Indicting Hackers and Known Vulnerabilities
On the Lawfare blog, Cyber Security Project Director Michael Sulmeyer and Research Assistant Kate Miller describe how "...[T]he vast majority of hacks exploit known vulnerabilities."
Read the entire post here>
June 16, 2016
"China has initiated a limited research program on albedo modification. The U.S. has not. Given that albedo modification is the kind of technology that necessitates an open, transparent, and international research effort — precisely the kind of effort in which the U.S. excels — this is a serious failing."
May 24, 2016
"Formulating Expectations for Future Water Availability through Infrastructure Development Decisions in Arid Regions"
In this research paper, the authors propose that future human mediated water availability in arid regions may be assessed by considering key projects that have been identified or proposed by regional experts and organizations. Using Multicriteria Decision Methods as a framework to organize a set of decision criteria and their relative salience, the likelihood of selection (and development) of a project can be determined and used to form expectations of future regional water availability. The authors apply this approach in a case study of Jordan.
December 10, 2015
By Ambuj D. Sagar, Visiting Scholar, Science, Technology, and Public Policy Program
"What's missing from the technology discussions in the climate arena is a focus on a much more important and urgent issue: how to ensure that cleaner energy technologies available today are deployed quickly and at scale in developing countries. Moving their energy systems on a lower-carbon trajectory in the short term is critical because these countries need more energy to fuel their economies and are rapidly growing their energy infrastructure."
November 30, 2015
"Building on CRI 1.0, Cyber Readiness Index 2.0 examines one hundred twenty-five countries that have embraced, or are starting to embrace, ICT and the Internet and then applies an objective methodology to evaluate each country's maturity and commitment to cyber security across seven essential elements."