166 Items

guns and missiles burst forth from a laptop screen

Adobe Stock

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Guns, Incels, and Algorithms: Where We Are on Managing Terrorist and Violent Extremist Content Online

| June 12, 2023

Technology companies and governments have spent the past decade trying to better address the evolving threat of terrorist and violent extremist content online (TVEC). This paper examines how effective these efforts have been, where we are today in managing the problem, and wherein lie gaps for improvement.

man wearing a shirt promoting TikTok

AP/Ng Han Guan

Analysis & Opinions - Project Syndicate

The Other Global Power Shift

| Aug. 06, 2020

Joseph Nye writes that the world is increasingly obsessed with the ongoing power struggle between the United States and China. But the technology-driven shift of power away from states to transnational actors and global forces brings a new and unfamiliar complexity to global affairs.

Nuclear Safety, Safeguards and Security–Strengthening the Global Nuclear Order

IAEA Imagebank

Presentation

Nuclear Safety, Safeguards and Security–Strengthening the Global Nuclear Order

| December 7, 2016

As the IAEA Director General Emeritus, Hans Blix put it “A nuclear accident anywhere is an accident everywhere”. Fukushima revealed that no one state is immune from fallacies that resulted both before and after the nuclear accident. That will be also true with any nuclear terrorism event, which we have been spared thus far.

- Belfer Center for Science and International Affairs, Harvard Kennedy School Belfer Center Newsletter

Protecting the U.S. in Cyberspace

| Spring 2016

The computers, networks, and systems of cyberspace have become an integral part of daily life. They control critical infrastructure, ease and speed communication, enable financial transactions, and much more. However, the same aspects of connectivity that allow us to innovate also put us at risk.

Analysis & Opinions - The Huffington Post

Belgium Highlights the Nuclear Terrorism Threat and Security Measures to Stop it

| March 29, 2016

"As world leaders gather for the fourth nuclear security summit this week, in the aftermath of the horrifying terrorist attacks in Brussels, it seems likely that Belgian Prime Minister Charles Michel will have more to say than anyone else — both about real nuclear terrorist dangers and about real steps taken to improve nuclear security...."

Announcement - Managing the Atom Project, Belfer Center

2016-2017 Harvard Nuclear Policy Fellowships

| December 15, 2015

The Project on Managing the Atom offers fellowships for pre-doctoral, post-doctoral, and mid-career researchers for one year, with a possibility for renewal, in the stimulating environment of the Belfer Center for Science and International Affairs at the Harvard Kennedy School. The online application for 2016-2017 fellowships opened December 15, 2015, and the application deadline is January 15, 2016. Recommendation letters are due by February 1, 2016.

Syrian President Bashar al-Assad  during a meeting with Russian President Vladimir Putin, October 20, 2015.

Kremlin.ru

Analysis & Opinions - Moscow Times

Russia Must Abandon Assad to Fight Terrorism

| November 13, 2015

"The key to a solution to both — the quagmire that has unfolded in Syria and the threat posed by Islamic terrorism — is to deprive the terrorist groups of their main propaganda tools and to form a new Syrian government that excludes Assad (and his foreign Shiite allies) but includes representatives from all of the non-fundamentalist groups involved in the civil war."

Announcement - Belfer Center for Science and International Affairs, Harvard Kennedy School

Cybersecurity: The Intersection of Policy and Technology

June 12, 2015

Cybersecurity: The Intersection of Policy and Technology is a Harvard Kennedy School Executive Education program designed for senior leaders in government, military, and the private sector who are involved in the oversight of technology and creation of policy, as well as legal experts focusing on issues of cybersecurity; no computer science background is required to apply.