<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd">
  <channel>
    <atom:link href="https://feeds.simplecast.com/Z7I7LeKR" rel="self" title="MP3 Audio" type="application/atom+xml"/>
    <atom:link href="https://simplecast.superfeedr.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom"/>
    <generator>https://simplecast.com</generator>
    <title>Cyber.RAR</title>
    <description>Cyber.RAR is a podcast series from six Harvard Kennedy School students: Michaela Lee, Bethan Saunders, Winnona DeSombre, Danielle Levin, Sophie Faaborg-Andersen, and Grace Park. 

While each bring a different lens to the show, they all share a common conviction: the field of cybersecurity is rapidly evolving, yet the national security field is falling behind. In this podcast, they uncover why the U.S. government struggles to build basic cyber infrastructure​​, explore how to regulate offensive cyber capabilities, debate the meaning and merits of “hacktivism”, and laugh with each other along the way. Tune in to Cyber.RAR for discussions, debates, and expert interviews on the biggest questions, challenges, and opportunities in cybersecurity.</description>
    <copyright>2022 Belfer Center for Science and International Affairs</copyright>
    <language>en</language>
    <pubDate>Sat, 7 Jan 2023 23:10:00 +0000</pubDate>
    <lastBuildDate>Sat, 7 Jan 2023 23:10:10 +0000</lastBuildDate>
    <image>
      <link>https://cyber-rar.simplecast.com</link>
      <title>Cyber.RAR</title>
      <url>https://image.simplecastcdn.com/images/b7d3b22c-f1c1-4c35-878d-f889c3a1a93d/e2709a7f-dbeb-4649-b7ab-c5b8bfcd89e3/3000x3000/cyber-rar-logo.jpg?aid=rss_feed</url>
    </image>
    <link>https://cyber-rar.simplecast.com</link>
    <itunes:type>episodic</itunes:type>
    <itunes:summary>Cyber.RAR is a podcast series from six Harvard Kennedy School students: Michaela Lee, Bethan Saunders, Winnona DeSombre, Danielle Levin, Sophie Faaborg-Andersen, and Grace Park. 

While each bring a different lens to the show, they all share a common conviction: the field of cybersecurity is rapidly evolving, yet the national security field is falling behind. In this podcast, they uncover why the U.S. government struggles to build basic cyber infrastructure​​, explore how to regulate offensive cyber capabilities, debate the meaning and merits of “hacktivism”, and laugh with each other along the way. Tune in to Cyber.RAR for discussions, debates, and expert interviews on the biggest questions, challenges, and opportunities in cybersecurity.</itunes:summary>
    <itunes:author>Sophie Faaborg-Andersen, Winnona DeSombre, Bethan Saunders, Danielle Levin, Grace Park</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    <itunes:image href="https://image.simplecastcdn.com/images/b7d3b22c-f1c1-4c35-878d-f889c3a1a93d/e2709a7f-dbeb-4649-b7ab-c5b8bfcd89e3/3000x3000/cyber-rar-logo.jpg?aid=rss_feed"/>
    <itunes:new-feed-url>https://feeds.simplecast.com/Z7I7LeKR</itunes:new-feed-url>
    <itunes:keywords>defensive cyber, u.s., hacking, america, offensive cyber, security, cyber, harvard kennedy school, belfer center, cyber warfare, cybersecurity, hack, hacktivism, united states, harvard, hks, industry, usa, infrastructure, national security, students, warfare, tech, technology</itunes:keywords>
    <itunes:owner>
      <itunes:name>Belfer Center for Science and International Affairs</itunes:name>
      <itunes:email>belfercenter@gmail.com</itunes:email>
    </itunes:owner>
    <itunes:category text="Technology"/>
    <itunes:category text="Government"/>
    <item>
      <guid isPermaLink="false">646c8e39-a806-43cc-8f6b-8a3098c6dcdb</guid>
      <title>Looking Back on Jan 6: the Role of Cybersecurity in Preventing and Prosecuting an Insurrection</title>
