44 Items

guns and missiles burst forth from a laptop screen

Adobe Stock

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Guns, Incels, and Algorithms: Where We Are on Managing Terrorist and Violent Extremist Content Online

| June 12, 2023

Technology companies and governments have spent the past decade trying to better address the evolving threat of terrorist and violent extremist content online (TVEC). This paper examines how effective these efforts have been, where we are today in managing the problem, and wherein lie gaps for improvement.

hand pointing at a screen displaying a screenshot from Darkcode

AP Photo/Gene J. Puskar

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

New Risks in Ransomware: Supply Chain Attacks and Cryptocurrency

| May 16, 2022

This paper provides an overview of the current ransomware landscape, such as the rise of Ransomware-as-a-Service (RaaS) and the increase of supply chain attacks, while also gesturing towards potential emerging solutions, such as software bill of materials (SBOM), vulnerability disclosure databases, and stricter cryptocurrency regulations.

Report - Research Institute for Sociotechnical Cyber Security

Remote Working and (In)Security

| June 2021

Remote working during the COVID-19 pandemic has had, and continues to have, a great impact on the workforce. Through interviews with senior cyber security professionals, this research explored how the traditional dynamics between employees and leadership have adapted in such times, responding to a rapidly evolving cyber threat landscape, as well as an unpredictable period for organisations and employees in terms of wellbeing and remote working culture. Focusing on the transition to remote working, cyber security, the psychological contract (relationship between employees and employers) and employee wellbeing, the research highlighted several key themes.

Paper

The Coming AI Hackers

| April 2021

Hacking is generally thought of as something done to computer systems, but this conceptualization can be extended to any system of rules. The tax code, financial markets, and any system of laws can be hacked. This essay considers a world where AIs can be hackers. This is a generalization of specification gaming, where vulnerabilities and exploits of our social, economic, and political systems are discovered and exploited at computer speeds and scale.

Report - Atlantic Council

The Reverse Cascade: Enforcing Security on the Global IoT Supply Chain

| June 2020

The Internet of Things (IoT) refers to the increasing convergence of the physical and digital worlds and it affects us all. Hundreds of "things" are being connected to the Internet and each other, with more than fifty billion devices expected to be connected by 2030. Many IoT devices are manufactured abroad at low cost with little consideration for security. How can we secure these devices, especially those manufactured outside the United States?

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

2018 State of Digital Transformation

| October 2018

On June 12-13, 2018, digital HKS welcomed public sector digital services teams from around the world to share stories of success, talk about lessons learned, and discuss the challenges they face in transforming government. The teams convened all agreed on North Star goals of building platform services and putting users at the center; what remains much more difficult is identifying how teams in very different political and technology contexts should think about how to reach that end-state. In this report, digital HKS shares best practices we gleaned from this group, to start a broader conversation for digital services groups around the world about what comes next.

Report - Potomac Institute for Policy Studies

Kingdom of Saudi Arabia Cyber Readiness at a Glance

| September 2017

The Kingdom of Saudi Arabia Cyber Readiness at a Glance is the ninth study in a series of country reports assessing national-level preparedness for cyber risks based on the Cyber Readiness Index (CRI) 2.0 methodology. This report provides the most in-depth analysis to date of Saudi Arabia’ current cyber security posture and its efforts to strengthen the country's security and resilience in the wake of significant cyber threats to the nation.

Engima machine

Wikimedia

Paper - Hoover Institution Press

Nobody But Us

    Author:
  • Ben Buchanan
| Aug. 30, 2017

In the modern era, there is great convergence in the technologies used by friendly nations and by hostile ones. Signals intelligence agencies find themselves penetrating the technologies that they also at times must protect. To ease this tension, the United States and its partners have relied on an approach sometimes called Nobody But Us, or NOBUS: target communications mechanisms using unique methods accessible only to the United States. This paper examines how the NOBUS approach works, its limits, and the challenging matter of what comes next.

Paper - Cyber Security Project, Belfer Center

A Legislator's Guide to Reauthorizing Section 702

    Author:
  • Anne Boustead
| Aug. 20, 2017

Section 702 of the Foreign Intelligence Surveillance Act (FISA) Amendments Act of 2008, a powerful surveillance tool that allows U.S. government agencies to spy on foreign persons to collect counter-terrorism intelligence, will expire on December 31, 2017 without Congressional reauthorization. This paper has two goals: to concisely describe how agencies obtain information under Section 702, and to provide guidance to legislators and their staffers by examining the core issues they will confront as they consider reauthorizing this legislation.