11 Items

Security specialist Erik Dickmeyer works at a computer station with a cyber threat map displayed on a wall in front of him

AP Photo/John Minchillo

Analysis & Opinions - Project Syndicate

Can Cyberwarfare Be Regulated?

| Oct. 02, 2019

Joseph Nye writes that In the cyber realm, the same program can be used for legitimate or malicious purposes, depending on the user’s intent. But if that makes traditional arms-control treaties impossible to verify, it may still be possible to set limits on certain types of civilian targets and negotiate rough rules of the road that limit conflict.

Panorama of Pyongyang, North Korea.

Wikimedia CC/Sven Unbehauen

Analysis & Opinions - Project Syndicate

Deterrence in Cyberspace

| June 03, 2019

Understanding deterrence in cyberspace is often difficult, because  minds remain captured by an image of deterrence shaped by the Cold War: a threat of massive retaliation to a nuclear attack by nuclear means. A better analogy is crime: governments can only imperfectly prevent it.

John Holdren Speaking at the Climate Crisis Summit

Belmont Media Center

Video

Climate Crisis Action Summit

| June 28, 2018

U.S. Senator Ed Markey hosts former EPA Administrator Gina McCarthy, former U.S., Special Envoy for Climate Change Todd Stern, and former Office of Science & Technology Policy Director John Holdren for a public forum at Belmont High School. The discussion was moderated by MA State Senator Will Brownsberger.

The Palace of Nations

Creative Commons

Analysis & Opinions - Strategist

How Will New Cybersecurity Norms Develop?

| Mar. 12, 2018

Many observers have called for laws and norms to secure this new environment. But developing such standards in the cyber domain faces a number of difficult hurdles. Although Moore's law about the doubling of computing power every two years means that cyber time moves quickly, human habits, norms, and state practices change more slowly.