101 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

A miniature of “The War Room” as depicted in the 1964 classic film Dr. Strangelove

Courtesy Eric Chan  and the Los Angeles County Museum of Art, CC-BY 2.0

Paper

Toward a Collaborative Cyber Defense and Enhanced Threat Intelligence Structure

| August 2021

National security structures envisioned in the 20th century are inadequate for the cyber threats that America faces in the 21st century. These structures, created to address strategic, external threats on one end, and homeland security emergencies on the other, cannot protect us from ambient cyber conflict, because they were designed for different times and threats. Our nation—comprising the federal government, private sector companies, critical infrastructure operators, state and local governments, nonprofits and universities, and even private citizens—are constantly under attack by a myriad of cyber actors with ever-increasing capabilities. 

Computer code on monitors

AP/Pavel Golovkin

Analysis & Opinions - Project Syndicate

What Did Biden Achieve in Geneva?

| July 07, 2021

Even if formal cybersecurity treaties are unworkable, it may still be possible to set limits on certain types of civilian targets, and to negotiate rough rules of the road. Whether U.S. President Joe Biden succeeded in launching such a process at his meeting last month with Russian President Vladimir Putin may become clear soon.

Report - Cyber Project

Zero Botnets: An Observe-Pursue-Counter Approach

June 2021

Adversarial Internet robots (botnets) represent a growing threat to the safe use and stability of the Internet. Botnets can play a role in launching adversary reconnaissance (scanning and phishing), influence operations (upvoting), and financing operations (ransomware, market manipulation, denial of service, spamming, and ad click fraud) while obfuscating tailored tactical operations. Reducing the presence of botnets on the Internet, with the aspirational target of zero, is a powerful vision for galvanizing policy action. Setting a global goal, encouraging international cooperation, creating incentives for improving networks, and supporting entities for botnet takedowns are among several policies that could advance this goal.

Joe Biden

AP/Matt Slocum

Analysis & Opinions - Project Syndicate

After the Liberal International Order

| July 06, 2020

If Joe Biden defeats Donald Trump in November, the question he will face is not whether to restore the liberal international order. It is whether the United States can work with an inner core of allies to promote democracy and human rights while cooperating with a broader set of states to manage the rules-based international institutions needed to face transnational threats.

Dr. Gesche Joost on the Impact of AI and Digitalization on Social Cohesion

Belfer Center/Benn Craig

Analysis & Opinions - Project on Europe and the Transatlantic Relationship

The Impact of AI and Digitalization on Social Cohesion

    Author:
  • Winston Ellington Michalak
| Apr. 01, 2020

February 24th, 2020, in Cambridge, Massachusetts, Dr. Gesche Joost, Professor of Design Research at the Berlin University of the Arts and head of the Design Research Lab since 2005, discussed the digital divide and how it will shape social connectivity in an event moderated by Cathryn Clüver Ashbrook, Executive Director of the Future of Diplomacy Project and the Project on Europe and the Transatlantic Relationship, and Lauren Zabierek, Executive Director of the Cyber Project.