5 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

Analysis & Opinions - Lawfare

Three Observations on China's Approach to State Action in Cyberspace

| Jan. 22, 2017

Cyber Security Project Director Michael Sulmeyer and Project Affiliate Amy Chang discuss their observations on China's Approach to cyber after a recent visit to Beijing. Sulmeyer and Chang were part of a small group of American academics and goernment representatives to meet with Chinese counterparts about contemporary issues in cybersecurity.

Announcement - Science, Technology, and Public Policy Program, Belfer Center

STPP Fellowships, 2014–2015

November 25, 2013

Each year, the Science, Technology, and Public Policy (STPP) Program at the Belfer Center for Science and International Affairs at the Harvard Kennedy School welcomes new pre- and post-doctoral fellows and visiting researchers to a select team of scholars exploring the critical role that science and technology play in everyday life.

In this Sept. 24, 2010, file photo the National Cybersecurity & Communications Integration Center (NCCIC) prepares for the Cyber Storm III exercise at its operations center in Arlington, Va.

AP Photo

Magazine Article - Bulletin of the American Academy of Arts and Sciences

The Future of Power

| Spring 2011

"The conventional wisdom among those who looked at the Middle East used to be that you had a choice either of supporting the autocrat or being stuck with the religious extremists. The extraordinary diffusion of information created in Egypt and other Middle Eastern countries reveals a strong middle that we weren't fully aware of. What is more, new technologies allow this new middle to coordinate in ways unseen before Twitter, Facebook, and so forth, and this could lead to a very different politics of the Middle East. This introduces a new complexity to our government's dealings with the region."