Articles

37 Items

Newspaper Article - The New York Times

N.S.A. Breached Chinese Servers Seen as Security Threat

| March 22, 2014

American officials have long considered Huawei, the Chinese telecommunications giant, a security threat, blocking it from business deals in the United States for fear that the company would create “back doors” in its equipment that could allow the Chinese military or Beijing-backed hackers to steal corporate and government secrets.

U.S. Sailors assigned to Navy Cyber Defense Operations Command (NCDOC) man their stations at Joint Expeditionary Base Little Creek-Fort Story, Va., Aug. 4, 2010.

U.S. Navy Photo

Journal Article - Quarterly Journal: International Security

The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth

    Author:
  • Erik Gartzke
| Fall 2013

Cyberwar has been described as a revolution in military affairs capable of overturning the prevailing world order. By itself, however, cyberwar can achieve neither conquest nor, in most cases, coercion. Conflict over the internet is much more likely to serve as an adjunct to, rather than a substitute for, existing modes of terrestrial force, and to augment the advantages of status quo powers rather than threatening existing political hierarchies.

March 8, 2012: Norwich University student Adam Marenna, of Belair, Md.  Deep in the bowels of a building on the campus of the nation's oldest private military academy, students from across the globe are being taught to fight the war of the future.

AP Photo/Toby Talbot

Journal Article - Quarterly Journal: International Security

The Meaning of the Cyber Revolution: Perils to Theory and Statecraft

| Fall 2013

While decisionmakers warn about the cyber threat constantly, there is little systematic analysis of the issue from an international security studies perspective. Cyberweapons are expanding the range of possible harm between the concepts of war and peace, and give rise to enormous defense complications and dangers to strategic stability. It is detrimental to the intellectual progress and policy relevance of the security studies field to continue to avoid the cyber revolution's central questions.

Magazine Article - Knowledge for Development

Innovation: Applying Knowledge in Development

| April 10, 2013

In this new lead article, Prof. Calestous Juma, Harvard University and Prof. Yee-Cheong Lee, UNESCO, reflect on the progress made since the UN Millennium Project's Task Force report on science, technology and innovation (ST&I) was published. In 2005, the Task Force released the report Innovation: applying knowledge in development. It outlined a number of ways in which ST&I could be used to realize the UN Millennium Development Goals (MDGs). The authors claim that the report has played a key catalytic role in raising global awareness of the importance of ST&I in development.

The kernels on the left are conventional white maize kernels. The maize kernels on the right are enhanced with a provitamin A trait using biotechnology. This maize would benefit Africa where millions of children suffer from vitamin A deficiency.

AP Photo

Newspaper Article - The East African

Africa Needs to Invest More in 'Life Sciences' to Benefit from Technology

    Author:
  • Steve Mbogo
| August 18, 2012

Africa is yet to adopt full scale technology-led development. Steve Mbogo spoke to the Director of the Belfer Center's Science, Technology, and Globalisation Project and professor at Harvard University Calestous Juma on the opportunities that await the continent as a late comer.

Volkswagens Golf electric cars and Touareg hybrid cars pass by Tiananmen Square in Beijing, China, 6 April 2011. Volkswagen China announced that the first demonstrative electric car motorcade of Volkswagen worldwide will be in Beijing.

AP Photo

Journal Article - Energy Policy

Oil Development in China: Current Status and Future Trends

    Authors:
  • Linwei Ma
  • Zheng Li
  • Pei Liu
| June 2012

This paper attempts to present a full picture of the current status and future trends of China's oil development through system analysis. The authors design three scenarios of China's oil demand in 2030 and analyze policy implications for oil conservation, automotive energy development, and energy security. From their analysis, they draw some conclusions for policy decisions, such as controlling total oil consumption to avoid energy security risks, enhancing oil conservation in all sectors with the emphasis on road transportation, and increasing investment in oil production and refining to secure oil supply and reduce emissions.

In this Sept. 24, 2010, file photo the National Cybersecurity & Communications Integration Center (NCCIC) prepares for the Cyber Storm III exercise at its operations center in Arlington, Va.

AP Photo

Magazine Article - Bulletin of the American Academy of Arts and Sciences

The Future of Power

| Spring 2011

"The conventional wisdom among those who looked at the Middle East used to be that you had a choice either of supporting the autocrat or being stuck with the religious extremists. The extraordinary diffusion of information created in Egypt and other Middle Eastern countries reveals a strong middle that we weren't fully aware of. What is more, new technologies allow this new middle to coordinate in ways unseen before Twitter, Facebook, and so forth, and this could lead to a very different politics of the Middle East. This introduces a new complexity to our government's dealings with the region."