      <description><![CDATA[<p><a href="https://www.justsecurity.org/81806/january-6-intelligence-and-warning-timeline/">https://www.justsecurity.org/81806/january-6-intelligence-and-warning-timeline/</a></p><p><a href="https://thehill.com/policy/national-security/3686920-secret-service-messages-show-the-knew-crowd-outside-jan-6-rally-was-armed/">https://thehill.com/policy/national-security/3686920-secret-service-messages-show-the-knew-crowd-outside-jan-6-rally-was-armed/</a></p><p><a href="https://zetter.substack.com/p/is-the-secret-services-claim-about">https://zetter.substack.com/p/is-the-secret-services-claim-about</a></p><p>​​<a href="https://www.npr.org/2022/07/15/1111778878/secret-service-deleted-messages-january-6-is-that-data-really-gone">https://www.npr.org/2022/07/15/1111778878/secret-service-deleted-messages-january-6-is-that-data-really-gone</a></p><p><a href="https://www.cbsnews.com/news/secret-service-texts-house-january-6-committee-federal-records-act/">https://www.cbsnews.com/news/secret-service-texts-house-january-6-committee-federal-records-act/</a></p>
]]></description>
      <pubDate>Sat, 7 Jan 2023 23:10:00 +0000</pubDate>
      <author>belfercenter@gmail.com (Sophie Faaborg-Andersen, Bethan Saunders, Danielle Levin, Grace Park)</author>
      <link>https://cyber-rar.simplecast.com/episodes/jan-6-2TXzKpJn</link>
      <content:encoded><![CDATA[<p><a href="https://www.justsecurity.org/81806/january-6-intelligence-and-warning-timeline/">https://www.justsecurity.org/81806/january-6-intelligence-and-warning-timeline/</a></p><p><a href="https://thehill.com/policy/national-security/3686920-secret-service-messages-show-the-knew-crowd-outside-jan-6-rally-was-armed/">https://thehill.com/policy/national-security/3686920-secret-service-messages-show-the-knew-crowd-outside-jan-6-rally-was-armed/</a></p><p><a href="https://zetter.substack.com/p/is-the-secret-services-claim-about">https://zetter.substack.com/p/is-the-secret-services-claim-about</a></p><p>​​<a href="https://www.npr.org/2022/07/15/1111778878/secret-service-deleted-messages-january-6-is-that-data-really-gone">https://www.npr.org/2022/07/15/1111778878/secret-service-deleted-messages-january-6-is-that-data-really-gone</a></p><p><a href="https://www.cbsnews.com/news/secret-service-texts-house-january-6-committee-federal-records-act/">https://www.cbsnews.com/news/secret-service-texts-house-january-6-committee-federal-records-act/</a></p>
]]></content:encoded>
      <enclosure length="56193858" type="audio/mpeg" url="https://cdn.simplecast.com/audio/66718cf8-0c42-42bf-aea1-8c54e5ace017/episodes/258e6095-e049-4b64-a9cf-f35436099fc1/audio/67c92ad8-44a1-4491-a020-5f5913978f97/default_tc.mp3?aid=rss_feed&amp;feed=Z7I7LeKR"/>
      <itunes:title>Looking Back on Jan 6: the Role of Cybersecurity in Preventing and Prosecuting an Insurrection</itunes:title>
      <itunes:author>Sophie Faaborg-Andersen, Bethan Saunders, Danielle Levin, Grace Park</itunes:author>
      <itunes:duration>00:58:32</itunes:duration>
      <itunes:summary>On the two year anniversary of the Jan 6 riots at the US Capitol, the Cyber.RAR team explores the ways in which cybersecurity played a role before and after the day&apos;s events. On this episode, we explore how open source digital surveillance generated substantial intelligence predicting the day&apos;s events; we&apos;ll also explore how the collection of digital communications from government officials has helped - or hasn&apos;t helped - piece together what occurred on Jan 6. Plus, a Cyber Show and Tell from Chat GPT!</itunes:summary>
      <itunes:subtitle>On the two year anniversary of the Jan 6 riots at the US Capitol, the Cyber.RAR team explores the ways in which cybersecurity played a role before and after the day&apos;s events. On this episode, we explore how open source digital surveillance generated substantial intelligence predicting the day&apos;s events; we&apos;ll also explore how the collection of digital communications from government officials has helped - or hasn&apos;t helped - piece together what occurred on Jan 6. Plus, a Cyber Show and Tell from Chat GPT!</itunes:subtitle>
      <itunes:keywords>jan 6, capitol, insurrection, cybersecurity, surveillance, intelligence</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>19</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">20d44051-a587-4903-a37e-3a650c316024</guid>
