37 Items

An F-35A Lightning II flies above the Mojave Desert

USAF/Public Domain

Analysis & Opinions - Bulletin of the Atomic Scientists

To Enhance National Security, the Biden Administration Will Have to Trim an Exorbitant Defense Wish List

| Mar. 13, 2024

David Kearn argues that even in the absence of restrictive resource and budgetary constraints, a focus on identifying and achieving concrete objectives that will position the United States and its allies to effectively deter aggression in critical regional flashpoints should be the priority given the stressed nature of the defense industrial base and the nuclear enterprise.

Travelers from China’s Wuhan and other cities go through body temperature scanners at Narita international airport in Narita, near Tokyo, Thursday, Jan. 23, 2020.

AP Photo/Eugene Hoshiko

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Weaponizing Digital Health Intelligence

| January 2020

This paper argues that these potential vulnerabilities deserve rigorous, urgent, and thorough investigation. First, it draws from cybersecurity literature, and reviews general sources of vulnerability in digital systems. Next, with these sources of vulnerability in mind, it reviews the health intelligence systems used in the US as well as in a current Public Health Emergency of International Concern (PHEIC), the Ebola outbreak in the Democratic Republic of the Congo (DRC). It then It then reviews the possible motives state actors have to attack health intelligence systems, drawing on recent examples of state-led efforts to manipulate, conceal, or undermine health information. It then speculates about what an attack on a health intelligence system might look like. It concludes by proposing a research and education agenda to thoroughly interrogate these issues and generate policy recommendations needed to address them.

biohazard bag in laboratory

Wikimedia CC/R.Bektaev

Analysis & Opinions - CNN

What Digital Nerds and Bio Geeks Have to Worry About

| Sep. 13, 2019

The authors explain how the risks of computer systems are transferring to biological systems. The difference is that biological systems have the potential to cause a greater degree of damage than computer systems. Stringent biocontainment helps, but no containment system provides zero risk.

Book - Oxford University Press

Innovation and Its Enemies: Why People Resist New Technologies

| July 2016

This book explores the sources and dynamics of social opposition to innovation. It:

  • Explains the roots of resistance to new technologies - and why such resistance is not always futile
  • Draws on nearly 600 years of economic history to show how the balance of winners and losers shapes technological controversies
  • Outlines policy strategies for inclusive innovation to reduce the risks and maximize the benefits of new technologies

Sign up to receive updates about the book ›

Welcome Home, Scott Kelly. Now Let’s Go to Mars

commons.wikimedia.org

Analysis & Opinions - WIRED

Welcome Home, Scott Kelly. Now Let’s Go to Mars

| March, 4, 2016

ON TUESDAY, MARCH 1, 2016, Commander Scott Kelly returned home from the International Space Station after twelve months working off the Earth, for the Earth. His year in space will pay scientific and medical dividends for years to come, helping pave the way for future astronauts to travel to Mars and beyond.

teaser image

News - Belfer Center for Science and International Affairs, Harvard Kennedy School

Daniel Schrag to Direct Belfer Center's Science, Technology, and Public Policy Program

| September 16, 2015

Cambridge, MA – The Belfer Center for Science and International Affairs has named Daniel Schrag, Sturgis Hooper Professor of Geology and Director of the Center for the Environment at Harvard University, to lead its Science, Technology, and Public Policy program. STPP, one of Harvard's most collaborative and cross-disciplinary programs, is renowned world-wide for its cutting-edge research on technology innovation, nuclear non-proliferation and safety, climate science and policy, cybersecurity, and globalization and development.

Report - Managing the Atom Project, Belfer Center

Cutting Too Deep: The Obama Administration’s Proposals for Nuclear Security Spending Reductions

| July 30, 2014

The Obama administration has proposed steep cuts in funding for improving security for dangerous nuclear materials. If approved, they would slow progress toward preventing the essential ingredients of nuclear bombs from falling into terrorist hands. Cutting too Deep reviews funding trends over the past four years and describes how the proposed cuts would delay nuclear and radiological material removal, research reactor conversion, and other work.

Analysis & Opinions - Power & Policy Blog

The Plutonium Mountain Mission: Lessons

| Sep. 27, 2013

In Summer of 2013, The Project on Managing the Atom released “Plutonium Mountain: Inside the 17-Year Mission to Secure a Dangerous Legacy of Soviet Nuclear Testing.” In the report, Eben Harrell and David Hoffman tell how dedicated scientists and engineers in three countries overcame suspicions, secrecy, bureaucracy, and logistical obstacles to secure more than a dozen bombs worth of plutonium that had been left behind at the Semipalatinsk Test Site in Kazakhstan after the collapse of the Soviet Union. Although the outline of the Semipalatinsk operation had been made public before, the report filled in new details.

Analysis & Opinions - The Washington Post

Saving the World at Plutonium Mountain

| August 16, 2013

Last October, at the foot of a rocky hillside near here, at a spot known as Degelen Mountain, several dozen Kazakh, Russian and American nuclear scientists and engineers gathered for a ceremony. The modest ribbon-cutting marked the conclusion of one of the largest and most complex nuclear security operations since the Cold War — to secure plutonium (enough to build a dozen or more nuclear weapons) that Soviet authorities had buried at the testing site years before and forgotten, leaving it vulnerable to terrorists and rogue states. The effort spanned 17 years, cost $150 million and involved a complex mix of intelligence, science, engineering, politics and sleuthing. This op-ed is based on documents and interviews with Kazakh, Russian and U.S. participants, and reveals the scope of the operation for the first time.