Middle East & North Africa

15 Items

teaser image

Magazine Article - Economist

Digital Dominance: A new global ranking of cyber-power throws up some surprises

China has the world’s largest army. Russia wields the most tanks. America owns the fanciest satellites. But who has the most cyber-power? A new National Cyber Power Index by the Belfer Centre at Harvard University ranks 30 countries on their level of ambition and capability. Offensive cyber-power—the ability to do harm in or through computer networks—is one measure. But so too are the strength of a country’s defences, the sophistication of its cyber-security industry and its ability to spread and counter propaganda.

teaser image

Newspaper Article

Chinese cyber power is neck-and-neck with US, Harvard research finds

| Sep. 08, 2020

As conventional wisdom goes, experts tend to rank the U.S ahead of China, U.K.IranNorth KoreaRussia, in terms of how strong it is when it comes to cyberspace. But a new study from Harvard University’s Belfer Center shows that China has closed the gap on the U.S. in three key categories: surveillance, cyber defense, and its efforts to build up its commercial cyber sector.

“A lot of people, Americans in particular, will think that the U.S., the U.K., France, Israel are more advanced than China when it comes to cyber power,” Eric Rosenbach, the Co-Director of Harvard’s Belfer Center, told CyberScoop. “Our study shows it’s just not the case and that China is very sophisticated and almost at a peer level with the U.S.”

teaser image

- Belfer Center for Science and International Affairs, Harvard Kennedy School Belfer Center Newsletter

Newsmakers

Spring 2014

A sampling of Belfer Center affiliates who have been honored or otherwise recently featured recently in the news.

Presentation

Cyber Disorders: Rivalry and Conflict in a Global Information Age

| May 3, 2012

The risks posed by the proliferation of cyber weapons are gaining wide recognition among security planners. Yet the general reaction of scholars of international relations has been to neglect the cyber peril owing to its technical novelties and intricacies. This attitude amounts to either one or both of two claims: the problem is not of sufficient scale to warrant close inspection, or it is not comprehensible to a non-technical observer. This seminar challenged both assertions.

Aug. 23, 2010: Technicians at work in the Bushehr nuclear power plant, Bushehr, Iran. Iran has confirmed that Stuxnet infected several personal laptops of Bushehr employees but that plant systems were unaffected.

AP Photo

Analysis & Opinions - Today's Zaman

Cyber War and Peace

| April 10, 2012

"Cyber war, though only incipient at this stage, is the most dramatic of the potential threats. Major states with elaborate technical and human resources could, in principle, create massive disruption and physical destruction through cyber attacks on military and civilian targets. Responses to cyber war include a form of interstate deterrence through denial and entanglement, offensive capabilities, and designs for rapid network and infrastructure recovery if deterrence fails. At some point, it may be possible to reinforce these steps with certain rudimentary norms and arms control, but the world is at an early stage in this process."

A security guard, right, stands at the entrance of El Al sales offices in Tel Aviv, Israel, Jan. 16, 2012. Hackers disrupted the websites of Israel's stock exchange and El Al in a deepening cyber war launched by a group claiming to be Saudis.

AP Photo

Analysis & Opinions - The Wall Street Journal

Cyber Attacks Can Spark Real Wars

| February 16, 2012

"The recent hacker exchange should also remind us that just as hacking could escalate to the use of conventional force in the Middle East, the reverse is also true. Bombing Iran, for example, could unleash an Iranian government cyber attack. Israelis say they could handle that, despite the recent evidence to the contrary. Unfortunately, much of the critical infrastructure in the U.S. is still not ready for a sophisticated nation-state cyber attack either."

- Belfer Center for Science and International Affairs, Harvard Kennedy School Belfer Center Newsletter

Scholars Weigh Info-Tech Policy Challenges

| Winter 2011-2012

In September, experts from Harvard University, the Massachusetts Institute of Technology, and other Boston-area universities participated in a three day conference convened by the Belfer Center to examine policy choices facing the fast-changing field of information and communications technology.

Norton Cybercrime Index

AP Photo

Paper - Science, Technology, and Public Policy Program, Belfer Center

Taking a Byte Out of Cybercrime

| October 2011

"Cybersecurity is a means to enable social stability and promote digital democracy; a method by which to govern the Internet; and a process by which to secure critical infrastructure from cybercrime, cyberespionage, cyberterrorism and cyberwar. As nations and corporations recognize their dependence on ICT, policymakers must find the proper balance in protecting their investments without strangling future growth."

Discussion Paper - Science, Technology, and Public Policy Program, Belfer Center

WikiLeaks 2010: A Glimpse of the Future?

    Author:
  • Tim Maurer
| August 2011

The recent publications on WikiLeaks reveal a story about money, fame, sex, underground hackers, and betrayal. But it also involves fundamental questions regarding cyber-security and foreign policy. This paper argues WikiLeaks is only the symptom of a new, larger problem which is the result of technological advances that allow a large quantity of data to be 'stolen' at low or no cost by one or more individuals and to be potentially made public and to go 'viral', spreading exponentially online.