      <title>Is Big Tech Imploding? Cybersecurity and Content Moderation</title>
      <description><![CDATA[<p>Big Tech, honey, are you doing okay?</p><p> </p><p>Whether we like it or not, large technology platforms and the for-profit institutions that make them are here to stay in our society and economy. Governments are starting to craft often-overlapping regulations to try and fix the problems that come up, but instead of looking at issues one by one, let's look at these organizations as a whole - fundamentally “grow fast and break things” companies who somehow ended up in shouldering a lot of our national security, growing the international economy, and protecting values that underpin our Western society. How well does big tech help or hinder our security, privacy, and social fabric, and how will that change as the economy slows down? </p><p>Show notes:</p><ul><li>Twitter:<ul><li>Content moderation & security: Mudge whistleblower complaint<ul><li><a href="https://techcrunch.com/2022/09/13/twitter-whistleblower-mudge-congress/">https://techcrunch.com/2022/09/13/twitter-whistleblower-mudge-congress/</a></li></ul></li><li>Deplatforming vs. Echo chambers<ul><li><a href="https://www.vanderbilt.edu/jetlaw/2021/01/31/the-de-platforming-debate-balancing-concerns-over-online-extremism-with-free-speech/">https://www.vanderbilt.edu/jetlaw/2021/01/31/the-de-platforming-debate-balancing-concerns-over-online-extremism-with-free-speech/</a></li><li><a href="https://www.youtube.com/watch?v=6V_sEqfIL9Q">https://www.youtube.com/watch?v=6V_sEqfIL9Q</a></li><li><a href="https://www.axios.com/2021/12/06/conservative-social-media-crypto-publishing-internet">https://www.axios.com/2021/12/06/conservative-social-media-crypto-publishing-internet</a></li></ul></li><li>Staffing at Twitter<ul><li><a href="https://www.reuters.com/technology/after-elon-musks-ultimatum-twitter-employees-start-exiting-2022-11-18/">https://www.reuters.com/technology/after-elon-musks-ultimatum-twitter-employees-start-exiting-2022-11-18/</a></li></ul></li></ul></li><li>Radioshack tries to sell off user data<ul><li><a href="https://www.washingtonpost.com/news/the-switch/wp/2015/03/26/bankrupt-radioshack-wants-to-sell-off-user-data-but-the-bigger-risk-is-if-a-facebook-or-google-goes-bust/">https://www.washingtonpost.com/news/the-switch/wp/2015/03/26/bankrupt-radioshack-wants-to-sell-off-user-data-but-the-bigger-risk-is-if-a-facebook-or-google-goes-bust/</a></li></ul></li><li>Uber:<ul><li>Uber CISO court case: <a href="https://www.csoonline.com/article/3676078/what-the-uber-verdict-means-to-cisos-youre-probably-not-going-to-jail.html">https://www.csoonline.com/article/3676078/what-the-uber-verdict-means-to-cisos-youre-probably-not-going-to-jail.html</a> <br /><br /> </li></ul></li><li>Facebook / Meta:<ul><li>Advisory board / election issues<ul><li><a href="https://www.cnn.com/2021/10/05/world/meanwhile-in-america-oct-6-intl">https://www.cnn.com/2021/10/05/world/meanwhile-in-america-oct-6-intl</a></li></ul></li><li>Body issues re: instagram <ul><li><a href="https://www.npr.org/2021/10/05/1043194385/whistleblowers-testimony-facebook-instagram">https://www.npr.org/2021/10/05/1043194385/whistleblowers-testimony-facebook-instagram</a></li></ul></li></ul></li><li>Overlapping foreign government action + industrial policy<ul><li>State overlapping privacy laws<ul><li><a href="https://www.ncsl.org/research/telecommunications-and-information-technology/state-laws-related-to-internet-privacy.aspx">https://www.ncsl.org/research/telecommunications-and-information-technology/state-laws-related-to-internet-privacy.aspx</a> <br /><br /> </li></ul></li><li>China data privacy laws / increased balkanization of internet<ul><li><a href="https://www.ey.com/en_kw/forensic-integrity-services/how-chinas-data-privacy-and-security-rules-could-impact-your-business#:~:text=The%20Personal%20Information%20Protection%20Law,(DSL)%20came%20into%20force">https://www.ey.com/en_kw/forensic-integrity-services/how-chinas-data-privacy-and-security-rules-could-impact-your-business</a><br /><br /> </li></ul></li><li>Google’s Operation Aurora: <a href="https://www.youtube.com/watch?v=przDcQe6n5o">https://www.youtube.com/watch?v=przDcQe6n5o</a></li></ul></li><li>Cybersecurity in a technology recession (cyber security as compliance)<ul><li>Google being told to cut costs by VC<ul><li><a href="https://www.businessinsider.com/google-layoffs-cost-cutting-analyst-2022-11">https://www.businessinsider.com/google-layoffs-cost-cutting-analyst-2022-11</a> <br /><br /> </li></ul></li><li>Benefits of security / private attribution, compliance for government contracts<ul><li><a href="https://www.securityweek.com/google-wins-lawsuit-against-glupteba-botnet-operators">https://www.securityweek.com/google-wins-lawsuit-against-glupteba-botnet-operators</a></li></ul></li></ul></li><li>FTX<ul><li><a href="https://www.forbes.com/sites/ninabambysheva/2022/11/21/ftx-hacker-moved-nearly-200-million-of-ether-to-different-wallets/">https://www.forbes.com/sites/ninabambysheva/2022/11/21/ftx-hacker-moved-nearly-200-million-of-ether-to-different-wallets/</a></li><li><a href="https://www.cnn.com/2022/11/18/investing/ftx-bahamas-seizure">https://www.cnn.com/2022/11/18/investing/ftx-bahamas-seizure</a></li></ul></li></ul>
]]></description>
      <pubDate>Wed, 30 Nov 2022 11:00:00 +0000</pubDate>
      <author>belfercenter@gmail.com (Belfer Center for Science and International Affairs)</author>
      <link>https://cyber-rar.simplecast.com/episodes/is-big-tech-imploding-c134o5k-Km3ZHBZK</link>
      <content:encoded><![CDATA[<p>Big Tech, honey, are you doing okay?</p><p> </p><p>Whether we like it or not, large technology platforms and the for-profit institutions that make them are here to stay in our society and economy. Governments are starting to craft often-overlapping regulations to try and fix the problems that come up, but instead of looking at issues one by one, let's look at these organizations as a whole - fundamentally “grow fast and break things” companies who somehow ended up in shouldering a lot of our national security, growing the international economy, and protecting values that underpin our Western society. How well does big tech help or hinder our security, privacy, and social fabric, and how will that change as the economy slows down? </p><p>Show notes:</p><ul><li>Twitter:<ul><li>Content moderation & security: Mudge whistleblower complaint<ul><li><a href="https://techcrunch.com/2022/09/13/twitter-whistleblower-mudge-congress/">https://techcrunch.com/2022/09/13/twitter-whistleblower-mudge-congress/</a></li></ul></li><li>Deplatforming vs. Echo chambers<ul><li><a href="https://www.vanderbilt.edu/jetlaw/2021/01/31/the-de-platforming-debate-balancing-concerns-over-online-extremism-with-free-speech/">https://www.vanderbilt.edu/jetlaw/2021/01/31/the-de-platforming-debate-balancing-concerns-over-online-extremism-with-free-speech/</a></li><li><a href="https://www.youtube.com/watch?v=6V_sEqfIL9Q">https://www.youtube.com/watch?v=6V_sEqfIL9Q</a></li><li><a href="https://www.axios.com/2021/12/06/conservative-social-media-crypto-publishing-internet">https://www.axios.com/2021/12/06/conservative-social-media-crypto-publishing-internet</a></li></ul></li><li>Staffing at Twitter<ul><li><a href="https://www.reuters.com/technology/after-elon-musks-ultimatum-twitter-employees-start-exiting-2022-11-18/">https://www.reuters.com/technology/after-elon-musks-ultimatum-twitter-employees-start-exiting-2022-11-18/</a></li></ul></li></ul></li><li>Radioshack tries to sell off user data<ul><li><a href="https://www.washingtonpost.com/news/the-switch/wp/2015/03/26/bankrupt-radioshack-wants-to-sell-off-user-data-but-the-bigger-risk-is-if-a-facebook-or-google-goes-bust/">https://www.washingtonpost.com/news/the-switch/wp/2015/03/26/bankrupt-radioshack-wants-to-sell-off-user-data-but-the-bigger-risk-is-if-a-facebook-or-google-goes-bust/</a></li></ul></li><li>Uber:<ul><li>Uber CISO court case: <a