190 Items

guns and missiles burst forth from a laptop screen

Adobe Stock

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Guns, Incels, and Algorithms: Where We Are on Managing Terrorist and Violent Extremist Content Online

| June 12, 2023

Technology companies and governments have spent the past decade trying to better address the evolving threat of terrorist and violent extremist content online (TVEC). This paper examines how effective these efforts have been, where we are today in managing the problem, and wherein lie gaps for improvement.

man wearing a shirt promoting TikTok

AP/Ng Han Guan

Analysis & Opinions - Project Syndicate

The Other Global Power Shift

| Aug. 06, 2020

Joseph Nye writes that the world is increasingly obsessed with the ongoing power struggle between the United States and China. But the technology-driven shift of power away from states to transnational actors and global forces brings a new and unfamiliar complexity to global affairs.

Travelers from China’s Wuhan and other cities go through body temperature scanners at Narita international airport in Narita, near Tokyo, Thursday, Jan. 23, 2020.

AP Photo/Eugene Hoshiko

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Weaponizing Digital Health Intelligence

| January 2020

This paper argues that these potential vulnerabilities deserve rigorous, urgent, and thorough investigation. First, it draws from cybersecurity literature, and reviews general sources of vulnerability in digital systems. Next, with these sources of vulnerability in mind, it reviews the health intelligence systems used in the US as well as in a current Public Health Emergency of International Concern (PHEIC), the Ebola outbreak in the Democratic Republic of the Congo (DRC). It then It then reviews the possible motives state actors have to attack health intelligence systems, drawing on recent examples of state-led efforts to manipulate, conceal, or undermine health information. It then speculates about what an attack on a health intelligence system might look like. It concludes by proposing a research and education agenda to thoroughly interrogate these issues and generate policy recommendations needed to address them.

biohazard bag in laboratory

Wikimedia CC/R.Bektaev

Analysis & Opinions - CNN

What Digital Nerds and Bio Geeks Have to Worry About

| Sep. 13, 2019

The authors explain how the risks of computer systems are transferring to biological systems. The difference is that biological systems have the potential to cause a greater degree of damage than computer systems. Stringent biocontainment helps, but no containment system provides zero risk.

Nuclear Safety, Safeguards and Security–Strengthening the Global Nuclear Order

IAEA Imagebank

Presentation

Nuclear Safety, Safeguards and Security–Strengthening the Global Nuclear Order

| December 7, 2016

As the IAEA Director General Emeritus, Hans Blix put it “A nuclear accident anywhere is an accident everywhere”. Fukushima revealed that no one state is immune from fallacies that resulted both before and after the nuclear accident. That will be also true with any nuclear terrorism event, which we have been spared thus far.

Book - Oxford University Press

Innovation and Its Enemies: Why People Resist New Technologies

| July 2016

This book explores the sources and dynamics of social opposition to innovation. It:

  • Explains the roots of resistance to new technologies - and why such resistance is not always futile
  • Draws on nearly 600 years of economic history to show how the balance of winners and losers shapes technological controversies
  • Outlines policy strategies for inclusive innovation to reduce the risks and maximize the benefits of new technologies

Sign up to receive updates about the book ›

- Belfer Center for Science and International Affairs, Harvard Kennedy School Belfer Center Newsletter

Protecting the U.S. in Cyberspace

| Spring 2016

The computers, networks, and systems of cyberspace have become an integral part of daily life. They control critical infrastructure, ease and speed communication, enable financial transactions, and much more. However, the same aspects of connectivity that allow us to innovate also put us at risk.

Analysis & Opinions - The Huffington Post

Belgium Highlights the Nuclear Terrorism Threat and Security Measures to Stop it

| March 29, 2016

"As world leaders gather for the fourth nuclear security summit this week, in the aftermath of the horrifying terrorist attacks in Brussels, it seems likely that Belgian Prime Minister Charles Michel will have more to say than anyone else — both about real nuclear terrorist dangers and about real steps taken to improve nuclear security...."