Science & Technology

241 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

FORT GORDON NELSON HALL, Augusta, Georgia, June 10, 2014 – The U.S. Army’s ‘Cyber Center of Excellence’, Fort Gordon in Augusta, Georgia, hosted a multi-service ‘NetWar’ to show, and build, cyber Warrior capabilities Tuesday, June 10.

Georgia Army National Guard photo by Staff Sgt. Tracy J. Smith

Journal Article - Quarterly Journal: International Security

The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations

    Author:
  • Lennart Maschmeyer
| Fall 2021

Although cyber conflict has existed for thirty years, the strategic utility of cyber operations remains unclear. The subversive trilemma explains why cyber operations tend to fall short of their promise in both warfare and low-intensity competition.

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Rational Not Reactive

| October 2021

The increasing tempo of offensive cyber operations by Iran and its adversaries, including the U.S. and Israel, has led many commentators to label them as “tit-for-tat”: a cyclical action-reaction dynamic where each side seeks to respond appropriately to an earlier violation by the other. However, this interpretation has significant theoretical and empirical deficiencies. Why, then, does a tit-for-tat narrative dominate our understanding of Iranian cyber activity, and what are the consequences? This paper explores that question.

Real-time cyber attacks, including information on the attack’s origin, type and target, as well as, the attacker’s IP address, geographic location and ports being utilized, are displayed on the Norse attack map on the 275th Cyberspace Squadron’s operations floor, known as the Hunter’s Den, at Warfield Air National Guard Base, Middle River, Md., June 3, 2017.

Air Force

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

A Next Generation National Information Operations Strategy and Architecture

| Sep. 13, 2021

This research paper conducts a deep dive into sources and includes interviews of senior information operations professionals to broadly identify strategic gaps in capability that continue to plague America’s information operations.

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Cybercrime Hotspots

| Aug. 24, 2021

This report assesses common features of organized cybercrime groups and the socioeconomic conditions that influence cybercrime networks in specific countries. It seeks to provide a preliminary picture of how organized cybercrime groups operate and evolve and the conditions that likely allow them to thrive in particular locations using the case studies of Nigeria, India, and Mexico.

A miniature of “The War Room” as depicted in the 1964 classic film Dr. Strangelove

Courtesy Eric Chan  and the Los Angeles County Museum of Art, CC-BY 2.0

Paper

Toward a Collaborative Cyber Defense and Enhanced Threat Intelligence Structure

| August 2021

National security structures envisioned in the 20th century are inadequate for the cyber threats that America faces in the 21st century. These structures, created to address strategic, external threats on one end, and homeland security emergencies on the other, cannot protect us from ambient cyber conflict, because they were designed for different times and threats. Our nation—comprising the federal government, private sector companies, critical infrastructure operators, state and local governments, nonprofits and universities, and even private citizens—are constantly under attack by a myriad of cyber actors with ever-increasing capabilities. 

teaser image

Announcement - Belfer Center for Science and International Affairs, Harvard Kennedy School

Chris Krebs Named Senior Fellow at Harvard Kennedy School's Belfer Center

| July 29, 2021

Christopher (Chris) Krebs, former Director of the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), has been named a non-resident Senior Fellow with the Homeland Security Project and the Cyber Project at Harvard Kennedy School’s Belfer Center for Science and International Affairs.

Report - Research Institute for Sociotechnical Cyber Security

Remote Working and (In)Security

| June 2021

Remote working during the COVID-19 pandemic has had, and continues to have, a great impact on the workforce. Through interviews with senior cyber security professionals, this research explored how the traditional dynamics between employees and leadership have adapted in such times, responding to a rapidly evolving cyber threat landscape, as well as an unpredictable period for organisations and employees in terms of wellbeing and remote working culture. Focusing on the transition to remote working, cyber security, the psychological contract (relationship between employees and employers) and employee wellbeing, the research highlighted several key themes.

signs on a bank of computers tell visitors that the machines are not working at the public library

AP/Tony Gutierrez, File

Analysis & Opinions - TechStream

Should Ransomware Payments Be Banned?

| July 26, 2021

Tarah Wheeler and Ciaran Martin write that banning ransomware payments may be seen as as unwarranted state interference in private commerce, but they believe that a coordinated country level response would rectify the glaring deficiency in the current reality: the near-total privatization of national security risk.