Science & Technology

129 Items

guns and missiles burst forth from a laptop screen

Adobe Stock

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Guns, Incels, and Algorithms: Where We Are on Managing Terrorist and Violent Extremist Content Online

| June 12, 2023

Technology companies and governments have spent the past decade trying to better address the evolving threat of terrorist and violent extremist content online (TVEC). This paper examines how effective these efforts have been, where we are today in managing the problem, and wherein lie gaps for improvement.

A boy plays with his toy soldiers inside a school that is being used as a shelter for people who fled the war, in Dnipro city, Ukraine, on Tuesday, April 12, 2022.

AP Photo/Petros Giannakouris

Analysis & Opinions - Offensive Cyber Working Group

Subversion over Offense: Why the Practice of Cyber Conflict Looks Nothing Like Its Theory and What This Means for Strategy and Scholarship

    Author:
  • Lennart Maschmeyer
| Jan. 19, 2022

Cyber attacks are both exciting and terrifying, but the ongoing obsession with ‘cyber warfare’ clouds analysis and hampers strategy development. Much commentary and analysis of cyber conflict continues to use the language of war, where actors use ‘offensive cyber operations’ to meet adversaries in ‘engagements’ striving for victory on the ‘battlefield’ in the ‘cyber domain’. This discourse persists despite a growing consensus that cyber operations are primarily relevant in conflict short of war.

FORT GORDON NELSON HALL, Augusta, Georgia, June 10, 2014 – The U.S. Army’s ‘Cyber Center of Excellence’, Fort Gordon in Augusta, Georgia, hosted a multi-service ‘NetWar’ to show, and build, cyber Warrior capabilities Tuesday, June 10.

Georgia Army National Guard photo by Staff Sgt. Tracy J. Smith

Journal Article - Quarterly Journal: International Security

The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations

    Author:
  • Lennart Maschmeyer
| Fall 2021

Although cyber conflict has existed for thirty years, the strategic utility of cyber operations remains unclear. The subversive trilemma explains why cyber operations tend to fall short of their promise in both warfare and low-intensity competition.

John Kerry delivers a policy speech

AP/Matt Dunham

Analysis & Opinions - Project Syndicate

America's New Great-Power Strategy

| Aug. 03, 2021

During the Cold War, US grand strategy focused on containing the power of the Soviet Union. China's rise now requires America and its allies to develop a strategy that seeks not total victory over an existential threat, but rather managed competition that allows for both cooperation and rivalry within a rules-based system.

House Speaker Nancy Pelosi of Calif., signs the article of impeachment against President Donald Trump

AP/Alex Brandon

Analysis & Opinions - The Atlantic

How MAGA Extremism Ends

| Jan. 12, 2021

Juliette Kayyem argues that if Trump keeps losing, the risk of future violence will abate. Keeping Trump in office until January 20 won't assuage the supporters who falsely believe that the election was stolen from him, but removing him from office a week early would emphasize that he is losing. Recruitment is easier for a winning team.