308 Items

business center building in St. Petersburg, Russia

AP/Dmitri Lovetsky

Analysis & Opinions - Project Syndicate

Rules of the Cyber Road for America and Russia

| Mar. 05, 2019

Joseph Nye says in the cyber realm, the difference between a weapon and a non-weapon may come down to a single line of code, or simply the intent of a computer program's user. While this makes negotiating cyber arms-control treaties problematic, it does not make diplomacy impossible.

News - Belfer Center for Science and International Affairs, Harvard Kennedy School

Election Officials Discuss Midterm Interference and Security Plans for 2020

| Dec. 18, 2018

“It was too quiet.”

That was the sentiment expressed by a number of the 45 election officials from 23 states who gathered earlier this month at Harvard for a Belfer Center Defending Digital Democracy (D3P) Midterm After-Action Conference to discuss problems around their November midterm elections.  Most said they experienced significant but mostly unintended misinformation – and some disinformation – along with a number of other challenges to their electoral processes, but not the extensive foreign cyber and other attacks that took place during the 2016 presidential election.

In this June 22, 2017 photo, a man holds a smartphone in his hand.

AP Photo/Shizuo Kambayashi

Analysis & Opinions - CNN

We Need Stronger Cybersecurity Laws for the Internet of Things

| Nov. 10, 2018

The Internet of Things fuses products with communications technology to make daily life more effortless. But like nearly all innovation, there are risks involved. And for products borne out of the Internet of Things, this means the risk of having personal information stolen or devices being overtaken and controlled remotely.

Early voters lining up to vote in Minnesota in 2018

AP Photo/Jim Mone

Analysis & Opinions - The Washington Post

Hackers are using malware to find vulnerabilities in U.S. swing states. Expect cyberattacks.

| Nov. 05, 2018

The Pentagon has launched a preemptive strike against the Russian hackers who may have attacked the 2016 presidential election with social media influence campaigns. Numerous initiatives, including Harvard University’s Defending Digital Democracy Project, have educated officials on how to fortify elections against cyberattacks and encouraged social media companies to take down fake accounts. Despite these efforts, 67 percent of Americans consider that a foreign influence campaign, either by Russia or other governments, during the midterm elections is “very or somewhat” plausible.

teaser image

Analysis & Opinions - WBUR

How Greater Boston Could Benefit From A Space Force

| Oct. 19, 2018

The U.S. government is currently working on creating a so called Space Force. Legislation to establish the branch is expected to be included in the Pentagon's budget proposal next year, but it would still need approval from Congress.

If the Space Force branch is established, tech companies and defense contractors in Massachusetts stand to make millions — if not billions — in new contracts.

teaser image

Analysis & Opinions - War on the Rocks

Between Multistakeholderism and Sovereignty: Cyber Norms in Egypt and the Gulf States

| Oct. 12, 2018

The difficulty of reaching global agreement on cyber norms is generally attributed to a bipolar division in cyber security governance, reflecting two opposing political systems and sets of values. On one hand, there is a group of what experts have called “likeminded” states. This group generally includes the United States and European countries, and it believes in an open and free internet driven largely by global market competition with some government regulation and civil society observation (known as multistakeholderism). The second group includes Iran, Russia, and China, and prioritizes state control over national “borders” in cyber space with strict governmental limits on content (known as cyber sovereignty.) These differences have been described as the cyber space element of a resurgent Cold War, in which neoliberal and democratic structures confront information control, authoritarianism, and rule-breaking.

In this photo, hands type on a computer keyboard. The photo was taken on February 27, 2013. 

AP Photo/Damian Dovarganes

Analysis & Opinions - The New York Times

Internet Hacking Is About to Get Much Worse

| Oct. 11, 2018

Stories like the recent Facebook hack, the Equifax hack and the hacking of government agencies might make headlines for a few days, but they're just the newsworthy tip of a very large iceberg. The risks are about to get worse, because computers are being embedded into physical devices and will affect lives, not just our data. Security is not a problem the market will solve. The government needs to step in and regulate this increasingly dangerous space.

Analysis & Opinions - War on the Rocks

Beyond Killer Robots: How Artificial Intelligence Can Improve Resilience in Cyber Space

| Sep. 06, 2018

Recently, one of us spent a week in China discussing the future of war with a group of American and Chinese academics. Everyone speculated about the role of artificial intelligence (AI), but, surprisingly, many Chinese participants equated AI almost exclusively with armies of killer robots.