380 Items

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Rational Not Reactive

| October 2021

The increasing tempo of offensive cyber operations by Iran and its adversaries, including the U.S. and Israel, has led many commentators to label them as “tit-for-tat”: a cyclical action-reaction dynamic where each side seeks to respond appropriately to an earlier violation by the other. However, this interpretation has significant theoretical and empirical deficiencies. Why, then, does a tit-for-tat narrative dominate our understanding of Iranian cyber activity, and what are the consequences? This paper explores that question.

A miniature of “The War Room” as depicted in the 1964 classic film Dr. Strangelove

Courtesy Eric Chan  and the Los Angeles County Museum of Art, CC-BY 2.0

Paper

Toward a Collaborative Cyber Defense and Enhanced Threat Intelligence Structure

| August 2021

National security structures envisioned in the 20th century are inadequate for the cyber threats that America faces in the 21st century. These structures, created to address strategic, external threats on one end, and homeland security emergencies on the other, cannot protect us from ambient cyber conflict, because they were designed for different times and threats. Our nation—comprising the federal government, private sector companies, critical infrastructure operators, state and local governments, nonprofits and universities, and even private citizens—are constantly under attack by a myriad of cyber actors with ever-increasing capabilities. 

teaser image

Announcement - Belfer Center for Science and International Affairs, Harvard Kennedy School

Chris Krebs Named Senior Fellow at Harvard Kennedy School's Belfer Center

| July 29, 2021

Christopher (Chris) Krebs, former Director of the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), has been named a non-resident Senior Fellow with the Homeland Security Project and the Cyber Project at Harvard Kennedy School’s Belfer Center for Science and International Affairs.

Report - Research Institute for Sociotechnical Cyber Security

Remote Working and (In)Security

| June 2021

Remote working during the COVID-19 pandemic has had, and continues to have, a great impact on the workforce. Through interviews with senior cyber security professionals, this research explored how the traditional dynamics between employees and leadership have adapted in such times, responding to a rapidly evolving cyber threat landscape, as well as an unpredictable period for organisations and employees in terms of wellbeing and remote working culture. Focusing on the transition to remote working, cyber security, the psychological contract (relationship between employees and employers) and employee wellbeing, the research highlighted several key themes.

signs on a bank of computers tell visitors that the machines are not working at the public library

AP/Tony Gutierrez, File

Analysis & Opinions - TechStream

Should Ransomware Payments Be Banned?

| July 26, 2021

Tarah Wheeler and Ciaran Martin write that banning ransomware payments may be seen as as unwarranted state interference in private commerce, but they believe that a coordinated country level response would rectify the glaring deficiency in the current reality: the near-total privatization of national security risk. 

Computer code on monitors

AP/Pavel Golovkin

Analysis & Opinions - Project Syndicate

What Did Biden Achieve in Geneva?

| July 07, 2021

Even if formal cybersecurity treaties are unworkable, it may still be possible to set limits on certain types of civilian targets, and to negotiate rough rules of the road. Whether U.S. President Joe Biden succeeded in launching such a process at his meeting last month with Russian President Vladimir Putin may become clear soon.

A transatlantic telephone cable is brought ashore at Clarenville, Newfoundland, for the final splice on March 8, 1957. In the background is the British naval vessel Monarch, the world’s largest cable layer, which has worked through two summers laying nearly 4,000 miles of cable to complete the two-way system between Newfoundland and Scotland.

AP Photo, File

Paper - Cyber Project

Data Sharing Between the United States and the European Union

    Author:
  • Madalina Murariu
| July 2021

The implications of the Schrems II decision have substantial short and long-term repercussions. This paper will seek to briefly explain the history of the Schrems cases, then outline the options available to decision makers seeking to enable transatlantic cooperation. The paper will also argue that short-term solutions such as the ones leveraged up till now will increasingly be unfeasible, and therefore present four proposals for consideration on how a revived data transfer ecosystem could be shaped through national and international tools and mechanisms.

A map illustration with various borders

Adobe Stock

Paper - Cyber Project

Sovereignty and Data Localization

    Author:
  • Emily Wu
| July 2021

Unfortunately, data localization policies are causing more harm than good. They are ineffective at improving security, do little to simplify the regulatory landscape, and are causing economic harms to the markets where they are imposed. In order to move away from these policies, the fear of sovereignty dilution must be addressed by alternative means. This will be achieved most effectively by focusing on both technical concerns and value concerns.