The information assembled here is for any campaign in any party. It was designed to give you simple, actionable information that will make your campaign’s information more secure from adversaries trying to attack your organization—and our democracy
This report recommends policies and actions to improve the return on investment the U.S. government makes in sponsoring research and development (R&D) at the Department of Energy's (DOE) seventeen National Laboratories ("Labs"). While the Labs make a unique and significant contribution to all of the Department of Energy's missions, the authors develop the idea that for the Labs to fully support DOE's energy transformation goals, their R&D management practices need to be updated to better reflect current research into innovation systems and management. They also highlight the necessity of Lab interactions with industry in order to impact the nation's energy infrastructure investment, which is, for the most part, privately held.
Xi is now not only the most powerful leader of China since Mao. He is also the most ambitious leader of any country today. In the past five years, he has proved himself the most effective in advancing his nation’s position in the world. And among all of the competitors on the international stage, he is the most likely to leave a lasting mark on history.
Many observers have called for laws and norms to secure this new environment. But developing such standards in the cyber domain faces a number of difficult hurdles. Although Moore's law about the doubling of computing power every two years means that cyber time moves quickly, human habits, norms, and state practices change more slowly.
The rise of fake news highlights the erosion of long-standing institutional bulwarks against misinformation in the internet age. Concern over the problem is global. However, much remains unknown regarding the vulnerabilities of individuals, institutions, and society to manipulations by malicious actors. A new system of safeguards is needed.
The Cybersecurity Project at the Belfer Center for Science and International Affairs is looking for a junior or mid-career practitioner or academic with a strong background or interest in cybersecurity and the Middle East to address these issues. The topic of cybersecurity should be construed broadly and does not require professional-level technical competency.
The economic opportunities in the North are leading to greater investment in infrastructure. As part of this growth, internet connections are emerging in previously disconnected communities. This connectivity is not equally distributed nor is it a priority for all governments, but as internet connection becomes more and more central to the modern world, indigenous communities will be presented with increasing opportunities to use it for their benefit.
Are we living through the re-mystification of the world?
Much that goes on around us is baffling these days. Financial market movements, for example, seem increasingly mysterious. Why, after close to a decade of sustained recovery from the nadir of early 2009, did global stock markets sell off so sharply this month?
Russia’s cybermeddling in the 2016 U.S. presidential election has been accompanied by what U.S. and European experts describe as a worrisome Kremlin campaign to rewrite the rules for global cyberspace.
Although cyber weapons can usually be employed in a far less lethal manner than guided missiles shot from a drone, they have been deployed less frequently and under rules of engagement that are far less clear, at least to the public.