8 Items

Running Out of Time on Iran, and All Out of Options

Wikimedia Commons CC

Newspaper Article - The Times of Israel

Running Out of Time on Iran, and All Out of Options

    Author:
  • David Horovitz
| June 19, 2013

"...[Y]es, I think Stuxnet had a few down sides. One of those down sides was that the actual attack code became publicly available. As far as I can tell the attack code was supposed to die and not get out onto the Internet, but apparently the same way it got into Natanz [Iranian nuclear enrichment facility], it got out...."

Magazine Article - Reuters Magazine

Running Al Qaeda

| June 2012

"Getting second-rung leadership right is important for any enterprise, and for al Qaeda that meant assuring the brand and building network capacity for terror. Bin Laden was careful about deciding who would be anointed with two powerful gifts—his blessing of leadership, and formal affiliation of groups to al Qaeda central (a term he heard used by the media and, amazingly, appropriated)."

Presentation

Cyber Disorders: Rivalry and Conflict in a Global Information Age

| May 3, 2012

The risks posed by the proliferation of cyber weapons are gaining wide recognition among security planners. Yet the general reaction of scholars of international relations has been to neglect the cyber peril owing to its technical novelties and intricacies. This attitude amounts to either one or both of two claims: the problem is not of sufficient scale to warrant close inspection, or it is not comprehensible to a non-technical observer. This seminar challenged both assertions.

A security guard, right, stands at the entrance of El Al sales offices in Tel Aviv, Israel, Jan. 16, 2012. Hackers disrupted the websites of Israel's stock exchange and El Al in a deepening cyber war launched by a group claiming to be Saudis.

AP Photo

Analysis & Opinions - The Wall Street Journal

Cyber Attacks Can Spark Real Wars

| February 16, 2012

"The recent hacker exchange should also remind us that just as hacking could escalate to the use of conventional force in the Middle East, the reverse is also true. Bombing Iran, for example, could unleash an Iranian government cyber attack. Israelis say they could handle that, despite the recent evidence to the contrary. Unfortunately, much of the critical infrastructure in the U.S. is still not ready for a sophisticated nation-state cyber attack either."

Norton Cybercrime Index

AP Photo

Paper - Science, Technology, and Public Policy Program, Belfer Center

Taking a Byte Out of Cybercrime

| October 2011

"Cybersecurity is a means to enable social stability and promote digital democracy; a method by which to govern the Internet; and a process by which to secure critical infrastructure from cybercrime, cyberespionage, cyberterrorism and cyberwar. As nations and corporations recognize their dependence on ICT, policymakers must find the proper balance in protecting their investments without strangling future growth."

Discussion Paper - Science, Technology, and Public Policy Program, Belfer Center

WikiLeaks 2010: A Glimpse of the Future?

    Author:
  • Tim Maurer
| August 2011

The recent publications on WikiLeaks reveal a story about money, fame, sex, underground hackers, and betrayal. But it also involves fundamental questions regarding cyber-security and foreign policy. This paper argues WikiLeaks is only the symptom of a new, larger problem which is the result of technological advances that allow a large quantity of data to be 'stolen' at low or no cost by one or more individuals and to be potentially made public and to go 'viral', spreading exponentially online.

Southern Sudanese people are seen through a Southern Sudanese flag lining up to vote in Juba, Southern Sudan, Jan. 9, 2011. About 4 million Southern Sudanese voters began casting their ballots on Jan. 9 in a weeklong referendum on independence.

AP Photo

Analysis & Opinions - The Guardian

Southern Sudan Has Many Lessons to Learn from Juba University

| July 5, 2011

"Critics of the role of universities in economic transformation argue that higher education takes too long to show results and that its focus is usually too academic. However, the evidence suggests that practically oriented universities offer the fastest and most durable ways to incubate new states. With the right vision, universities can confer their attributes to a new state."

- Belfer Center for Science and International Affairs, Harvard Kennedy School Quarterly Journal: International Security

Belfer Center Newsletter Spring 2011

| Spring 2011

The Spring 2011 issue of the Belfer Center newsletter features recent and upcoming activities, research, and analysis by members of the Center community on critical global issues. This issue highlights the Belfer Center’s continuing efforts to build bridges between the United States and Russia to prevent nuclear catastrophe – an effort that began in the 1950s. This issue also features three new books by Center faculty that sharpen global debate on critical issues: God’s Century, by Monica Duffy Toft, The New Harvest by Calestous Juma, and The Future of Power, by Joseph S. Nye.