Science & Technology

324 Items

Audio - War on the Rocks

War on the Rocks Podcast: The Big Cyber Spectacular

| Feb. 15, 2018

In our latest episode, Usha Sahay and Ryan Evans were joined by Thomas Rid, Michael Sulmeyer, and a mystery guest (ok, ok, it’s Corinna Fehst) to talk about cyber-security, election meddling, reports about U.S. intel agencies buying back pilfered hacking tools, going dark, legislatures as the vulnerable soft cyber underbelly of democracies, and the different threats posed by Russia and China.

Also, “Password1” is not a good password according to our guests. So you should probably change that.

teaser image

Analysis & Opinions - Lawfare

Evaluating the U.K.'s ‘Active Cyber Defence’ Program

| Feb. 14, 2018

In November 2016, the U.K. government launched its Active Cyber Defence (ACD) program with the intention of tackling “in a relatively automated [and transparent] way, a significant proportion of the cyber attacks that hit the U.K.” True to their word, a little over a year on, last week the U.K.’s National Cyber Security Centre (NCSC) published a full and frank account (over 60 pages long) of their progress to date. The report itself is full of technical implementation details. But it’s useful to cut through the specifics to explain exactly what ACD is and highlight its successes—how the program could benefit the United States as well.

Russian President Vladimir Putin attends a meeting with Russian gas monopoly Gazprom head Alexei Miller at the Novo-Ogaryovo residence outside Moscow. February 16, 2018 (Alexei Druzhinin, Sputnik, Kremlin Pool Photo via Associated Press). Keywords: Vladimir Putin

Alexei Druzhinin, Sputnik, Kremlin Pool Photo via Associated Press

Analysis & Opinions - The Washington Post

Four Steps to Fight Foreign Interference in U.S. Elections

| Feb. 14, 2018

Election systems differ from state to state and precinct to precinct, but many still have security vulnerabilities that foreign actors — not just the Russians — can exploit. The U.S. government must act to improve security and assure Americans that their votes count.

Microphones sit on a podium following Vice President Mike Pence’s speech at an event at Dobbins Air Reserve Base in Marietta, Ga., Friday, June 9, 2017.

AP Photo/David Goldman

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

Election Cyber Incident Communications Plan Template

February 2018

This Plan Template document is primarily intended for use by state and local election officials as a basis for developing their own communications response plans, which include best practices for use in an election cyber incident. We are releasing the Plan Template publicly, because election officials are among those best prepared and always looking for industry best practices, as well as practical checklists. This plan will aid in that effort.

A view of the podiums during a news conference in the Rose Garden at the White House, Monday, April 2, 2012. (AP Photo/Charles Dharapak)

AP Photo/Charles Dharapak

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

Election Cyber Incident Communications Coordination Guide

February 2018

This Guide is primarily intended for use by the EI-GCC to coordinate multiple voices (and multiple facts) in an election cyber incident that crosses traditional jurisdictions. We are releasing the Guide publicly, because a range of officials may be interested in learning more about how state and local leaders can, and should, coordinate their communications in the event of this type of cyber incident. We hope this Guide becomes a starting point for the EI-GCC to establish its role as a central communications node in the event of an election cyber incident.

Voting machines in Miami Shores, Fla., Nov. 8, 2016.

AP Photo/Lynne Sladky

Report - Belfer Center for Science and International Affairs, Harvard Kennedy School

The State and Local Election Cybersecurity Playbook

February 2018

This Playbook is intended for leaders at every level who play a role in running elections. While the future threats elections face are multifaceted, one principle stands clear: defending democracy depends on proactive leadership. This Playbook focuses on the U.S. experience, but it is also relevant to election officials around the world facing similar threats. We have designed it to identify risks and offer actionable solutions that will empower state and local election officials to protect democracy from those who seek to do it harm.

teaser image

Video

Hearing: Department of Defense’s role in Protecting Democratic Elections

| Feb. 13, 2018

Election Security The Senate Armed Services Subcommittee on Cybersecurity held a hearing on the Defense Department’s role in ensuring the U.S. election process is secure from foreign influence. Much of the discussion focused on Russian meddling, which took place in the 2016 presidential election and was expected to continue in future U.S. elections as well as those around the world. Committee members and witnesses agreed that the issue would continue to get worse and that there must be a solution that includes both the government and the private sector, while understanding that each has different interests in terms of national security and profit, respectively. 

teaser image

Press Release - Belfer Center for Science and International Affairs, Harvard Kennedy School

Defending Digital Democracy Releases New Playbooks for States to Counter Election Cyberattacks and Information Operations

Feb. 13, 2018

Defending Digital Democracy (D3P), the bipartisan project at Harvard Kennedy School’s Belfer Center for Science and International Affairs, released three new playbooks today in its mission to help campaign and election officials defend themselves against cyberattacks and information operations aimed at undermining trust in the American election system.