Science & Technology

262 Items

Image of Vladimir Putin standing in front of a podium

AP Photo

President Joe Biden delivers remarks about government regulations on artificial intelligence systems during an event in the East Room of the White House, Monday, Oct. 30, 2023, in Washington.

(AP Photo/Evan Vucci)

Policy Brief

Action on AI: Unpacking the Executive Order’s Security Implications and the Road Ahead

| Nov. 08, 2023

On October 30, 2023, President Biden issued the Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence, aimed at realizing the benefits of AI, while mitigating critical risks. This article provides an overview of its key national security initiatives and explores issues relevant to implementation.

Earth represented by binary code and lines

Getty Images

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Reach, Choice, and Transparency: Governing the Internet in the 21st Century

| May 2023

As inventions go, the Internet stacks up with the best of them: the lightbulb, the automobile, even fire. In its first thirty years, the Internet’s worldwide adoption and breadth of application has exceeded any other technological advance in history. It expands our reach by bringing people, experiences, and things to us with the click of a mouse. It connects us to an increasing number of gadgets, from smartphones to voice kiosks and soon self-driving vehicles that will no doubt converse with us while we commute, happily oblivious to the traffic around us. We revel in our newfound agility and versatility. Importantly, our precious network kept us sane during a worldwide pandemic and enabled the world to work remotely while most of its population was frozen at home. For resilience against catastrophes alone, the Internet has become indispensable.

A security guard stands near a sculpture of the Chinese Communist Party flag at the Museum of the Communist Party of China on May 26, 2022, in Beijing.

AP Photo/Ng Han Guan

Journal Article - Quarterly Journal: International Security

Strategic Substitution: China’s Search for Coercive Leverage in the Information Age

    Author:
  • Fiona Cunningham
| Summer 2022

After the mistaken U.S. bombing of the Chinese Embassy in Belgrade in 1999, China turned to information-age weapons to create a risk of escalation to nuclear war with the United States. This shift helps compensate for its conventional military inferiority.

A boy plays with his toy soldiers inside a school that is being used as a shelter for people who fled the war, in Dnipro city, Ukraine, on Tuesday, April 12, 2022.

AP Photo/Petros Giannakouris

Analysis & Opinions - Offensive Cyber Working Group

Subversion over Offense: Why the Practice of Cyber Conflict Looks Nothing Like Its Theory and What This Means for Strategy and Scholarship

    Author:
  • Lennart Maschmeyer
| Jan. 19, 2022

Cyber attacks are both exciting and terrifying, but the ongoing obsession with ‘cyber warfare’ clouds analysis and hampers strategy development. Much commentary and analysis of cyber conflict continues to use the language of war, where actors use ‘offensive cyber operations’ to meet adversaries in ‘engagements’ striving for victory on the ‘battlefield’ in the ‘cyber domain’. This discourse persists despite a growing consensus that cyber operations are primarily relevant in conflict short of war.

Les Droits de l’Homme, 1947 - a surrealist painting showing an anthropomorphic chess piece standing on a bridge next to a flaming tuba.

Rene Magritte

Report

Whose Streets? Our Streets! (Tech Edition)

    Author:
  • Rebecca Williams
| August 2021

This report is an urgent warning of where we are headed if we maintain our current trajectory of augmenting our public space with trackers of all kinds. In this report, I outline how current “smart city” technologies can watch you. I argue that all “smart city” technology trends toward corporate and state surveillance and that if we don’t stop and blunt these trends now that totalitarianism, panopticonism, discrimination, privatization, and solutionism will challenge our democratic possibilities. This report examines these harms through cautionary trends supported by examples from this last year and provides 10 calls to action for advocates, legislatures, and technology companies to prevent these harms. If we act now, we can ensure the technology in our public spaces protect and promote democracy and that we do not continue down this path of an elite few tracking the many. 

A miniature of “The War Room” as depicted in the 1964 classic film Dr. Strangelove

Courtesy Eric Chan  and the Los Angeles County Museum of Art, CC-BY 2.0

Paper

Toward a Collaborative Cyber Defense and Enhanced Threat Intelligence Structure

| August 2021

National security structures envisioned in the 20th century are inadequate for the cyber threats that America faces in the 21st century. These structures, created to address strategic, external threats on one end, and homeland security emergencies on the other, cannot protect us from ambient cyber conflict, because they were designed for different times and threats. Our nation—comprising the federal government, private sector companies, critical infrastructure operators, state and local governments, nonprofits and universities, and even private citizens—are constantly under attack by a myriad of cyber actors with ever-increasing capabilities. 

teaser image

Announcement - Belfer Center for Science and International Affairs, Harvard Kennedy School

Chris Krebs Named Senior Fellow at Harvard Kennedy School's Belfer Center

| July 29, 2021

Christopher (Chris) Krebs, former Director of the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), has been named a non-resident Senior Fellow with the Homeland Security Project and the Cyber Project at Harvard Kennedy School’s Belfer Center for Science and International Affairs.

Paper

US-Russian Contention in Cyberspace

| June 2021

The overarching question imparting urgency to this exploration is: Can U.S.-Russian contention in cyberspace cause the two nuclear superpowers to stumble into war? In considering this question we were constantly reminded of recent comments by a prominent U.S. arms control expert: At least as dangerous as the risk of an actual cyberattack, he observed, is cyber operations’ “blurring of the line between peace and war.” Or, as Nye wrote, “in the cyber realm, the difference between a weapon and a non-weapon may come down to a single line of code, or simply the intent of a computer program’s user.”