Articles

38 Items

Photo of Mark Zuckerberg preparing to resume testimony about user data on Facebook.

(AP Photo/Jacquelyn Martin)

Magazine Article - Belfer Center for Science and International Affairs, Harvard Kennedy School

America Needs to Align Technology with a Public Purpose

| Nov. 25, 2018

The arc of innovative progress has reached an inflection point, writes Ash Carter in The Atlantic. "Recent technological change that has brought immeasurable improvements to billions around the globe now threatens to overwhelm us. Making this disruption positive for all is the chief challenge of our time. We ourselves—not only market forces—should bend the arc of change toward human good. To do so, we must reinvigorate an ethos of public purpose that has become dangerously decoupled from many of today’s leading tech endeavors."

In this Oct. 16, 2016, file photo, a man in Seoul, South Korea watches a TV news program showing an image of a missile launch conducted by North Korea. (AP Photo/Ahn Young-joon, File)

AP Photo/Ahn Young-joon, File

Newspaper Article - The New York Times

Is Nuclear War Inevitable?

| Dec. 28, 2017

Donald Trump and Kim Jong-un trading threats with words like “fire and fury”; Pakistan deploying tactical nuclear weapons to counter Indian conventional threats; Russia enunciating an Orwellian doctrine of “escalate-to-de-escalate” that calls for early use of battlefield nuclear weapons; and major nuclear-weapons states modernizing their arsenals — nukes are back. The cruel irony: This is happening after eight years of a president who won the Nobel Peace Prize largely for his vision of a world free of nuclear weapons.

tenth grader attending a class how to investigate a computer network that has been hacked in Beit Shemesh, Israel.

AP

Journal Article - Cyber, Intelligence, and Security

Four Big "Ds" and a Little "r": A New Model for Cyber Defense

| June 2017

This article argues that cyberthreats are not fundamentally different from other asymmetric threats, and it provides a conceptual model for developing a response by drawing on classic principles of military strategy, the "four Ds"— Detection, Deterrence, Defense, and Defeat—as well as resilience (the little "r"). The authors offer a model for how countries can create policies addressing each of these principles that will enhance the security of national cyber systems.

University of Michigan Journal of Law Reform

University of Michigan Journal of Law Reform

Journal Article - University of Michigan Journal of Law Reform

Making Democracy Harder to Hack

| Spring 2017 (Volume 50, Issue 3)

With the Russian government hack of the Democratic National Convention email servers and related leaks, the drama of the 2016 U.S. presidential race highlights an important point: nefarious hackers do not just pose a risk to vulnerable companies; cyber attacks can potentially impact the trajectory of democracies.

Journal Article - Survival

Cryptography and Sovereignty

    Author:
  • Ben Buchanan
| October-November 2016

Encryption's new normal is changing the way in which states assert their sovereignty at home and abroad. Cryptography has gone mainstream. Now more than ever, encryption is used by ordinary citizens, often without their knowledge, and is a subject of national debate.

Journal Article - Georgetown Journal of International Affairs

Introduction: International Engagement on Cyber V: Securing Critical Infrastructure

| October 2015

In this issue of International Engagement on Cyber, authors discuss developments, challenges, and improvements to critical infrastructure cybersecurity from legal, policy, and technical perspectives. Cyber V also evaluates cybersecurity in Brazil, suggests improved government and private sector cybersecurity practices, and theorizes military actions in the information age.

In this May 19, 2014, file photo, press materials are displayed on a table before a news conference to announce that a U.S. grand jury had charged five Chinese hackers with economic espionage and trade secret theft.

Charles Dharapak/ AP

Journal Article - Quarterly Journal: International Security

The Impact of China on Cybersecurity: Fiction and Friction

    Author:
  • Jon R. Lindsay
| Winter 2014/15

The Chinese cyber threat to the United States has been exaggerated. China's cyber capabilities are outmatched by those of the West, and Beijing reaps too many benefits from the internet's liberal norms to attempt to seriously undermine them.