37 Items

Paper - Carnegie-Tsinghua Center for Global Policy

Stabilizing Sino-Indian Security Relations: Managing the Strategic Rivalry After Doklam

| June 21, 2018

The paper provides a detailed analysis of the contemporary Sino-Indian conventional ground and nuclear force balances and carefully reconstructs how mutual developments in these areas are perceived by both New Delhi and Beijing.

Analysis & Opinions - Lawfare

Three Observations on China's Approach to State Action in Cyberspace

| Jan. 22, 2017

Cyber Security Project Director Michael Sulmeyer and Project Affiliate Amy Chang discuss their observations on China's Approach to cyber after a recent visit to Beijing. Sulmeyer and Chang were part of a small group of American academics and goernment representatives to meet with Chinese counterparts about contemporary issues in cybersecurity.

Analysis & Opinions - The National Interest

Attribution from Behind the Veil of Ignorance

| November 13, 2016

"Perfect selective attribution is the most well-balanced in accounting for social justice and security culture needs. The reason being is that it enables all cyber stakeholders with the freedom of choice in disclosing their true personal and/or organizational attributes to an intended recipient, and equally importantly, to what extent. And although each actor is endowed with the power of freedom of choice, every cyber action is also accompanied by the freedom of failure."

Journal Article - Small Wars Journal

Twilight Zone Conflicts: Employing Gray Tactics in Cyber Operations

| October 27, 2016

"...[A]ctors that employ gray tactics in cyber operations need not be successful in actually infiltrating a system to further their revisionist ambitions. Rather, the sheer ramifications from the cyber action itself, has the power to disturb a nation's psyche and challenge the geopolitical status quo."

Discussion Paper - Cyber Security Project, Belfer Center

Government's Role in Vulnerability Disclosure: Creating a Permanent and Accountable Vulnerability Equities Process

    Authors:
  • Ari Schwartz
  • Rob Knake
| June 2016

"When government agencies discover or purchase zero day vulnerabilities, they confront a dilemma: should the government disclose such vulnerabilities, and thus allow them to be fixed, or should the government retain them for national security purposes?"

- Belfer Center for Science and International Affairs, Harvard Kennedy School Belfer Center Newsletter

Protecting the U.S. in Cyberspace

| Spring 2016

The computers, networks, and systems of cyberspace have become an integral part of daily life. They control critical infrastructure, ease and speed communication, enable financial transactions, and much more. However, the same aspects of connectivity that allow us to innovate also put us at risk.