Science & Technology

1106 Items

Vice President Mike Pence, left, and White House Chief of Staff Reince Priebus, right, watch as President Donald Trump shows off an executive order

AP/Evan Vucci, File

Analysis & Opinions - Foreign Policy

5 Very Important Things About the World Nobody Knows

| Apr. 02, 2019

Stephen Walt writes that the future will be determined by a handful of big questions: What is China's future trajectory; How good are America's cybercapabilities; What's going to happen to the EU; How many states will go nuclear in the next 20 years; and Who will win the debate on U.S. grand strategy?

A global ransomware attack, as shown from the perspective of a computer user in Beijing, May 13, 2017.

Mark Schiefelbein (AP)

Analysis & Opinions - The Washington Post

The Mueller Report Won't Fix the Problem Underlying It All

| Mar. 21, 2019

The Mueller report will have fiery consequences—of that, one can be sure. But it won't solve the larger cybersecurity dilemmas facing the American public, David Ignatius warns. And although the military recently began launching counteroffensives against cyber attacks, more steps are urgently needed from other sectors of American society.

Book Chapter - Oxford University Press

Israel's National Security Policy

| 2019

This article presents both the fundamental changes that have taken place in Israel's strategic environment, from conventional, state-based threats to primarily asymmetrical ones, and the responses it has developed to date. It also addresses Israel's relations with the United States and other primary international actors, as well as Israel's nuclear and regional arms control policy.

business center building in St. Petersburg, Russia

AP/Dmitri Lovetsky

Analysis & Opinions - Project Syndicate

Rules of the Cyber Road for America and Russia

| Mar. 05, 2019

Joseph Nye says in the cyber realm, the difference between a weapon and a non-weapon may come down to a single line of code, or simply the intent of a computer program's user. While this makes negotiating cyber arms-control treaties problematic, it does not make diplomacy impossible.

Deputy Secretary General Alexander Vershbow and the 28 Permanent Representatives to the North Atlantic Council visit NATO’s cyber defence centre at Supreme Headquarters Allied Powers Europe in Mons, Belgium on Friday, 23 January 2015.

NATO

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

National Counter-Information Operations Strategy

    Authors:
  • Gabriel Cederberg
  • Jordan D'Amato
  • Simon Jones
  • Kunal Kothari
  • Aleksandra Milcheva
  • Irene Solaiman
| February 2019

While nation-state competitors have employed propaganda and information operations (IO) targeting the United States for decades, in recent years their efforts have changed dramatically. The rise of the Internet and social media as mechanisms for disseminating news has made our country both more globally interconnected and simultaneously more vulnerable to foreign efforts to destabilize our democracy. There is now clear evidence that Russia used influence operations designed to undermine U.S. democracy and citizens’ trust in its integrity in both the 2016 and 2018 election cycles. Adversaries are actively using information as a weapon to attack the United States, our political system, and citizens’ trust in it.

Audio - Belfer Center for Science and International Affairs, Harvard Kennedy School

Bruce Schneier on Office Hours Podcast

| Feb. 11, 2019

Cybersecurity expert Bruce Schneier, author of the “Schneier on Security” blog and a Research Fellow with the Belfer Center’s Cyber Security Project, sits down with with Aroop Mukharji to talk about cybersecurity and tech, his book "Click Here to Kill Everybody," and the hacker mentality.