28 Items

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Rational Not Reactive

| October 2021

The increasing tempo of offensive cyber operations by Iran and its adversaries, including the U.S. and Israel, has led many commentators to label them as “tit-for-tat”: a cyclical action-reaction dynamic where each side seeks to respond appropriately to an earlier violation by the other. However, this interpretation has significant theoretical and empirical deficiencies. Why, then, does a tit-for-tat narrative dominate our understanding of Iranian cyber activity, and what are the consequences? This paper explores that question.

teaser image

Magazine Article - Economist

Digital Dominance: A new global ranking of cyber-power throws up some surprises

China has the world’s largest army. Russia wields the most tanks. America owns the fanciest satellites. But who has the most cyber-power? A new National Cyber Power Index by the Belfer Centre at Harvard University ranks 30 countries on their level of ambition and capability. Offensive cyber-power—the ability to do harm in or through computer networks—is one measure. But so too are the strength of a country’s defences, the sophistication of its cyber-security industry and its ability to spread and counter propaganda.

teaser image

Newspaper Article

Chinese cyber power is neck-and-neck with US, Harvard research finds

| Sep. 08, 2020

As conventional wisdom goes, experts tend to rank the U.S ahead of China, U.K.IranNorth KoreaRussia, in terms of how strong it is when it comes to cyberspace. But a new study from Harvard University’s Belfer Center shows that China has closed the gap on the U.S. in three key categories: surveillance, cyber defense, and its efforts to build up its commercial cyber sector.

“A lot of people, Americans in particular, will think that the U.S., the U.K., France, Israel are more advanced than China when it comes to cyber power,” Eric Rosenbach, the Co-Director of Harvard’s Belfer Center, told CyberScoop. “Our study shows it’s just not the case and that China is very sophisticated and almost at a peer level with the U.S.”

(Journal of Cyber Policy)

(Journal of Cyber Policy)

Journal Article - Journal of Cyber Policy

Hack-and-Leak Operations: Intrusion and Influence in the Gulf

| July 07, 2019

Events such as the leaking of hacked emails from the US Democratic National Committee before the 2016 presidential election sit between two paradigms of cybersecurity. The first paradigm focuses on intrusion (unauthorised access to networks), while the second concentrates on influence (the use of digital technologies to shift public debate). Analyses generally tackle one of these two aspects.

teaser image

Analysis & Opinions - War on the Rocks

Between Multistakeholderism and Sovereignty: Cyber Norms in Egypt and the Gulf States

| Oct. 12, 2018

The difficulty of reaching global agreement on cyber norms is generally attributed to a bipolar division in cyber security governance, reflecting two opposing political systems and sets of values. On one hand, there is a group of what experts have called “likeminded” states. This group generally includes the United States and European countries, and it believes in an open and free internet driven largely by global market competition with some government regulation and civil society observation (known as multistakeholderism). The second group includes Iran, Russia, and China, and prioritizes state control over national “borders” in cyber space with strict governmental limits on content (known as cyber sovereignty.) These differences have been described as the cyber space element of a resurgent Cold War, in which neoliberal and democratic structures confront information control, authoritarianism, and rule-breaking.

teaser image

Journal Article - Journal of Conflict Resolution

Invisible Digital Front

| Nov. 10, 2017

Recent years have seen growing concern over the use of cyber attacks in wartime, but little evidence that these new tools of coercion can change battlefield events. We present the first quantitative analysis of the relationship between cyber activities and physical violence during war. Using new event data from the armed conflict in Ukraine—and additional data from Syria’s civil war—we analyze the dynamics of cyber attacks and find that such activities have had little or no impact on fighting.