66 Items

Travelers from China’s Wuhan and other cities go through body temperature scanners at Narita international airport in Narita, near Tokyo, Thursday, Jan. 23, 2020.

AP Photo/Eugene Hoshiko

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Weaponizing Digital Health Intelligence

| January 2020

This paper argues that these potential vulnerabilities deserve rigorous, urgent, and thorough investigation. First, it draws from cybersecurity literature, and reviews general sources of vulnerability in digital systems. Next, with these sources of vulnerability in mind, it reviews the health intelligence systems used in the US as well as in a current Public Health Emergency of International Concern (PHEIC), the Ebola outbreak in the Democratic Republic of the Congo (DRC). It then It then reviews the possible motives state actors have to attack health intelligence systems, drawing on recent examples of state-led efforts to manipulate, conceal, or undermine health information. It then speculates about what an attack on a health intelligence system might look like. It concludes by proposing a research and education agenda to thoroughly interrogate these issues and generate policy recommendations needed to address them.

biohazard bag in laboratory

Wikimedia CC/R.Bektaev

Analysis & Opinions - CNN

What Digital Nerds and Bio Geeks Have to Worry About

| Sep. 13, 2019

The authors explain how the risks of computer systems are transferring to biological systems. The difference is that biological systems have the potential to cause a greater degree of damage than computer systems. Stringent biocontainment helps, but no containment system provides zero risk.

FBI agents leave a raid in Trenton, N.J. on July 19, 2012

Julio Cortez/AP

Discussion Paper - Managing the Atom Project, Belfer Center

The Long Arm

| February 2019

The networks of middlemen and intermediaries involved in the illicit procurement of weapons of mass destruction (WMD)-related goods and technologies often operate outside of the United States, which presents several legal and political challenges regarding U.S. trade control enforcement activities. This report considers the extraterritorial efforts of U.S. law enforcement in counterproliferation-related activities and their implications. In other words, how does the United States contend with violations of its weapons of mass destruction (WMD)-related trade controls in overseas jurisdictions, and what are the implications for broader U.S. and international nonproliferation efforts, as well as wider international security and economic concerns? 

Robert F. Kennedy Department of Justice Building

EdBrown05/Wikimedia

Analysis & Opinions - Lawfare

The Department of Justice Makes the Next Move in the U.S.-Russia Espionage Drama

| Mar. 16, 2017

On March 15, the U.S. DoJ released an indictment against four Russians in one of the most significant hacking-related law enforcement actions to date. Cyber Security Project's Charley Snyder and Dr. Michael Sulmeyer discuss the indictment and its implications.

Analysis & Opinions - The National Interest

Attribution from Behind the Veil of Ignorance

| November 13, 2016

"Perfect selective attribution is the most well-balanced in accounting for social justice and security culture needs. The reason being is that it enables all cyber stakeholders with the freedom of choice in disclosing their true personal and/or organizational attributes to an intended recipient, and equally importantly, to what extent. And although each actor is endowed with the power of freedom of choice, every cyber action is also accompanied by the freedom of failure."

Book - Oxford University Press

Innovation and Its Enemies: Why People Resist New Technologies

| July 2016

This book explores the sources and dynamics of social opposition to innovation. It:

  • Explains the roots of resistance to new technologies - and why such resistance is not always futile
  • Draws on nearly 600 years of economic history to show how the balance of winners and losers shapes technological controversies
  • Outlines policy strategies for inclusive innovation to reduce the risks and maximize the benefits of new technologies

Sign up to receive updates about the book ›

Welcome Home, Scott Kelly. Now Let’s Go to Mars

commons.wikimedia.org

Analysis & Opinions - WIRED

Welcome Home, Scott Kelly. Now Let’s Go to Mars

| March, 4, 2016

ON TUESDAY, MARCH 1, 2016, Commander Scott Kelly returned home from the International Space Station after twelve months working off the Earth, for the Earth. His year in space will pay scientific and medical dividends for years to come, helping pave the way for future astronauts to travel to Mars and beyond.