500 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

Analysis & Opinions - Bulletin of the Atomic Scientists

The Postponement of the NPT Review Conference. Antagonisms, Conflicts and Nuclear Risks after the Pandemic

The Bulletin of Atomic Scientists has published a document from the Pugwash Conference on Science and World Affairs concerning nuclear problems and tensions in the time of COVID-19. The document has been co-signed by a large number of Pugwash colleagues and personalities.

Chernobyl welcome sign

Wikimedia CC/Jorge Franganillo

Journal Article - Futures

Accumulating Evidence Using Crowdsourcing and Machine Learning: A Living Bibliography about Existential Risk and Global Catastrophic Risk

    Authors:
  • Gorm E. Shackelford
  • Luke Kemp
  • Catherine Rhodes
  • Lalitha Sundaram
  • Seán S. ÓhÉigeartaigh
  • Simon Beard
  • Haydn Belfield
  • Shahar Avin
  • Dag Sørebø
  • Elliot M. Jones
  • John B. Hume
  • David Price
  • David Pyle
  • Daniel Hurt
  • Theodore Stone
  • Harry Watkins
  • Lydia Collas
  • Bryony C. Cade
  • Thomas Frederick Johnson
  • Zachary Freitas-Groff
  • David Denkenberger
  • Michael Levot
  • William J. Sutherland
| February 2020

The study of existential risk — the risk of human extinction or the collapse of human civilization — has only recently emerged as an integrated field of research, and yet an overwhelming volume of relevant research has already been published. To provide an evidence base for policy and risk analysis, this research should be systematically reviewed. In a systematic review, one of many time-consuming tasks is to read the titles and abstracts of research publications, to see if they meet the inclusion criteria. The authors show how this task can be shared between multiple people (using crowdsourcing) and partially automated (using machine learning), as methods of handling an overwhelming volume of research.

Travelers from China’s Wuhan and other cities go through body temperature scanners at Narita international airport in Narita, near Tokyo, Thursday, Jan. 23, 2020.

AP Photo/Eugene Hoshiko

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Weaponizing Digital Health Intelligence

| January 2020

This paper argues that these potential vulnerabilities deserve rigorous, urgent, and thorough investigation. First, it draws from cybersecurity literature, and reviews general sources of vulnerability in digital systems. Next, with these sources of vulnerability in mind, it reviews the health intelligence systems used in the US as well as in a current Public Health Emergency of International Concern (PHEIC), the Ebola outbreak in the Democratic Republic of the Congo (DRC). It then It then reviews the possible motives state actors have to attack health intelligence systems, drawing on recent examples of state-led efforts to manipulate, conceal, or undermine health information. It then speculates about what an attack on a health intelligence system might look like. It concludes by proposing a research and education agenda to thoroughly interrogate these issues and generate policy recommendations needed to address them.

Members of the 576th Flight Test Squadron monitor an operational test launch of an unarmed Minuteman III missile

USAF/Michael Peterson

Journal Article - Bulletin of the Atomic Scientists

The Overwhelming Case for No First Use

| Jan. 13, 2020

The arguments in favor of the United States' declaring that the only purpose of its nuclear weapons is to deter others who possess them from using theirs — in other words, that in no circumstances will this country use nuclear weapons first — are far stronger than the arguments against this stance. It must be hoped that the next US administration will take this no-first-use step promptly.

Joel Brenner, Meicen Sun, and Daniel Weitzner

Belfer Center/Benn Craig

Analysis & Opinions - Project on Europe and the Transatlantic Relationship

Profit, Privacy, Power: China's Digital Rise and a US-EU Response

    Author:
  • Winston Ellington Michalak
| Dec. 20, 2019

In an event co-hosted by the Project on Europe and the Transatlantic Relationship’s (PETR) and the Asia Center, Cathryn Clüver Ashbrook, Executive Director of the Future of Diplomacy Project and the Project on Europe and the Transatlantic Relationship, moderated a panel discussion on China’s technological rise and its impact on the US-EU relationship. The panel featured Joel Brenner, Senior Research Fellow at the Center for International Studies; Danil Kerimi, Head of Technology Industries Sector, Digital Economy and Global Technology Policy, the World Economic Forum; Meicen Sun, PhD Candidate in the Department of Political Sciences at MIT; and Daniel Weitzner, Founding Director of the Internet Policy Research Initiative. 

biohazard bag in laboratory

Wikimedia CC/R.Bektaev

Analysis & Opinions - CNN

What Digital Nerds and Bio Geeks Have to Worry About

| Sep. 13, 2019

The authors explain how the risks of computer systems are transferring to biological systems. The difference is that biological systems have the potential to cause a greater degree of damage than computer systems. Stringent biocontainment helps, but no containment system provides zero risk.