Science & Technology

310 Items

A computer code is seen on displays in the office of Global Cyber Security Company Group-IB in Moscow, Russia, Wednesday, Oct. 25, 2017. A new strain of malicious software has paralyzed computers at a Ukrainian airport, the Ukrainian capital's subway and at some independent Russian media. Moscow-based Global Cyber Security Company Group-IB said in a statement Wednesday the ransomware called BadRabbit also tried to penetrate the computers of major Russian banks but failed.

AP Photo/Pavel Golovkin

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Addressing Russian and Chinese Cyber Threats: A Transatlantic Perspective on Threats to Ukraine and Beyond

| May 2023

In an interconnected world, cyberattacks are becoming more frequent and sophisticated. Building resilience against this asymmetric threat is critical for countries to protect their economies, critical infrastructure, and democratic institutions. However, cyberattacks do not respect borders, and no country can address this threat alone. The strength and longevity of the transatlantic partnership between the EU and the U.S. presents a unique opportunity to address this strategic threat through international cooperation. Through an analysis of cyberwarfare in the ongoing war in Ukraine, this paper proposes policy recommendations to enhance transatlantic coordination and cooperation against current and future adversaries in a new era of strategic competition. Ultimately, a stronger transatlantic partnership is critical for protecting international democratic norms, building resilience against cyber threats, and strengthening global security and stability.

Quantum Computer

Wikimedia Commons

Analysis & Opinions - Foreign Policy

The U.S. Wants to Make Sure China Can’t Catch Up on Quantum Computing

| Mar. 31, 2023

U.S. export controls on China’s semiconductor industry are just the opening salvos in a series of unprecedented export controls on China planned by the Biden administration. After controls on semiconductors, the Commerce Department is moving on to the next emerging technology it worries China could weaponize—quantum computing.

Sri Lankan port workers hold a Chinese national flag to welcome Chinese research ship

AP/Eranga Jayawardena, File

Analysis & Opinions - Project Syndicate

Peak China?

| Jan. 03, 2023

Joseph Nye writes: From an American perspective, it is just as dangerous to underestimate Chinese power as it is to overestimate it. While hysteria creates fear, discounting China's recent progress and future ambitions could lead the United States to squander its own long-term advantages.

The countries' flags are seen on the table during a meeting between Secretary of Defense Lloyd Austin and Australian Deputy Prime Minister and Minister of Defense Richard Marles at the Pentagon, Monday, Dec. 5, 2022, in Washington.

AP Photo/Alex Brandon

Paper - Australian Strategic Policy Institute

Australia-US Technology Collaboration for Defense

| Nov. 29, 2022

In this paper, I propose five key science and technology areas for greater US-Australia collaboration that carry significant national security and defence risks for both countries. Rapid progress against these challenges will position us for success and strengthen our resilience against groups that seek to undermine the global rules-based order. 

A worker is seen in a tugboat at the Port of Los Angeles on Nov. 10, 2021.

AP Photo/Marcio Jose Sanchez, File

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Never Breaking the Chain: The Economics and Politics of Creating an Effective National Supply Chain Strategy

| August 2022

The creation of a national supply chain strategy is crucial to responding to the challenge and merits specific attention from both policy and business leaders. This paper proposes specific government and business policy steps that would progress the US’s position on a more unified, strategic supply chain approach.

3D rendering of cyber security and system crash

Adobe Stock

Analysis & Opinions - Harvard Business Review

The Cybersecurity Risks of an Escalating Russia-Ukraine Conflict

With the looming threat of increased conflict in Ukraine, businesses around the world should be preparing now, write Paul R. Kolbe, Maria Robson Morrow, and Lauren Zabierek. Corporate security and intelligence teams have said they’re seeing an increase in cyber probes, and the U.S. Cybersecurity and Infrastructure Security Agency and the European Central Bank have both issued warnings about potential Russian cyberattacks. At this point, companies should be taking the following steps: 1) Review business continuity plans; 2) Closely examine supply chains; 3) Actively engage peer networks, vendors, and law enforcement around cyber intrusions; 4) Instill a security mindset in employees; and 5) Make sure corporate intelligence and IT teams are working closely together on solutions.

Container Ship

AP/Steve Helber

Analysis & Opinions - The Security Times

Cracking China

| February 2022

Will China succeed in what some call its grand strategy of displacing American power? Whichever scenario emerges also depends on the strategy the US chooses in response, rites Joseph Nye.