331 Items

teaser image

Analysis & Opinions

Russian digital attacks pose a threat to democratic elections

| July 25, 2018

President Trump’s effort to improve the climate for dialogue with Putin may be commendable, but his reluctance to object to Russia’s offensive digital campaigns targeting democratic processes is a cause for concern. The indictment of 12 Russian intelligence officers is a sharp reminder of Russian capabilities for coming elections, writes two Swedish researchers at Harvard Kennedy School.

Trust

Terry Johnson/Flickr

Analysis & Opinions - O'Reilly Media

The Five Cs

    Authors:
  • Mike Loukidos
  • Hilary Mason
| July 24, 2018

What does it take to build a good data product or service? Not just a product or service that’s useful, or one that’s commercially viable, but one that uses data ethically and responsibly.

teaser image

Analysis & Opinions - O'Reilly Media

Of Oaths and Checklists

    Authors:
  • Mike Loukidos
  • Hilary Mason
| July 17, 2018

Over the past year, there has been a great discussion of data ethics, motivated in part by discomfort over “fake news,” targeted advertising, algorithmic bias, and the effect that data products have on individuals and on society. Concern about data ethics is hardly new; the ACMIEEE, and the American Statistical Association all have ethical codes that address data. But the intensity with which we’ve discussed ethics shows that something significant is happening: data science is coming of age and realizing its responsibilities. A better world won’t come about simply because we use data; data has its dark underside.

Job One for Space Force

NASA

Report - Cyber Security Project, Belfer Center

Job One for Space Force: Space Asset Cybersecurity

| July 12, 2018

When we think about critical infrastructure, the first assets that come to mind include the electric grid, water networks and transportation systems. Further unpacking the definition of critical infrastructure, we consider industries such as agriculture, defense or the financial sector. However, we rarely think about where the underlying systems that enable technology functionality across these sectors physically reside, who developed the technology, and who can access and manage that technology.

U.S. Army Chief Warrant Officer 2 Michael Lyons, Joint Tactical Communications Office communications operator, Fort Sam Houston, Texas, looks through information on a workstation inside the Combined Air and Space Operations Center-Nellis during Red Flag 14-1 Feb. 5, 2014, at Nellis Air Force Base, Nev.

U.S. Air Force photo/Senior Airman Brett Clashman

Paper - Hoover Institution Press

Strengths Become Vulnerabilities: How a Digital World Disadvantages the United States in its International Relations

    Authors:
  • Jack L. Goldsmith
  • Stuart Russell
| June 05, 2018

This essay seeks to explain why the United States is struggling to deal with the “soft” cyberoperations that have been so prevalent in recent years: cyberespionage and cybertheft, often followed by strategic publication; information operations and propaganda; and relatively low-level cyber disruptions such as denial-of-service and ransomware attacks.