closely examine supply chains; 3) Actively engage peer networks, vendors, and law enforcement around cyber intrusions; 4) Instill a security mindset in employees; and 5) Make sure corporate intelligence and IT teams are working closely together on solutions.

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

A transatlantic telephone cable is brought ashore at Clarenville, Newfoundland, for the final splice on March 8, 1957. In the background is the British naval vessel Monarch, the world’s largest cable layer, which has worked through two summers laying nearly 4,000 miles of cable to complete the two-way system between Newfoundland and Scotland.

AP Photo, File

Paper - Cyber Project

Data Sharing Between the United States and the European Union

    Author:
  • Madalina Murariu
| July 2021

The implications of the Schrems II decision have substantial short and long-term repercussions. This paper will seek to briefly explain the history of the Schrems cases, then outline the options available to decision makers seeking to enable transatlantic cooperation. The paper will also argue that short-term solutions such as the ones leveraged up till now will increasingly be unfeasible, and therefore present four proposals for consideration on how a revived data transfer ecosystem could be shaped through national and international tools and mechanisms.

Photo of a staff member checks a news site at the NATO Computer Incident Response Capability (NCIRC) technical center.

(AP Photo/Yves Logghe)

Analysis & Opinions - Foreign Policy

NATO, We Want to Go to War With You

| Dec. 22, 2020

In recent years, NATO has begun to incorporate some innovative new cyberwarfare games and exercises into its annual wargames. But there is something missing. If NATO wants to see what nation-state hacking is like in the chaotic multiactor online world, it needs to practice fending off some actual hackers.

teaser image

Magazine Article - Economist

Digital Dominance: A new global ranking of cyber-power throws up some surprises

China has the world’s largest army. Russia wields the most tanks. America owns the fanciest satellites. But who has the most cyber-power? A new National Cyber Power Index by the Belfer Centre at Harvard University ranks 30 countries on their level of ambition and capability. Offensive cyber-power—the ability to do harm in or through computer networks—is one measure. But so too are the strength of a country’s defences, the sophistication of its cyber-security industry and its ability to spread and counter propaganda.

teaser image

Newspaper Article

Chinese cyber power is neck-and-neck with US, Harvard research finds

| Sep. 08, 2020

As conventional wisdom goes, experts tend to rank the U.S ahead of China, U.K.IranNorth KoreaRussia, in terms of how strong it is when it comes to cyberspace. But a new study from Harvard University’s Belfer Center shows that China has closed the gap on the U.S. in three key categories: surveillance, cyber defense, and its efforts to build up its commercial cyber sector.

“A lot of people, Americans in particular, will think that the U.S., the U.K., France, Israel are more advanced than China when it comes to cyber power,” Eric Rosenbach, the Co-Director of Harvard’s Belfer Center, told CyberScoop. “Our study shows it’s just not the case and that China is very sophisticated and almost at a peer level with the U.S.”

Dr. Gesche Joost on the Impact of AI and Digitalization on Social Cohesion

Belfer Center/Benn Craig

Analysis & Opinions - Project on Europe and the Transatlantic Relationship

The Impact of AI and Digitalization on Social Cohesion

    Author:
  • Winston Ellington Michalak
| Apr. 01, 2020

February 24th, 2020, in Cambridge, Massachusetts, Dr. Gesche Joost, Professor of Design Research at the Berlin University of the Arts and head of the Design Research Lab since 2005, discussed the digital divide and how it will shape social connectivity in an event moderated by Cathryn Clüver Ashbrook, Executive Director of the Future of Diplomacy Project and the Project on Europe and the Transatlantic Relationship, and Lauren Zabierek, Executive Director of the Cyber Project.