305 Items

In this June 22, 2017 photo, a man holds a smartphone in his hand.

AP Photo/Shizuo Kambayashi

Analysis & Opinions - CNN

We Need Stronger Cybersecurity Laws for the Internet of Things

| Nov. 10, 2018

The Internet of Things fuses products with communications technology to make daily life more effortless. But like nearly all innovation, there are risks involved. And for products borne out of the Internet of Things, this means the risk of having personal information stolen or devices being overtaken and controlled remotely.

Early voters lining up to vote in Minnesota in 2018

AP Photo/Jim Mone

Analysis & Opinions - The Washington Post

Hackers are using malware to find vulnerabilities in U.S. swing states. Expect cyberattacks.

| Nov. 05, 2018

The Pentagon has launched a preemptive strike against the Russian hackers who may have attacked the 2016 presidential election with social media influence campaigns. Numerous initiatives, including Harvard University’s Defending Digital Democracy Project, have educated officials on how to fortify elections against cyberattacks and encouraged social media companies to take down fake accounts. Despite these efforts, 67 percent of Americans consider that a foreign influence campaign, either by Russia or other governments, during the midterm elections is “very or somewhat” plausible.

teaser image

Analysis & Opinions - WBUR

How Greater Boston Could Benefit From A Space Force

| Oct. 19, 2018

The U.S. government is currently working on creating a so called Space Force. Legislation to establish the branch is expected to be included in the Pentagon's budget proposal next year, but it would still need approval from Congress.

If the Space Force branch is established, tech companies and defense contractors in Massachusetts stand to make millions — if not billions — in new contracts.

teaser image

Analysis & Opinions - War on the Rocks

Between Multistakeholderism and Sovereignty: Cyber Norms in Egypt and the Gulf States

| Oct. 12, 2018

The difficulty of reaching global agreement on cyber norms is generally attributed to a bipolar division in cyber security governance, reflecting two opposing political systems and sets of values. On one hand, there is a group of what experts have called “likeminded” states. This group generally includes the United States and European countries, and it believes in an open and free internet driven largely by global market competition with some government regulation and civil society observation (known as multistakeholderism). The second group includes Iran, Russia, and China, and prioritizes state control over national “borders” in cyber space with strict governmental limits on content (known as cyber sovereignty.) These differences have been described as the cyber space element of a resurgent Cold War, in which neoliberal and democratic structures confront information control, authoritarianism, and rule-breaking.

In this photo, hands type on a computer keyboard. The photo was taken on February 27, 2013. 

AP Photo/Damian Dovarganes

Analysis & Opinions - The New York Times

Internet Hacking Is About to Get Much Worse

| Oct. 11, 2018

Stories like the recent Facebook hack, the Equifax hack and the hacking of government agencies might make headlines for a few days, but they're just the newsworthy tip of a very large iceberg. The risks are about to get worse, because computers are being embedded into physical devices and will affect lives, not just our data. Security is not a problem the market will solve. The government needs to step in and regulate this increasingly dangerous space.

Analysis & Opinions - War on the Rocks

Beyond Killer Robots: How Artificial Intelligence Can Improve Resilience in Cyber Space

| Sep. 06, 2018

Recently, one of us spent a week in China discussing the future of war with a group of American and Chinese academics. Everyone speculated about the role of artificial intelligence (AI), but, surprisingly, many Chinese participants equated AI almost exclusively with armies of killer robots.

teaser image

Analysis & Opinions - Lawfare

I Wrote About Russian Election Interference. Then I Was Trolled Online.

| Sep. 04, 2018

A colleague and I recently published an op-ed in Svenska Dagbladet, one of Sweden’s leading daily newspapers, about Russia’s attempts to influence elections in democratic countries. Among the Russian tactics we described was the use of “troll factories” to distribute misinformation. So perhaps we shouldn’t have been surprised when we were attacked online, probably by Russian trolls, after our article posted.

teaser image

Analysis & Opinions - Council on Foreign Relations

How Ukraine’s Government Has Struggled to Adapt to Russia’s Digital Onslaught

| Aug. 29, 2018

Last month, I went back to Ukraine and heard the same thing again. Why has this problem persisted, despite a drastic change in the country’s cyber threat landscape over the last three years? The country suffered two power disruptions in 2015 and 2016 and was plagued by the NotPetya ransomware attack last year. If these significant incidents can’t motivate state agencies to work together, what can?

G20 Dinner

Kay Nietfeld/ Pool Photo via AP

Paper - Cyber Security: A Peer-Reviewed Journal

Normative Restraints on Cyber Conflict

| Aug. 28, 2018

Cyber security is a relatively new international problem. A decade ago, it received little attention as an international issue, but since 2013 the Director of National Intelligence has named cyber security risks as the biggest threat facing the USA. Although the exact numbers can be debated, various non-profit organisations have listed hundreds of state-sponsored attacks by a score of countries in the past decade. Many observers have called for laws and norms to manage the growing cyber threat. In this paper the author outlines the key normative restraints on cyber conflict. The author draws on the development of international norms in recent history to offer insights into the formation of normative restraints in the cyber realm.