Articles

256 Items

U.S. President Bill Clinton, Israeli Prime Minister Yitzhak Rabin and Palestinian leader Yasser Arafat sign the historic Oslo accord at the White House in September 1993.

Wikicommons/Vince Musi

Magazine Article - Harvard Magazine

The Indispensable Power

| June 16, 2020

When we emerge finally from the grip of the coronavirus, Americans will need to account for a public-health disaster that has killed well over 100,000 people to date and shuttered nearly every institution in our society (including Harvard) for much of the spring and into the summer.

iPad Mini Smart Case

Wikimedia CC/Ashley Pomeroy

Journal Article - Journal of Cybersecurity

Privacy Threats in Intimate Relationships

| 2020

This article provides an overview of intimate threats: a class of privacy threats that can arise within families, romantic partnerships, close friendships, and caregiving relationships. The authors survey a range of intimate relationships and describe their common features. Based on these features, they explore implications for both technical privacy design and policy, and offer design recommendations for ameliorating intimate privacy risks.

teaser image

Magazine Article

Inside China's controversial mission to reinvent the internet

| Mar. 27, 2020

On a cool day late last September, half a dozen Chinese engineers walked into a conference room in the heart of Geneva's UN district with a radical idea. They had one hour to persuade delegates from more than 40 countries of their vision: an alternative form of the internet, to replace the technological architecture that has underpinned the web for half a century. 

Whereas today's internet is owned by everyone and no one, they were in the process of building something very different - a new infrastructure that could put power back in the hands of nation states, instead of individuals.

teaser image

Magazine Article

Jack Ma Offers to Supply the US With Covid-19 Tests and Masks

| Mar. 13, 2020

As the US government promises to ramp up more Covid-19 testing, an unlikely billionaire is offering to lend help: Jack Ma, cofounder of the Chinese tech giant Alibaba. Ma's philanthropic organization, the Jack Ma Foundation, said early Friday morning it would donate 500,000 Covid-19 testing kits and 1 million protective face masks to the US.

In this Nov. 7, 2017, file photo, an unidentified man is silhouetted as he walks in front of Microsoft logo at an event in New Delhi, India. Microsoft says it's committing to giving users worldwide the same data and privacy rights being offered to Europeans under new regulations there. That means no matter where you live, you'll be able to see what Microsoft collects about you and correct or delete that information if necessary.

AP Photo/Altaf Qadri, File

Magazine Article - The News Minute

How Do Science and Policy Intersect? Harvard Professor Explains

    Author:
  • Haripriya Suresh
| Jan. 22, 2020

Sheila Jasanoff, a professor at the Harvard Kennedy School, speaks to TNM about the need for Science and Technology Studies, policy playing catch-up with the progress of science, data collection in democracies and more.

teaser image

Journal Article

Lines, Flows and Transnational Crime: Toward a Revised Approach to Countering the Underworld of Globalization

| Dec. 16, 2019

In this article, we develop a new framework for combating transnational criminal activity. We argue that global illicit flows, perpetrated by organized crime, in the interstices of lawful trade and travel, embody a critical and debilitating non-state security threat in today’s world, one that the Westphalian international system of sovereign states remains ill-equipped to confront. Accordingly, we seek to generate a wider discussion in the field regarding a revised approach to this threat that is situated within a global framework of collaborative law enforcement which incorporates, in appropriate fashion, certain military and counter-terrorist strategies.

The propositions we advance in support of a revised approach to countering transnational crime and its globalized web-enabled criminals include: (a) terrorism is one species of transnational crime; (b) the criminal justice model of arrest, prosecution, conviction and incarceration is a partial and insufficient response to transnational crime; (c) national security and law enforcement functions should be viewed analytically as a “public security” continuum rather than disciplines separated by bright lines; (d) countering transnational criminal organizations effectively may require development of a hybrid law enforcement/military capacity and new strategic and tactical doctrines, including safeguards against abuse, to govern its deployment; (e) joint border management within nations and between them, coordinated with the private sector, is required and inter-agency cooperation and multilateral institutions must be strengthened in accordance with new international norms and (f) North America, a region construed as extending from Colombia to the Arctic and from Bermuda to Hawaii, could develop in the future, together with the European Union, as an initial site for a model pilot of the new approach.

U.S. Capitol building, Washington D.C

Library of Congress/Carol M. Highsmith

Magazine Article - Federal Times

How Technologists in Government Could Shape Better Tech Policy

    Author:
  • Andrew Eversden
| Aug. 09, 2019

In an interview with Federal Times, Bruce Schneier says that both Congress and federal agencies need public interest technologists—people who combine their technological expertise with public policy focus—on staff.