href="https://www.csoonline.com/article/3676078/what-the-uber-verdict-means-to-cisos-youre-probably-not-going-to-jail.html">https://www.csoonline.com/article/3676078/what-the-uber-verdict-means-to-cisos-youre-probably-not-going-to-jail.html</a> <br /><br /> </li></ul></li><li>Facebook / Meta:<ul><li>Advisory board / election issues<ul><li><a href="https://www.cnn.com/2021/10/05/world/meanwhile-in-america-oct-6-intl">https://www.cnn.com/2021/10/05/world/meanwhile-in-america-oct-6-intl</a></li></ul></li><li>Body issues re: instagram <ul><li><a href="https://www.npr.org/2021/10/05/1043194385/whistleblowers-testimony-facebook-instagram">https://www.npr.org/2021/10/05/1043194385/whistleblowers-testimony-facebook-instagram</a></li></ul></li></ul></li><li>Overlapping foreign government action + industrial policy<ul><li>State overlapping privacy laws<ul><li><a href="https://www.ncsl.org/research/telecommunications-and-information-technology/state-laws-related-to-internet-privacy.aspx">https://www.ncsl.org/research/telecommunications-and-information-technology/state-laws-related-to-internet-privacy.aspx</a> <br /><br /> </li></ul></li><li>China data privacy laws / increased balkanization of internet<ul><li><a href="https://www.ey.com/en_kw/forensic-integrity-services/how-chinas-data-privacy-and-security-rules-could-impact-your-business#:~:text=The%20Personal%20Information%20Protection%20Law,(DSL)%20came%20into%20force">https://www.ey.com/en_kw/forensic-integrity-services/how-chinas-data-privacy-and-security-rules-could-impact-your-business</a><br /><br /> </li></ul></li><li>Google’s Operation Aurora: <a href="https://www.youtube.com/watch?v=przDcQe6n5o">https://www.youtube.com/watch?v=przDcQe6n5o</a></li></ul></li><li>Cybersecurity in a technology recession (cyber security as compliance)<ul><li>Google being told to cut costs by VC<ul><li><a href="https://www.businessinsider.com/google-layoffs-cost-cutting-analyst-2022-11">https://www.businessinsider.com/google-layoffs-cost-cutting-analyst-2022-11</a> <br /><br /> </li></ul></li><li>Benefits of security / private attribution, compliance for government contracts<ul><li><a href="https://www.securityweek.com/google-wins-lawsuit-against-glupteba-botnet-operators">https://www.securityweek.com/google-wins-lawsuit-against-glupteba-botnet-operators</a></li></ul></li></ul></li><li>FTX<ul><li><a href="https://www.forbes.com/sites/ninabambysheva/2022/11/21/ftx-hacker-moved-nearly-200-million-of-ether-to-different-wallets/">https://www.forbes.com/sites/ninabambysheva/2022/11/21/ftx-hacker-moved-nearly-200-million-of-ether-to-different-wallets/</a></li><li><a href="https://www.cnn.com/2022/11/18/investing/ftx-bahamas-seizure">https://www.cnn.com/2022/11/18/investing/ftx-bahamas-seizure</a></li></ul></li></ul>
]]></content:encoded>
      <enclosure length="44177625" type="audio/mpeg" url="https://cdn.simplecast.com/audio/66718cf8-0c42-42bf-aea1-8c54e5ace017/episodes/801486f9-7308-469f-90ec-e01f78e83480/audio/0a928dd6-8883-4f33-b0c8-e5b9d38c5e61/default_tc.mp3?aid=rss_feed&amp;feed=Z7I7LeKR"/>
      <itunes:title>Is Big Tech Imploding? Cybersecurity and Content Moderation</itunes:title>
      <itunes:author>Belfer Center for Science and International Affairs</itunes:author>
      <itunes:duration>00:46:01</itunes:duration>
      <itunes:summary>Big Tech, honey, are you doing okay?

Whether we like it or not, large technology platforms and the for-profit institutions that make them are here to stay in our society and economy. Governments are starting to craft often-overlapping regulations to try and fix the problems that come up, but instead of looking at issues one by one, let&apos;s look at these organizations as a whole - fundamentally “grow fast and break things” companies who somehow ended up in shouldering a lot of our national security, growing the international economy, and protecting values that underpin our Western society. How well does big tech help or hinder our security, privacy, and social fabric, and how will that change as the economy slows down? </itunes:summary>
      <itunes:subtitle>Big Tech, honey, are you doing okay?

