674 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

man wearing a shirt promoting TikTok

AP/Ng Han Guan

Analysis & Opinions - Project Syndicate

The Other Global Power Shift

| Aug. 06, 2020

Joseph Nye writes that the world is increasingly obsessed with the ongoing power struggle between the United States and China. But the technology-driven shift of power away from states to transnational actors and global forces brings a new and unfamiliar complexity to global affairs.

U.S. Energy Secretary Rick Perry is silhouetted near the words "Clean Energy"

AP/Ng Han Guan

Analysis & Opinions - Berkeley Blog

How to Globalize Clean Energy

| June 20, 2020

The authors argue that more determined efforts to globalize renewable energy transmission can confer significantly higher economic and environmental benefits from renewables on billions of people. This can be done by exploiting spatial differences between electricity loads and net renewable generation across time zones (temporal arbitrage) and latitude (seasonal arbitrage). Using very long distance, ultra-high voltage (UHV) transmission infrastructure, temporal and spatial arbitrage can move low-cost clean electricity from areas with excess capacity to high demand zones in other countries and even continents.

Shri Piyush Goyal addressing a Press Conference

Wikimedia/Ministry of Power (GODL-India)

Journal Article - Energy Research & Social Science

Illuminating Homes with LEDs in India: Rapid Market Creation Towards Low-carbon Technology Transition in a Developing Country

| August 2020

This paper examines a recent, rapid, and ongoing transition of India's lighting market to light emitting diode (LED) technology, from a negligible market share to LEDs becoming the dominant lighting products within five years, despite the country's otherwise limited visibility in the global solid-state lighting industry.

Chernobyl welcome sign

Wikimedia CC/Jorge Franganillo

Journal Article - Futures

Accumulating Evidence Using Crowdsourcing and Machine Learning: A Living Bibliography about Existential Risk and Global Catastrophic Risk

    Authors:
  • Gorm E. Shackelford
  • Luke Kemp
  • Catherine Rhodes
  • Lalitha Sundaram
  • Seán S. ÓhÉigeartaigh
  • Simon Beard
  • Haydn Belfield
  • Shahar Avin
  • Dag Sørebø
  • Elliot M. Jones
  • John B. Hume
  • David Price
  • David Pyle
  • Daniel Hurt
  • Theodore Stone
  • Harry Watkins
  • Lydia Collas
  • Bryony C. Cade
  • Thomas Frederick Johnson
  • Zachary Freitas-Groff
  • David Denkenberger
  • Michael Levot
  • William J. Sutherland
| February 2020

The study of existential risk — the risk of human extinction or the collapse of human civilization — has only recently emerged as an integrated field of research, and yet an overwhelming volume of relevant research has already been published. To provide an evidence base for policy and risk analysis, this research should be systematically reviewed. In a systematic review, one of many time-consuming tasks is to read the titles and abstracts of research publications, to see if they meet the inclusion criteria. The authors show how this task can be shared between multiple people (using crowdsourcing) and partially automated (using machine learning), as methods of handling an overwhelming volume of research.

new MBTA Orange Line car produced by CRRC

Wikimedia CC/Edward Order

Analysis & Opinions - CNN

The Real Threat from China Isn't 'Spy Trains'

| Sep. 21, 2019

Bruce Schneier  explains that there is no escaping the technology of inevitable surveillance. Consumers have little choice but to rely on the companies that build their computers and write their software, whether in  smartphones,  5G wireless infrastructure, or subway cars.  China is more likely to try to get data from the U.S. communications infrastructure like the United States does rather than try to produce a subway car outfitted with surveillance apparatus.

Panorama of Pyongyang, North Korea.

Wikimedia CC/Sven Unbehauen

Analysis & Opinions - Project Syndicate

Deterrence in Cyberspace

| June 03, 2019

Understanding deterrence in cyberspace is often difficult, because  minds remain captured by an image of deterrence shaped by the Cold War: a threat of massive retaliation to a nuclear attack by nuclear means. A better analogy is crime: governments can only imperfectly prevent it.

Analysis & Opinions - Lawfare

Three Observations on China's Approach to State Action in Cyberspace

| Jan. 22, 2017

Cyber Security Project Director Michael Sulmeyer and Project Affiliate Amy Chang discuss their observations on China's Approach to cyber after a recent visit to Beijing. Sulmeyer and Chang were part of a small group of American academics and goernment representatives to meet with Chinese counterparts about contemporary issues in cybersecurity.