165 Items

bus that runs on green hydrogen, framed by leaves

AP Photo/Anupam Nath

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

India - The New Global Green Hydrogen Powerhouse?

| Mar. 26, 2024

India aims to become a leading producer of green hydrogen by the next decade as part of its broader industrial and decarbonization strategies. This brief provides an overview of India's current hydrogen strategy, as well as the challenges - land and water scarcity, infrastructure gaps, and financing gaps - that must be addressed in order for India to achieve its ambitious goals.

Paper

The Coming AI Hackers

| April 2021

Hacking is generally thought of as something done to computer systems, but this conceptualization can be extended to any system of rules. The tax code, financial markets, and any system of laws can be hacked. This essay considers a world where AIs can be hackers. This is a generalization of specification gaming, where vulnerabilities and exploits of our social, economic, and political systems are discovered and exploited at computer speeds and scale.

Report - Atlantic Council

The Reverse Cascade: Enforcing Security on the Global IoT Supply Chain

| June 2020

The Internet of Things (IoT) refers to the increasing convergence of the physical and digital worlds and it affects us all. Hundreds of "things" are being connected to the Internet and each other, with more than fifty billion devices expected to be connected by 2030. Many IoT devices are manufactured abroad at low cost with little consideration for security. How can we secure these devices, especially those manufactured outside the United States?

Travelers from China’s Wuhan and other cities go through body temperature scanners at Narita international airport in Narita, near Tokyo, Thursday, Jan. 23, 2020.

AP Photo/Eugene Hoshiko

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Weaponizing Digital Health Intelligence

| January 2020

This paper argues that these potential vulnerabilities deserve rigorous, urgent, and thorough investigation. First, it draws from cybersecurity literature, and reviews general sources of vulnerability in digital systems. Next, with these sources of vulnerability in mind, it reviews the health intelligence systems used in the US as well as in a current Public Health Emergency of International Concern (PHEIC), the Ebola outbreak in the Democratic Republic of the Congo (DRC). It then It then reviews the possible motives state actors have to attack health intelligence systems, drawing on recent examples of state-led efforts to manipulate, conceal, or undermine health information. It then speculates about what an attack on a health intelligence system might look like. It concludes by proposing a research and education agenda to thoroughly interrogate these issues and generate policy recommendations needed to address them.

teaser image

Press Release - Belfer Center for Science and International Affairs, Harvard Kennedy School

Belfer Center Convenes Council on the Responsible Use of Artificial Intelligence

| Jan. 22, 2019

CAMBRIDGE MA – Harvard Kennedy School’s Belfer Center for Science and International Affairs has convened the inaugural meeting of The Council on the Responsible Use of Artificial Intelligence (AI), a new effort to address critical questions about this far-reaching and rapidly evolving application for data and technology.  

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

2018 State of Digital Transformation

| October 2018

On June 12-13, 2018, digital HKS welcomed public sector digital services teams from around the world to share stories of success, talk about lessons learned, and discuss the challenges they face in transforming government. The teams convened all agreed on North Star goals of building platform services and putting users at the center; what remains much more difficult is identifying how teams in very different political and technology contexts should think about how to reach that end-state. In this report, digital HKS shares best practices we gleaned from this group, to start a broader conversation for digital services groups around the world about what comes next.

A Defense Advanced Research Projects Agency image represents DARPA’s High-Assurance Cyber Military Systems program, which seeks to create technology for constructing systems that are functionally correct and satisfy safety and security properties.

Department of Defense

News - The Atlantic

Writing the Rules of Cyberwar

    Author:
  • Alyza Sebenius
| June 28, 2017

Postdoctoral Fellow Ben Buchanan was interviewed by Alyza Sebanius for The Atlantic on June 28, 2017. In his new book, The Cybersecurity Dilemma, Dr. Buchanan argues that the line between offensive and defensive attacks is far from clear.

Paper - Cyber Security Project, Belfer Center

Countering the Proliferation of Malware

| June 27, 2017

Malicious software is adapted, stolen, bought, and used everyday on a global scale. There are better ways to counter this proliferation than export controls. Policymakers should strengthen incentives for researchers and the private sector to rapidly identify software vulnerabilities, disclose them to developers, patch those vulnerabilities, and adopt those patches. Building on previous debates, this paper makes specific recommendations to shorten the lifecycle of vulnerabilities and improve the short term health of the software security ecosystem.