Science & Technology

401 Items

A global ransomware attack, as shown from the perspective of a computer user in Beijing, May 13, 2017.

Mark Schiefelbein (AP)

Analysis & Opinions - The Washington Post

The Mueller Report Won't Fix the Problem Underlying It All

| Mar. 21, 2019

The Mueller report will have fiery consequences—of that, one can be sure. But it won't solve the larger cybersecurity dilemmas facing the American public, David Ignatius warns. And although the military recently began launching counteroffensives against cyber attacks, more steps are urgently needed from other sectors of American society.

Book Chapter - Oxford University Press

Israel's National Security Policy

| 2019

This article presents both the fundamental changes that have taken place in Israel's strategic environment, from conventional, state-based threats to primarily asymmetrical ones, and the responses it has developed to date. It also addresses Israel's relations with the United States and other primary international actors, as well as Israel's nuclear and regional arms control policy.

business center building in St. Petersburg, Russia

AP/Dmitri Lovetsky

Analysis & Opinions - Project Syndicate

Rules of the Cyber Road for America and Russia

| Mar. 05, 2019

Joseph Nye says in the cyber realm, the difference between a weapon and a non-weapon may come down to a single line of code, or simply the intent of a computer program's user. While this makes negotiating cyber arms-control treaties problematic, it does not make diplomacy impossible.

Deputy Secretary General Alexander Vershbow and the 28 Permanent Representatives to the North Atlantic Council visit NATO’s cyber defence centre at Supreme Headquarters Allied Powers Europe in Mons, Belgium on Friday, 23 January 2015.

NATO

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

National Counter-Information Operations Strategy

    Authors:
  • Gabriel Cederberg
  • Jordan D'Amato
  • Simon Jones
  • Kunal Kothari
  • Aleksandra Milcheva
  • Irene Solaiman
| February 2019

While nation-state competitors have employed propaganda and information operations (IO) targeting the United States for decades, in recent years their efforts have changed dramatically. The rise of the Internet and social media as mechanisms for disseminating news has made our country both more globally interconnected and simultaneously more vulnerable to foreign efforts to destabilize our democracy. There is now clear evidence that Russia used influence operations designed to undermine U.S. democracy and citizens’ trust in its integrity in both the 2016 and 2018 election cycles. Adversaries are actively using information as a weapon to attack the United States, our political system, and citizens’ trust in it.

Audio - Belfer Center for Science and International Affairs, Harvard Kennedy School

Bruce Schneier on Office Hours Podcast

| Feb. 11, 2019

Cybersecurity expert Bruce Schneier, author of the “Schneier on Security” blog and a Research Fellow with the Belfer Center’s Cyber Security Project, sits down with with Aroop Mukharji to talk about cybersecurity and tech, his book "Click Here to Kill Everybody," and the hacker mentality.

Army Lieutenant General Paul Nakasone waits at the witness table in the U.S. Senate

AP Photo/Cliff Owen

Analysis & Opinions - The Washington Post

The U.S. Military is Quietly Launching Efforts to Deter Russian Meddling

| Feb. 07, 2019

With little public fanfare, U.S. Cyber Command, the military’s new center for combating electronic attacks against the United States, has launched operations to deter and disrupt Russians who have been interfering with the U.S. political system.

The U.S. Capitol is seen at sunrise, in Washington, October 10, 2017

AP Photo/J. Scott Applewhite

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Protecting Democracy in an Era of Cyber Information War

| February 2019

Citizens voluntarily carry Big Brother and his relatives in their pockets. Along with big data and artificial intelligence, technology has made the problem of defending democracy from information warfare far more complicated than foreseen two decades ago. And while rule of law, trust, truth and openness make democracies asymmetrically vulnerable, they are also critical values to defend.  Any policy to defend against cyber information war must start with the Hippocratic oath: first, do no harm.

Paper - Belfer Center for Science and International Affairs, Harvard Kennedy School

Ending the Cybersecurity Arms Race

| February 2018

Network security has always been something of balancing act between maximizing sharing and ease of use, and erecting barriers.

When computer networks first emerged, there were few limitations on what could be transmitted over them. However, after the world’s first major network computer security incident—the Morris Worm of 1988—organizations began to retreat behind network-level firewalls and anti-virus software. Some defenders even tried to completely disconnect their networks from the outside world via “air gaps.”

This paper argues that it is time to move beyond the security paradigm of separating networks, as epitomized by the air gap. Instead, network defenders should embrace an approach which allows sharing and connectedness, anticipates that adversaries will penetrate the network, and is able to detect, and ultimately eject those adversaries before they can do harm.

Photo of Idaho election officials and D3P team members.

Courtesy of D3P

Observing the Midterms to Fortify Election Security

| Fall/Winter 2018-2019

As millions of Americans voted in the midterm elections on November 6, 25 students working with the Center’s Defending Digital Democracy Project (D3P) observed the elections unfolding in five states across the country. The team, comprised of students from Harvard Kennedy School, MIT, and Tufts, spent the last three months learning about election systems and processes in the United States. Armed with information from D3P’s “State and Local Election Playbook” and its Tabletop Exercise (TTX) training for 120 election officials from 38 different states in early 2018, this year’s student team was eager to engage with election officials and continue providing support to the men and women who are at the frontlines of protecting our democracy.