Whether we like it or not, large technology platforms and the for-profit institutions that make them are here to stay in our society and economy. Governments are starting to craft often-overlapping regulations to try and fix the problems that come up, but instead of looking at issues one by one, let&apos;s look at these organizations as a whole - fundamentally “grow fast and break things” companies who somehow ended up in shouldering a lot of our national security, growing the international economy, and protecting values that underpin our Western society. How well does big tech help or hinder our security, privacy, and social fabric, and how will that change as the economy slows down? </itunes:subtitle>
      <itunes:keywords>big tech, cyber, ftx, privacy, faang, technology, cybersecurity, infosec, cyber policy, regulation, government, policy</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>18</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">326c271d-a3a3-4376-a2e3-3046896d3a1c</guid>
      <title>Cybersecurity in a National Digital Transformation Effort: An Interview with Minister Cina Lawson of Togo</title>
      <description><![CDATA[Minister Cina Lawson, Togo's Minister of Digital Economy and Transformation, joins Cyber.RaR for a special episode.  In her role leading Togo's digital transformation, Minister Lawson oversaw rapid digital service penetration within Togo, the first deployment of 5G in West Africa, and an innovative mobile cash distribution solution for Covid-19 relief.  Minister Lawson discusses the tradeoffs between growing a local cyber talent workforce and hiring experts, how Togo has sustained good security hygiene despite rapid increases in digital service provision and access, and how her team's innovative approach is derived from human-centric principles.]]></description>
      <pubDate>Fri, 11 Nov 2022 13:00:00 +0000</pubDate>
      <author>belfercenter@gmail.com (Danielle Levin)</author>
      <link>https://cyber-rar.simplecast.com/episodes/interview-minister-cina-lawson-pACq4QWI</link>
      <enclosure length="34396067" type="audio/mpeg" url="https://cdn.simplecast.com/audio/66718cf8-0c42-42bf-aea1-8c54e5ace017/episodes/f696baac-ae6b-405c-80f3-b1f5d75ad4c0/audio/23722915-762a-422c-87d4-e15c3a3d2caf/default_tc.mp3?aid=rss_feed&amp;feed=Z7I7LeKR"/>
      <itunes:title>Cybersecurity in a National Digital Transformation Effort: An Interview with Minister Cina Lawson of Togo</itunes:title>
      <itunes:author>Danielle Levin</itunes:author>
      <itunes:duration>00:35:49</itunes:duration>
      <itunes:summary>Minister Cina Lawson, Togo&apos;s Minister of Digital Economy and Transformation, joins Cyber.RaR for a special episode.  In her role leading Togo&apos;s digital transformation, Minister Lawson oversaw rapid digital service penetration within Togo, the first deployment of 5G in West Africa, and an innovative mobile cash distribution solution for Covid-19 relief.  Minister Lawson discusses the tradeoffs between growing a local cyber talent workforce and hiring experts, how Togo has sustained good security hygiene despite rapid increases in digital service provision and access, and how her team&apos;s innovative approach is derived from human-centric principles.</itunes:summary>
      <itunes:subtitle>Minister Cina Lawson, Togo&apos;s Minister of Digital Economy and Transformation, joins Cyber.RaR for a special episode.  In her role leading Togo&apos;s digital transformation, Minister Lawson oversaw rapid digital service penetration within Togo, the first deployment of 5G in West Africa, and an innovative mobile cash distribution solution for Covid-19 relief.  Minister Lawson discusses the tradeoffs between growing a local cyber talent workforce and hiring experts, how Togo has sustained good security hygiene despite rapid increases in digital service provision and access, and how her team&apos;s innovative approach is derived from human-centric principles.</itunes:subtitle>
      <itunes:keywords>digital transformation, west africa, human centered design, cybersecurity, togo</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>17</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3dde6456-77d3-47c4-9873-91f61a312619</guid>
      <title>Sharks &amp; Tubes: Submarine Cables and Cybersecurity</title>
