Video

13 Items

Video - SNF Agora Institute

Election 2020 — Securing the Vote

| Oct. 16, 2020

The 2020 election is happening amidst unprecedented disagreement about election security, as the coronavirus pandemic challenges traditional in-person voting. On the one hand, the incumbent president claims that postal voting will lead to widespread electoral fraud. On the other, Democrats argue that the U.S. postal system is being deliberately degraded to make it less likely that mailed ballots will be counted in time. Both political scientists who work on voting, and information security specialists, who think systematically about the failure modes, attack surfaces, and threat models of large information systems, can help us understand—and mitigate—the likely failures of large-scale voting systems operating under unexpected circumstances in a context of increased fear over manipulation.

teaser image

Video - Center for Strategic & International Studies

"Star Wars" and Cyber: Can history help us build today's defenses?

| Mar. 23, 2018

Building effective cyber defenses is a major challenge for defense planners, just as missile defense has been since the original Strategic Defense Initiative. In both realms the offense has the advantage, making effective defense difficult. Missile defense, however, now has several decades of experience producing and fielding new technologies. The Project on Military and Diplomatic History hosted a panel discussion of CSIS experts and Michael Sulmeyer of the Belfer Center on the history of missile defense, its experience in developing new technologies, and what these tell us about the prospects for building effective cyber defenses.

teaser image

Video

Hearing: Department of Defense’s role in Protecting Democratic Elections

| Feb. 13, 2018

Election Security The Senate Armed Services Subcommittee on Cybersecurity held a hearing on the Defense Department’s role in ensuring the U.S. election process is secure from foreign influence. Much of the discussion focused on Russian meddling, which took place in the 2016 presidential election and was expected to continue in future U.S. elections as well as those around the world. Committee members and witnesses agreed that the issue would continue to get worse and that there must be a solution that includes both the government and the private sector, while understanding that each has different interests in terms of national security and profit, respectively. 

News - Cyber Security Project, Belfer Center

CYBERSEC 2016: Interview with Melissa Hathaway

| October 19, 2016

Melissa Hathaway participated in the European Security Forum's Cyber Security Conference 2016 in Krakow Poland. This conference is one of just a few regular public policy conferences devoted to the strategic issues of cyberspace and cybersecurity in Europe. She presented key elements of the Cyber Readiness Index 2.0 and discussed areas for better private-public cooperation.

Peiter Zatko (aka Mudge), Robert M. Lee, and Michael Sulmeyer of Harvard University's Belfer Center's Cyber Security Project an event at Harvard to discuss the recent cyberattack on Ukraine's power grid.

Melanie Stetson Freeman/CS Monitor

News - Belfer Center for Science and International Affairs, Harvard Kennedy School

Cyber Operations Against Ukraine's Grid

Feb. 04, 2016

Director Michael Sulmeyer of the Cyber Security Project at the Belfer Center for Science and International Affairs welcomed industry experts Robert Lee, CEO of Dragos Security and former U.S. Air Force Cyber Warfare Operations Officer, and Mudge, founder of the Cyber Independent Testing Laboratory, with previous experience as a DoD official for DARPA and Deputy Director of Google’s Advanced Technology and Projects Division, to get to ground truth on this attack and its implications.

Presentation

Cyber Security Today: A United States Perspective

| September 19, 2012

Implementing complementary government and private sector cyber protection policies remains a challenge. In a recent International Relations and Security Network/Center for Security Studies–sponsored presentation, Explorations in Cyber International Relations Senior Advisor Melissa Hathaway identified five major reasons why governments and their partners are still having trouble developing effective cyber security strategies.

July 31, 2006: Joseph Kony, leader of the Lord's Resistance Army, near the Sudan border. On Apr. 5, 2012, Invisible Children, the California group that produced the video that went viral, posted a sequel on the Internet, Kony2012 Part II.

AP Photo

Analysis & Opinions - Harvard Business Review

Viral By Design: Teams in the Networked World

| April 2, 2012

"The recent Kony2012 viral video offers proof that something special is happening as a result of all this connectedness: digital collaboration has come of age. Garnering 100 million YouTube views in six days — the fastest ever to reach that mark — Kony2012 demonstrated that digital collaboration can create astounding effects not possible just five years ago. Achieving those effects is no accident. While much is made of "emergent collaboration," Kony2012 went viral by design. The Invisible Children, Inc. team that masterminded the campaign comprised veteran media activists and fundraisers pursuing a common enough goal (a criminal's arrest), but using skills and means unique to the digital age...."