by David D. Clark and Susan Landau | Mar 16, 2011 | Uncategorized
David D. Clark and Susan Landau consider how cyberexploitations and cyberattacks might be traced by linking people to packets and conclude that such a linkage would be a mistake. They discuss how other technical contributions to cyber attribution can only be contemplated in the larger regulatory context of various legal jurisdictions.
by harvardnsj | Mar 1, 2011 | Uncategorized
A Harvard National Security Journal Symposium on March 4, 2011 (Live webcast)
by Fred D. Taylor, Jr. | Feb 27, 2011 | Uncategorized
Harvard National Security Fellow Fred D. Taylor, Jr. suggests the government take a more active role in promoting quality software design and development.
by Brian Clampitt | Feb 23, 2011 | Uncategorized
By Brian Clampitt —
This year’s budget request included the overall number for intelligence for the first time in over 60 years.
by John Thorlin | Feb 13, 2011 | Uncategorized
By John Thorlin — Should the United States reinstitute the draft? In the Summer 2010 edition of the Yale Journal of International Affairs, Dr. Joseph Vasquez questions the wisdom of using private military contractors (PMCs) and suggests that reinstitution of the...
by Adam Klein and Benjamin Wittes | Jan 18, 2011 | Uncategorized
Adam Klein and Benjamin Wittes show that contrary to civic mythology, the extra-criminal detention of terrorism suspects is not “an extraordinary aberration from a strong American constitutional norm.”