International Security & Defense

79 Items

Security specialist Erik Dickmeyer works at a computer station with a cyber threat map displayed on a wall in front of him

AP Photo/John Minchillo

Analysis & Opinions - Project Syndicate

Can Cyberwarfare Be Regulated?

| Oct. 02, 2019

Joseph Nye writes that In the cyber realm, the same program can be used for legitimate or malicious purposes, depending on the user’s intent. But if that makes traditional arms-control treaties impossible to verify, it may still be possible to set limits on certain types of civilian targets and negotiate rough rules of the road that limit conflict.

teaser image

Testimony - Belfer Center for Science and International Affairs, Harvard Kennedy School

Debora Plunkett Testimony to House Judiciary Committee Hearing "Securing America's Elections"

| Sep. 27, 2019

Debora A. Plunkett, Senior Fellow with the Defending Digital Democracy Project, testified before the House Judiciary Committee during a hearing Friday, September 27, 2019, titled "Securing America's Elections." Links are included to a video of the hearing and a PDF of Plunkett's testimony. 

a guide is silhouetted in an exhibition promoting Huawei's 5G technologies

AP/Ng Han Guan

Analysis & Opinions - The New York Times

Every Part of the Supply Chain Can Be Attacked

| Sep. 25, 2019

Bruce Schneier writes that when it comes to 5G technology, a trustworthy system needs to be built out of untrustworthy parts.  It is not even really known how to build secure systems out of secure parts, let alone out of parts and processes that aren't trustworthy and that are almost certainly being subverted by governments and criminals around the world.

new MBTA Orange Line car produced by CRRC

Wikimedia CC/Edward Order

Analysis & Opinions - CNN

The Real Threat from China Isn't 'Spy Trains'

| Sep. 21, 2019

Bruce Schneier  explains that there is no escaping the technology of inevitable surveillance. Consumers have little choice but to rely on the companies that build their computers and write their software, whether in  smartphones,  5G wireless infrastructure, or subway cars.  China is more likely to try to get data from the U.S. communications infrastructure like the United States does rather than try to produce a subway car outfitted with surveillance apparatus.

teaser image

Announcement - Belfer Center for Science and International Affairs, Harvard Kennedy School

Julia Voo Named Research Director for Belfer Center’s China Cyber Policy Initiative

| Sep. 17, 2019

Harvard Kennedy School’s Belfer Center for Science and International Affairs has named Julia Voo Research Director for the Belfer Center’s new China Cyber Policy Initiative. Within the Initiative, Voo will lead the Center's U.S.-China: Controlling Confrontation in Cyberspace project, a Track 2 dialogue with the China Institute for International Strategic Studies - a joint collaboration to facilitate discussion and develop policy recommendations for both the U.S. and China on the risks of cyber conflict.

 

 

teaser image

Press Release - Belfer Center for Science and International Affairs, Harvard Kennedy School

Harvard Kennedy School’s Belfer Center Names Directors for Cyber Projects

The Belfer Center for Science and International Affairs at Harvard Kennedy School has named Lauren Zabierek, Maria Barsallo Lynch, and Julia Voo to head three of the Center’s growing cyber-related projects. They will run the Center’s Cyber Project, Defending Digital Democracy Project, and China Cyber Policy Initiative, respectively.

 

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Attacking Artificial Intelligence: AI’s Security Vulnerability and What Policymakers Can Do About It

| August 2019

The terrorist of the 21st century will not necessarily need bombs, uranium, or biological weapons. He will need only electrical tape and a good pair of walking shoes. Placing a few small pieces of tape inconspicuously on a stop sign at an intersection, he can magically transform the stop sign into a green light in the eyes of a self-driving car. Done at one sleepy intersection, this would cause an accident. Done at the largest intersections in leading metropolitan areas, it would bring the transportation system to its knees. It’s hard to argue with that type of return on a $1.50 investment in tape.

Solider stand on shore with naval ship in the distance

(AP Photo/Bullit Marquez)

Journal Article - Quarterly Journal: International Security

Cautious Bully: Reputation, Resolve, and Beijing's Use of Coercion in the South China Sea

| Summer 2019

Contrary to the conventional wisdom, China is a cautious bully that seeks to balance between the need to establish resolve and the economic cost of coercion, seen through its territorial disputes in the South China Sea.