      <description><![CDATA[<p>Worried about a nuclear war with Russia? Maybe you SHOULD be worried about beluga whales. Let’s dive in (pun intended) on why. This week on Cyber.RAR, we discuss global infrastructure in the form of undersea cables transmitting data through light traveling along silicon tubes - and how fragile these systems really are. We discuss how to monitor and defend these cable networks given how massive and interconnected they are and how geography and technology factor into strategic decision-making about espionage and cyber-enabled attacks. We conclude the episode with a tribute to Secretary of Defense Ash Carter and his tremendous impact on the Kennedy School and the nation.</p><p>Relevant Sources: </p><p>https://www.submarinecablemap.com/ </p><p>https://www.nytimes.com/interactive/2019/03/10/technology/internet-cables-oceans.html</p><p>https://www.theatlantic.com/international/archive/2013/07/the-creepy-long-standing-practice-of-undersea-cable-tapping/277855/</p><p>https://www.atlanticcouncil.org/in-depth-research-reports/report/cyber-defense-across-the-ocean-floor-the-geopolitics-of-submarine-cable-security/</p>
]]></description>
      <pubDate>Thu, 3 Nov 2022 11:00:00 +0000</pubDate>
      <author>belfercenter@gmail.com (Grace Park, Winnona DeSombre, Danielle Levin, Sophie Faaborg-Andersen, Bethan Saunders)</author>
      <link>https://cyber-rar.simplecast.com/episodes/sharks-tubes-submarine-cables-and-cybersecurity-pKdy_hDG</link>
      <content:encoded><![CDATA[<p>Worried about a nuclear war with Russia? Maybe you SHOULD be worried about beluga whales. Let’s dive in (pun intended) on why. This week on Cyber.RAR, we discuss global infrastructure in the form of undersea cables transmitting data through light traveling along silicon tubes - and how fragile these systems really are. We discuss how to monitor and defend these cable networks given how massive and interconnected they are and how geography and technology factor into strategic decision-making about espionage and cyber-enabled attacks. We conclude the episode with a tribute to Secretary of Defense Ash Carter and his tremendous impact on the Kennedy School and the nation.</p><p>Relevant Sources: </p><p>https://www.submarinecablemap.com/ </p><p>https://www.nytimes.com/interactive/2019/03/10/technology/internet-cables-oceans.html</p><p>https://www.theatlantic.com/international/archive/2013/07/the-creepy-long-standing-practice-of-undersea-cable-tapping/277855/</p><p>https://www.atlanticcouncil.org/in-depth-research-reports/report/cyber-defense-across-the-ocean-floor-the-geopolitics-of-submarine-cable-security/</p>
]]></content:encoded>
      <enclosure length="42418804" type="audio/mpeg" url="https://cdn.simplecast.com/audio/66718cf8-0c42-42bf-aea1-8c54e5ace017/episodes/89982e63-abe6-4717-84fa-3d52624d45bc/audio/73110c87-e2ff-4d8c-a1a5-e0263b37fcc9/default_tc.mp3?aid=rss_feed&amp;feed=Z7I7LeKR"/>
      <itunes:title>Sharks &amp; Tubes: Submarine Cables and Cybersecurity</itunes:title>
      <itunes:author>Grace Park, Winnona DeSombre, Danielle Levin, Sophie Faaborg-Andersen, Bethan Saunders</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b7d3b22c-f1c1-4c35-878d-f889c3a1a93d/3f754610-689e-49e9-8e89-c4ca99b3cd81/3000x3000/cyber-rar-logo.jpg?aid=rss_feed"/>
      <itunes:duration>00:44:11</itunes:duration>
      <itunes:summary>Worried about a nuclear war with Russia? Maybe you SHOULD be worried about beluga whales. Let’s dive in (pun intended) on why. This week on Cyber.RAR, we discuss global infrastructure in the form of undersea cables transmitting data through light traveling along silicon tubes - and how fragile these systems really are. We discuss how to monitor and defend these cable networks given how massive and interconnected they are and how geography and technology factor into strategic decision-making about espionage and cyber-enabled attacks. We conclude the episode with a tribute to Secretary of Defense Ash Carter and his tremendous impact on the Kennedy School and the nation.</itunes:summary>
      <itunes:subtitle>Worried about a nuclear war with Russia? Maybe you SHOULD be worried about beluga whales. Let’s dive in (pun intended) on why. This week on Cyber.RAR, we discuss global infrastructure in the form of undersea cables transmitting data through light traveling along silicon tubes - and how fragile these systems really are. We discuss how to monitor and defend these cable networks given how massive and interconnected they are and how geography and technology factor into strategic decision-making about espionage and cyber-enabled attacks. We conclude the episode with a tribute to Secretary of Defense Ash Carter and his tremendous impact on the Kennedy School and the nation.</itunes:subtitle>
