Science & Technology

29 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

Chernobyl welcome sign

Wikimedia CC/Jorge Franganillo

Journal Article - Futures

Accumulating Evidence Using Crowdsourcing and Machine Learning: A Living Bibliography about Existential Risk and Global Catastrophic Risk

    Authors:
  • Gorm E. Shackelford
  • Luke Kemp
  • Catherine Rhodes
  • Lalitha Sundaram
  • Seán S. ÓhÉigeartaigh
  • Simon Beard
  • Haydn Belfield
  • Shahar Avin
  • Dag Sørebø
  • Elliot M. Jones
  • John B. Hume
  • David Price
  • David Pyle
  • Daniel Hurt
  • Theodore Stone
  • Harry Watkins
  • Lydia Collas
  • Bryony C. Cade
  • Thomas Frederick Johnson
  • Zachary Freitas-Groff
  • David Denkenberger
  • Michael Levot
  • William J. Sutherland
| February 2020

The study of existential risk — the risk of human extinction or the collapse of human civilization — has only recently emerged as an integrated field of research, and yet an overwhelming volume of relevant research has already been published. To provide an evidence base for policy and risk analysis, this research should be systematically reviewed. In a systematic review, one of many time-consuming tasks is to read the titles and abstracts of research publications, to see if they meet the inclusion criteria. The authors show how this task can be shared between multiple people (using crowdsourcing) and partially automated (using machine learning), as methods of handling an overwhelming volume of research.

Security specialist Erik Dickmeyer works at a computer station with a cyber threat map displayed on a wall in front of him

AP Photo/John Minchillo

Analysis & Opinions - Project Syndicate

Can Cyberwarfare Be Regulated?

| Oct. 02, 2019

Joseph Nye writes that In the cyber realm, the same program can be used for legitimate or malicious purposes, depending on the user’s intent. But if that makes traditional arms-control treaties impossible to verify, it may still be possible to set limits on certain types of civilian targets and negotiate rough rules of the road that limit conflict.

Analysis & Opinions - European Leadership Network

On the Road to Nowhere? New Proposals on the Middle East WMD-Free Zone May Backfire

| May 11, 2015

"One of the dramas playing out this month in New York at the 2015 Review Conference for parties to the Treaty on the Non-proliferation of Nuclear Weapons (NPT) concerns the future of discussions on establishing the weapons of mass destruction free zone in the Middle East..."

Analysis & Opinions - Iran Matters

Current State of Global Sanctions Against Iran

| Mar. 23, 2015

In this op-ed for Iran Matters, Aaron Arnold provides a crucial update on the status of the economic sanctions placed on Iran. He argues that in the short term, a lack of sanctions relief will continue to damage the Iranian economy and undercut efforts by the Rouhani Administration to revitalize growth. However, he points out that new developments in the global economy, such as the creation of an alternative to the SWIFT financial messaging system pushed by Russia and China, will possibly degrade the effectiveness of sanctions in the long run.

UMass Amherst campus

UMass Amherst

Analysis & Opinions - Belfer Center for Science and International Affairs, Harvard Kennedy School

Don't Ban Students Based on Nationality: What Can We Learn from Europe?

| March 2, 2015

The decision of the University of Massachusetts Amherst to categorically ban Iranians was not only gross discrimination, but also a violation of academic freedom. A similar policy was adopted in the Netherlands a few years ago and later rebuked by the Dutch Supreme Court. Universities must remain open to people from all races, religions, and nationalities.

Analysis & Opinions - Managing the Atom Project, Belfer Center

Imagining a Post-Sanctions Iran

| October 8, 2014

Financial sanctions against Iran are contributing to the growth of regional criminal networks, which use fraud, bribery, and corruption to facilitate commerce. From airplane parts and medical equipment, to specialized materials for weapons programs, an intricate underground economy of financial and logistic intermediaries play a critical role in helping Iran circumvent Western sanctions. Do not expect this to change in a post-sanctions world...

Analysis & Opinions - Georgetown Journal of International Affairs

Not So Fast: Pyongyang's Nuclear Weapons Ambitions

| February 20, 2013

"While concern for North Korea's push to become a relevant nuclear power is warranted, it is equally important to recognize the very serious technical issues that have plagued Pyongyang's efforts to date. Building a nuclear weapon and its delivery system, and then keeping them operational for the long term is hard—even harder for those states attempting to do it under the umbrella of international sanctions and monitoring."

Various images shown on screens at the General Satellite Control and Command Center show the launch of North Korea's Unha-3 rocket, Dec. 12, 2012, in Pyongyang, North Korea.

AP Photo

Policy Brief - National Bureau of Asian Research

The Leap in North Korea's Ballistic Missile Program: The Iran Factor

| December 2012

John S. Park, Stanton Nuclear Security Junior Faculty Fellow at the Massachusetts Institute of Technology and Project on Managing the Atom Associate, argues that cooperation between North Korea and Iran has been a critical—yet underexamined—enabler of North Korea's recent success. He concludes that the time has come for the United States to view the two previously independent missile programs as two sides of the same coin and recommends strategies for disrupting the procurement channels between Iran and North Korea.