98 Items

Travelers from China’s Wuhan and other cities go through body temperature scanners at Narita international airport in Narita, near Tokyo, Thursday, Jan. 23, 2020.

AP Photo/Eugene Hoshiko

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Weaponizing Digital Health Intelligence

| January 2020

This paper argues that these potential vulnerabilities deserve rigorous, urgent, and thorough investigation. First, it draws from cybersecurity literature, and reviews general sources of vulnerability in digital systems. Next, with these sources of vulnerability in mind, it reviews the health intelligence systems used in the US as well as in a current Public Health Emergency of International Concern (PHEIC), the Ebola outbreak in the Democratic Republic of the Congo (DRC). It then It then reviews the possible motives state actors have to attack health intelligence systems, drawing on recent examples of state-led efforts to manipulate, conceal, or undermine health information. It then speculates about what an attack on a health intelligence system might look like. It concludes by proposing a research and education agenda to thoroughly interrogate these issues and generate policy recommendations needed to address them.

biohazard bag in laboratory

Wikimedia CC/R.Bektaev

Analysis & Opinions - CNN

What Digital Nerds and Bio Geeks Have to Worry About

| Sep. 13, 2019

The authors explain how the risks of computer systems are transferring to biological systems. The difference is that biological systems have the potential to cause a greater degree of damage than computer systems. Stringent biocontainment helps, but no containment system provides zero risk.

Analysis & Opinions - Lawfare

Decoding the 2017 NDAA's Provisions on DoD Cyber Operations

| Jan. 30, 2017

Cyber Security Project Director Michael Sulmeyer and Project Affiliate Charley Snyder examine some of the most important provisions to the recently signed into law 2017 National Defense Authorization Act that the Trump Administration must grapple with during its first year in office.

Thucydides statue image

Foto: Wienwiki/Walter Maderbacher

Analysis & Opinions - Council on Foreign Relations

The Cybersecurity Dilemma: Where Thucydides Meets Cyberspace

    Author:
  • Ben Buchanan
| Jan. 30, 2017

Cyber Security Project Fellow Dr. Ben Buchanan discusses how the traditional concept of the "security dilemma" applies to conflict in cyberspace, arguing that as states play offense and defense in the digital domain, they risk tension no one wants.