10 Items

- Belfer Center for Science and International Affairs, Harvard Kennedy School

Nye Lauded for Cybersecurity Leadership

Harvard University Distinguished Service Professor and former Harvard Kennedy School Dean Joseph S. Nye was honored  by the Center’s Cyber Security Project in April for his leadership and contributions to cybersecurity through the Belfer Center’s cybersecurity initiatives. Nye has announced his retirement at the end of the semester.

Paper - Harvard Business Publishing

The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy

| February 2015

The case is designed to support a discussion of the costs and benefits associated with competing models of vulnerability disclosure. The trade in zero-days is a growing area of policy concern. The case can be used in courses on cyber policy, science and technology policy, or national security. It can be used to explore the concepts of public goods, dual-use technologies, and externalities.

Journal Article - IEEE Security & Privacy

Regulating Cybersecurity: Institutional Learning or a Lesson in Futility?

| November-December 2014

On 22 November 2013, the Federal Energy Regulatory Commission approved the latest version of mandatory cybersecurity regulations for the bulk electric system—known as Critical Infrastructure Protection (CIP) Reliability Standards. The CIP standards are relatively unique: they are developed through an unusual model of industry-led regulation that places industry, and not federal regulators, at the center of regulatory design and enforcement. The CIP regulations have received a significant amount of criticism. Critics argue that the regulations are incomplete at best and irreparably flawed at worst. The author examines the lessons we can learn from the CIP standards and poses a provocative question: Are the regulations actually a secret success?

Book Chapter

Creating a Secure Network: The 2001 Anthrax Attacks and the Transformation of Postal Security

| June 2014

The author critically examines the creation and implementation of new security standards within the postal network after the 2001 anthrax attack. Drawing on research conducted at the Smithsonian Institution and documents obtained under the Freedom of Information Act (FOIA), the article traces the politics inscribed within the architecture of new security technologies. The article sets debates about postal security within a broader account of political economy. The article emphasizes the possibilities and limitations of disasters to create moments of disruption and undergird new political interventions.

Blog Post - Technology and Policy

Protecting US Critical Infrastructure: One Step Forward for Cybersecurity, One Back?

| July 24, 2013

Industrial control systems might be the most important technology that you have never heard of. They’re computer systems used to monitor and control a range of physical processes within critical infrastructures, such as opening valves or closing circuit breakers. It is no exaggeration to say that industrial control systems are essential to modern life: they help keep our lights on, our water clean, and our trains running on time. But control systems—and the critical infrastructures within which they operate—are increasingly vulnerable to malicious cyber-intrusions.

Analysis & Opinions - Technology+Policy | Innovation@Work

Protecting US Critical Infrastructure: One Step Forward for Cybersecurity, One Back?

| July 24, 2013

"...[T]he Department of Homeland Security's Industrial Control System Cyber Emergency Response Team (ICS-CERT) recently canceled two long-planned conferences and a number of training sessions. The cancellations are likely an effect of sequestration—no funds."

Proposed route for ethanol shipments would move the highly flammable liquid on these MBTA train tracks through Kendall Sq. in Cambridge, Mass.

Wig Zamore STEP Photo

Analysis & Opinions - Power & Policy Blog

Dangerous Cargo: Action Needed on Hazardous Materials

| June 13, 2013

"The threat of terrorism complicates matters even further. In April, two men in Canada were arrested for plotting an attack on rail lines near Toronto. In the US, homeland security officials have warned that shipments of hazardous materials are an attractive terrorist target."

News - Science, Technology, and Public Policy Program, Belfer Center

Cyber Security

| March 5, 2013

Dr. Ellis raises an interesting question: Does the pursuit of offensive cyber capabilities undermine domestic security? The conversation highlights a growing area of concern and ongoing debate.

Journal Article - International Journal of Communication

The Premature Death of Electronic Mail: The United States Postal Service's E-COM Program, 1978–1985

| 2013

In the late-1970s, the United States Postal Service (USPS) launched an innovative electronic mail service, "E-COM," that sought to integrate networked computing and the postal system. Postal management envisioned E-COM as a path-breaking program that would carve out a key place for postal service in the coming information age. The following examination of the ultimate failure of E-COM contributes to the history of networked computing and communications, while additionally providing a unique perspective on the current precarious state of postal service in the United States.

Derry Township Police Chief William D. Smith uses a photo during a news conference, July 6, 2006, to explain the contents of several chemical tanker cars that derailed near Hershey, Pa. 14 families and several businesses were evacuated.

AP Photo

Discussion Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Rail Transportation of Toxic Inhalation Hazards: Policy Responses to the Safety and Security Externality

| February 2010

Toxic inhalation hazard (TIH) chemicals such as chlorine gas and anhydrous ammonia are among the most dangerous of hazardous materials. Rail transportation of TIH creates risk that is not adequately reflected in the costs, creating a TIH safety and security externality. This paper describes and evaluates policy alternatives that might effectively mitigate the dangers of TIH transportation by rail. After describing the nature of TIH risk and defining the TIH externality, general policy approaches to externalities from other arenas are examined. Potential risk reduction strategies and approaches for each segment of the supply chain are reviewed. The paper concludes by summarizing policy options and assessing some of the most promising means to reduce the risks of transportation of toxic inhalation hazards. Four policy approaches are recommended: internalizing external costs through creation of a fund for liability and claims, improving supply chain operations, enhancing emergency response and focusing regulatory authority. It is further suggested that the Department of Transportation convene a discussion among stakeholder representatives to evaluate policy alternatives.