Articles

80 Items

teaser image

Magazine Article - Economist

Digital Dominance: A new global ranking of cyber-power throws up some surprises

China has the world’s largest army. Russia wields the most tanks. America owns the fanciest satellites. But who has the most cyber-power? A new National Cyber Power Index by the Belfer Centre at Harvard University ranks 30 countries on their level of ambition and capability. Offensive cyber-power—the ability to do harm in or through computer networks—is one measure. But so too are the strength of a country’s defences, the sophistication of its cyber-security industry and its ability to spread and counter propaganda.

teaser image

Newspaper Article

Chinese cyber power is neck-and-neck with US, Harvard research finds

| Sep. 08, 2020

As conventional wisdom goes, experts tend to rank the U.S ahead of China, U.K.IranNorth KoreaRussia, in terms of how strong it is when it comes to cyberspace. But a new study from Harvard University’s Belfer Center shows that China has closed the gap on the U.S. in three key categories: surveillance, cyber defense, and its efforts to build up its commercial cyber sector.

“A lot of people, Americans in particular, will think that the U.S., the U.K., France, Israel are more advanced than China when it comes to cyber power,” Eric Rosenbach, the Co-Director of Harvard’s Belfer Center, told CyberScoop. “Our study shows it’s just not the case and that China is very sophisticated and almost at a peer level with the U.S.”

Iran Syria missiles

Associated Press

Journal Article - International Affairs

Iran's Syria Strategy: The Evolution of Deterrence

| Feb. 04, 2019

Iran has been a critical player in the Syrian war since 2011, crafting a complex foreign policy and military strategy to preserve its Syrian ally. What have been the drivers of Iranian decision-making in this conflict? And how has Iranian strategy evolved over the course of the war? This article argues that the logic of deterrence has been fundamental not just for shaping the contours of Iran–Syria relations since the Islamic Revolution of 1979, but also for determining the overall trajectory of Iranian strategy in the Syrian war. The authors outline Iran's decision-making calculus and divide the country's strategy on Syria after the Arab Spring into four primary phases: 1) a ‘Basij’ strategy to establish local militias in Syria; 2) a regionalization strategy to incorporate transnational fighters and militias in the war effort; 3) an internationalization strategy to incorporate Russia and balance the United States; and 4) a post-ISIS deterrence strategy to balance against the United States, Turkey and Israel. Iran's Syria strategy progressively escalated in response to the possible defeat of its ally and the deterioration of its forward deterrence capacities against the United States and Israel. Today, the potential for direct inter-state conflict is rising as proxy warfare declines and Iran attempts to maintain the credibility of its forward deterrence.

Russian President Vladimir Putin speaks during his annual news conference in Moscow

AP/Alexander Zemlianichenko

Journal Article - Bulletin of the Atomic Scientists

How the Next Nuclear Arms Race Will Be Different from the Last One

| 2019

All the world's nuclear-armed states (except for North Korea) have begun modernizing and upgrading their arsenals, leading many observers to predict that the world is entering a new nuclear arms race. While that outcome is not yet inevitable, it is likely, and if it happens, the new nuclear arms race will be different and more dangerous than the one we remember. More nuclear-armed countries in total, and three competing great powers rather than two, will make the competition more complex. Meanwhile, new non-nuclear weapon technologies — such as ballistic missile defense, anti-satellite weapons, and precision-strike missile technology — will make nuclear deterrence relationships that were once somewhat stable less so.

Great Decisions Cover

Foreign Policy Association

Journal Article - Foreign Policy Association

The State of the State Department and American Diplomacy

| Jan. 03, 2019

During the Trump administration, the usual ways of conducting diplomacy have been upended. Many positions in the State Department have never been filled, and meetings with foreign leaders such as Kim Jong-un and Vladimir Putin have been undertaken with little advance planning. What effect are these changes having now, and how will they affect ongoing relationships between the United States and its allies and adversaries?

A worker is silhouetted against a computer display showing a live visualization of the online phishing and fraudulent phone calls across China during the 4th China Internet Security Conference in Beijing. Aug. 16, 2016 (Ng Han Guan/Associated Press, File). Keywords: China, cyberattack

Ng Han Guan/Associated Press, File

Newspaper Article - The Wall Street Journal

Review: An Uneasy Unpeace

| Jan. 21, 2018

In the cyber arena, the same technologies that are creating unprecedented benefits for billions are also democratizing destruction. Graham Allison reviews ‘The Virtual Weapon and International Order’ by Lucas Kello.

teaser image

Journal Article - Journal of Conflict Resolution

Invisible Digital Front

| Nov. 10, 2017

Recent years have seen growing concern over the use of cyber attacks in wartime, but little evidence that these new tools of coercion can change battlefield events. We present the first quantitative analysis of the relationship between cyber activities and physical violence during war. Using new event data from the armed conflict in Ukraine—and additional data from Syria’s civil war—we analyze the dynamics of cyber attacks and find that such activities have had little or no impact on fighting.

tenth grader attending a class how to investigate a computer network that has been hacked in Beit Shemesh, Israel.

AP

Journal Article - Cyber, Intelligence, and Security

Four Big "Ds" and a Little "r": A New Model for Cyber Defense

| June 2017

This article argues that cyberthreats are not fundamentally different from other asymmetric threats, and it provides a conceptual model for developing a response by drawing on classic principles of military strategy, the "four Ds"— Detection, Deterrence, Defense, and Defeat—as well as resilience (the little "r"). The authors offer a model for how countries can create policies addressing each of these principles that will enhance the security of national cyber systems.