Science & Technology

164 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

teaser image

Analysis & Opinions - Belfer Center for Science and International Affairs, Harvard Kennedy School

Center Experts Reflect on 75th Anniversary of Hiroshima Bombing

On August 6, 1945, the United States dropped an atomic bomb on Hiroshima, Japan, launching the nuclear age. On the 75th anniversary of that somber event, Belfer Center experts reflect on the event and its aftermath. 

Chernobyl welcome sign

Wikimedia CC/Jorge Franganillo

Journal Article - Futures

Accumulating Evidence Using Crowdsourcing and Machine Learning: A Living Bibliography about Existential Risk and Global Catastrophic Risk

    Authors:
  • Gorm E. Shackelford
  • Luke Kemp
  • Catherine Rhodes
  • Lalitha Sundaram
  • Seán S. ÓhÉigeartaigh
  • Simon Beard
  • Haydn Belfield
  • Shahar Avin
  • Dag Sørebø
  • Elliot M. Jones
  • John B. Hume
  • David Price
  • David Pyle
  • Daniel Hurt
  • Theodore Stone
  • Harry Watkins
  • Lydia Collas
  • Bryony C. Cade
  • Thomas Frederick Johnson
  • Zachary Freitas-Groff
  • David Denkenberger
  • Michael Levot
  • William J. Sutherland
| February 2020

The study of existential risk — the risk of human extinction or the collapse of human civilization — has only recently emerged as an integrated field of research, and yet an overwhelming volume of relevant research has already been published. To provide an evidence base for policy and risk analysis, this research should be systematically reviewed. In a systematic review, one of many time-consuming tasks is to read the titles and abstracts of research publications, to see if they meet the inclusion criteria. The authors show how this task can be shared between multiple people (using crowdsourcing) and partially automated (using machine learning), as methods of handling an overwhelming volume of research.

Security specialist Erik Dickmeyer works at a computer station with a cyber threat map displayed on a wall in front of him

AP Photo/John Minchillo

Analysis & Opinions - Project Syndicate

Can Cyberwarfare Be Regulated?

| Oct. 02, 2019

Joseph Nye writes that In the cyber realm, the same program can be used for legitimate or malicious purposes, depending on the user’s intent. But if that makes traditional arms-control treaties impossible to verify, it may still be possible to set limits on certain types of civilian targets and negotiate rough rules of the road that limit conflict.

Dave Johnson coal-fired power plant is silhouetted against the morning sun

AP/J. David Ake

Magazine Article - Fair Observer

Sacrificing Nature Is Not an Option

    Author:
  • Kourosh Ziabari
| Feb. 27, 2019

In this edition of "The Interview," Fair Observer talks to Professor John Holdren, former science adviser to President Barack Obama and director of the White House Office of Science and Technology Policy from 2009 to 2017 about the impacts of global warming on the United States and the government's strategies to combat climate change.

Journal Article - Quarterly Journal: International Security

Correspondence: New Era or New Error? Technology and the Future of Deterrence

    Authors:
  • Ryan Snyder
  • Benoît Pelopidas
  • Keir A. Lieber
  • Daryl Press
| Winter 2018/19

Ryan Snyder and Benoît Pelopidas respond to Keir A. Lieber and Daryl G. Press's spring 2017 article, “The New Era of Counterforce: Technological Change and the Future of Nuclear Deterrence.”

Image of China’s People’s Liberation Army Rocket Force drill with a ballistic missile launcher

(China Military / 81.cn)

Policy Brief - Quarterly Journal: International Security

Inadvertent Escalation and the Entanglement of Nuclear Command-and-Control Capabilities

    Author:
  • James Acton
| Oct. 29, 2018

The risks of nuclear escalation between the U.S. and China or Russia are greater than ever given the possibility of misinterpreted cyber espionage and military strikes against early warning systems. What can be done to reduce this risk?

Journal Article - Bulletin of the Atomic Scientists

New Ways to Detect Nuclear Misbehavior

| Jan. 08, 2018

If we had the technology to detect nuclear materials remotely it could help deter smuggling and make it easier to monitor international nuclear agreements. Several recent breakthroughs, if followed up with continued research and funding, could deliver on this promise. They include technological advances in x-ray and neutron radiography; a method that measures how plasma breaks down when exposed to a radioactive source; and developments in antineutrino detection. While all require more development and testing, they are important steps as the global need for ways to detect nuclear materials grows.