22 Items

teaser image

Video - Center for Strategic & International Studies

"Star Wars" and Cyber: Can history help us build today's defenses?

| Mar. 23, 2018

Building effective cyber defenses is a major challenge for defense planners, just as missile defense has been since the original Strategic Defense Initiative. In both realms the offense has the advantage, making effective defense difficult. Missile defense, however, now has several decades of experience producing and fielding new technologies. The Project on Military and Diplomatic History hosted a panel discussion of CSIS experts and Michael Sulmeyer of the Belfer Center on the history of missile defense, its experience in developing new technologies, and what these tell us about the prospects for building effective cyber defenses.

teaser image

Analysis & Opinions - Foreign Affairs

How the U.S. Can Play Cyber-Offense

| Mar. 22, 2018

The focus on cyber-deterrence is understandable but misplaced. Deterrence aims to change the calculations of adversaries by persuading them that the risks of an attack outweigh the rewards or that they will be denied the benefits they seek. But in seeking merely to deter enemies, the United States finds itself constantly on the back foot. Instead, the United States should be pursuing a more active cyberpolicy, one aimed not at deterring enemies but at disrupting their capabilities. In cyberwarfare, Washington should recognize that the best defense is a good offense.

teaser image

Journal Article - Georgetown Journal of International Affairs

Campaign Planning with Cyber Operations

| Dec. 28, 2017

The military not only plans for operations, it also plans to plan. Yet there is no current plan or process in place to integrate cyber initiatives into campaign planning. The US government must determine how to integrate offensive and defensive cybercapabilities into campaign planning in order to leverage these capabilities and pair them with the military’s broad array of tools.

Analysis & Opinions - Lawfare

Cybersecurity in the 2017 National Security Strategy

| Dec. 19, 2017

The administration should be given relatively high marks for the document’s cybersecurity components—especially for recognizing the breadth of the threat and that it’s going to take more than the help desk to fix it. Admittedly, that’s a pretty low bar. But National Security Strategy documents are not known as documents where big policy innovation occurs. Instead, the best you can usually do is articulate the broad contours of the main threats to national security coupled with some rough themes about what the government will do to make things better. Here, the administration does not isolate “the cyber” to the sidelines; instead, by talking about cyber issues throughout the document, the administration shows an understanding that cyberspace is a critical part to practically every aspect of national security.

Sharing Expertise: Belfer Center research fellows share career tips and advice with Kennedy School students att a networking event in March.

Belfer Center

- Belfer Center for Science and International Affairs, Harvard Kennedy School

Students Receive Career and Research Advice at Center’s First Speed-Networking Event

For two hours on a March afternoon, Harvard Kennedy School’s Bell Hall buzzed as Kennedy School students huddled for 15-minute one-on-one sessions with Belfer Center fellows and project directors to get career advice and to ask questions about the others’ career trajectories, research, and methods.

University of Michigan Journal of Law Reform

University of Michigan Journal of Law Reform

Journal Article - University of Michigan Journal of Law Reform

Making Democracy Harder to Hack

| Spring 2017 (Volume 50, Issue 3)

With the Russian government hack of the Democratic National Convention email servers and related leaks, the drama of the 2016 U.S. presidential race highlights an important point: nefarious hackers do not just pose a risk to vulnerable companies; cyber attacks can potentially impact the trajectory of democracies.

teaser image

Journal Article - Journal of Cybersecurity

Rules of Engagement for Cyberspace Operations: A View From the USA

| March 2017

As cyber weapons are incorporated into US military planning, policy makers and field commanders will increasingly confront a core issue: How to formulate the rules of engagement (ROEs) for US forces with regard to military operations that may use such weapons. Michael Sulmeyer, Herbert Lin, and C. Robert Kehler address ROEs from the perspective of US military operators.