331 Items

Panorama of Pyongyang, North Korea.

Wikimedia CC/Sven Unbehauen

Analysis & Opinions - Project Syndicate

Deterrence in Cyberspace

| June 03, 2019

Understanding deterrence in cyberspace is often difficult, because  minds remain captured by an image of deterrence shaped by the Cold War: a threat of massive retaliation to a nuclear attack by nuclear means. A better analogy is crime: governments can only imperfectly prevent it.

business center building in St. Petersburg, Russia

AP/Dmitri Lovetsky

Analysis & Opinions - Project Syndicate

Rules of the Cyber Road for America and Russia

| Mar. 05, 2019

Joseph Nye says in the cyber realm, the difference between a weapon and a non-weapon may come down to a single line of code, or simply the intent of a computer program's user. While this makes negotiating cyber arms-control treaties problematic, it does not make diplomacy impossible.

Eric Rosenbach on NBC: U.S. Not Prepared for Major Cyber Attack

Today

Analysis & Opinions - NBC

Eric Rosenbach on NBC: U.S. Not Prepared for Major Cyber Attack

| Dec. 26, 2018

In an interview with Tom Costello on NBC's Today Show, Eric Rosenbach says the United States is not ready for a major cyber attack despite evidence of serious risks to the power grid and other American systems. Officials say much of the power grid has already been penetrated by Russian intelligence.

News - Belfer Center for Science and International Affairs, Harvard Kennedy School

Election Officials Discuss Midterm Interference and Security Plans for 2020

| Dec. 18, 2018

“It was too quiet.”

That was the sentiment expressed by a number of the 45 election officials from 23 states who gathered earlier this month at Harvard for a Belfer Center Defending Digital Democracy (D3P) Midterm After-Action Conference to discuss problems around their November midterm elections.  Most said they experienced significant but mostly unintended misinformation – and some disinformation – along with a number of other challenges to their electoral processes, but not the extensive foreign cyber and other attacks that took place during the 2016 presidential election.

In this June 22, 2017 photo, a man holds a smartphone in his hand.

AP Photo/Shizuo Kambayashi

Analysis & Opinions - CNN

We Need Stronger Cybersecurity Laws for the Internet of Things

| Nov. 10, 2018

The Internet of Things fuses products with communications technology to make daily life more effortless. But like nearly all innovation, there are risks involved. And for products borne out of the Internet of Things, this means the risk of having personal information stolen or devices being overtaken and controlled remotely.

Early voters lining up to vote in Minnesota in 2018

AP Photo/Jim Mone

Analysis & Opinions - The Washington Post

Hackers are using malware to find vulnerabilities in U.S. swing states. Expect cyberattacks.

| Nov. 05, 2018

The Pentagon has launched a preemptive strike against the Russian hackers who may have attacked the 2016 presidential election with social media influence campaigns. Numerous initiatives, including Harvard University’s Defending Digital Democracy Project, have educated officials on how to fortify elections against cyberattacks and encouraged social media companies to take down fake accounts. Despite these efforts, 67 percent of Americans consider that a foreign influence campaign, either by Russia or other governments, during the midterm elections is “very or somewhat” plausible.

teaser image

Analysis & Opinions - WBUR

How Greater Boston Could Benefit From A Space Force

| Oct. 19, 2018

The U.S. government is currently working on creating a so called Space Force. Legislation to establish the branch is expected to be included in the Pentagon's budget proposal next year, but it would still need approval from Congress.

If the Space Force branch is established, tech companies and defense contractors in Massachusetts stand to make millions — if not billions — in new contracts.

teaser image

Analysis & Opinions - War on the Rocks

Between Multistakeholderism and Sovereignty: Cyber Norms in Egypt and the Gulf States

| Oct. 12, 2018

The difficulty of reaching global agreement on cyber norms is generally attributed to a bipolar division in cyber security governance, reflecting two opposing political systems and sets of values. On one hand, there is a group of what experts have called “likeminded” states. This group generally includes the United States and European countries, and it believes in an open and free internet driven largely by global market competition with some government regulation and civil society observation (known as multistakeholderism). The second group includes Iran, Russia, and China, and prioritizes state control over national “borders” in cyber space with strict governmental limits on content (known as cyber sovereignty.) These differences have been described as the cyber space element of a resurgent Cold War, in which neoliberal and democratic structures confront information control, authoritarianism, and rule-breaking.