      <itunes:keywords>cyber.rar, internet infrastructure, cyber, internet cables, subsea cables, harvard kennedy school cyber</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>16</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f8ad2a55-794b-4dab-a959-35a557aeb190</guid>
      <title>Your Data is Oozing: How the US Government Accesses Citizens&apos; Data Using Consumer AdTech</title>
      <description><![CDATA[<p><strong>Bloomberg - FTC Sues Mobile Data Broker Over Abortion Location Data Sale</strong> https://www.bloomberg.com/news/articles/2022-08-29/ftc-sues-mobile-data-broker-over-abortion-location-data-sales?sref=P6Q0mxvj&leadSource=uverify%20wall</p><p><strong>Vice - Data Broker Is Selling Location Data of People Who Visit Abortion Clinics</strong> https://www.vice.com/en/article/m7vzjb/location-data-abortion-clinics-safegraph-planned-parenthood</p><p><strong>Forbes - Black Lives Matter Protestors Tracked by Secretive Phone Location Technology</strong> https://www.forbes.com/sites/zakdoffman/2020/06/26/secretive-phone-tracking-company-publishes-location-data-on-black-lives-matter-protesters/?sh=77520f5f4a1e</p><p><strong>AP - Tech Tool Offers Police ‘Mass Surveillance on a Budget’</strong> https://apnews.com/article/technology-police-government-surveillance-d395409ef5a8c6c3f6cdab5b1d0e27ef</p><p><strong>AP - Across the US, Police Offers Abuse Confidential Databases</strong> https://apnews.com/article/699236946e3140659fff8a2362e16f43</p><p><strong>Wired - WhatsApp Has Shared Your Data with Facebook for Years Actually</strong> https://www.wired.com/story/whatsapp-facebook-data-share-notification/</p><p><strong>Gizmodo - Rights Groups Say the Pentagon is Buying its Way Around the Fourth Amendment </strong>https://gizmodo.com/rights-groups-say-pentagon-buys-freedom-from-fourth-ame-1849604210</p><p><strong>Gizmodo - The American Data Privacy Act Would Be a Bipartisan Triumph - If It Could Pass</strong> https://gizmodo.com/can-american-data-privacy-protection-act-pass-1849413911</p><p><strong>Gizmodo - Congresswoman Urges FTC to Investigate Newly Revealed Police Software Surveilling Americans’ Movements</strong> https://gizmodo.com/congresswoman-ftc-to-investigate-fog-data-science-softw-1849547432</p><p><strong>Brookings - The FTC Can Rise to the Privacy Challenge, but Not Without Help from Congress</strong> https://www.brookings.edu/blog/techtank/2019/08/08/the-ftc-can-rise-to-the-privacy-challenge-but-not-without-help-from-congress/</p><p><strong>Berkman Klein Center and Minnesota Law Review - Understanding Chilling Effects </strong>https://cyber.harvard.edu/story/2021-06/understanding-chilling-effects</p><p><strong>PEN America - Chilling Effects: NSA Surveillance Drives US Writers to Self-Censor</strong> https://pen.org/research-resources/chilling-effects/</p><p> </p>
]]></description>
      <pubDate>Thu, 6 Oct 2022 10:00:00 +0000</pubDate>
      <author>belfercenter@gmail.com (Belfer Center for Science and International Affairs)</author>
      <link>https://cyber-rar.simplecast.com/episodes/government-accessing-data-6eUgAJsP</link>
      <content:encoded><![CDATA[<p><strong>Bloomberg - FTC Sues Mobile Data Broker Over Abortion Location Data Sale</strong> https://www.bloomberg.com/news/articles/2022-08-29/ftc-sues-mobile-data-broker-over-abortion-location-data-sales?sref=P6Q0mxvj&leadSource=uverify%20wall</p><p><strong>Vice - Data Broker Is Selling Location Data of People Who Visit Abortion Clinics</strong> https://www.vice.com/en/article/m7vzjb/location-data-abortion-clinics-safegraph-planned-parenthood</p><p><strong>Forbes - Black Lives Matter Protestors Tracked by Secretive Phone Location Technology</strong> https://www.forbes.com/sites/zakdoffman/2020/06/26/secretive-phone-tracking-company-publishes-location-data-on-black-lives-matter-protesters/?sh=77520f5f4a1e</p><p><strong>AP - Tech Tool Offers Police ‘Mass Surveillance on a Budget’</strong> https://apnews.com/article/technology-police-government-surveillance-d395409ef5a8c6c3f6cdab5b1d0e27ef</p><p><strong>AP - Across the US, Police Offers Abuse Confidential Databases</strong> https://apnews.com/article/699236946e3140659fff8a2362e16f43</p><p><strong>Wired - WhatsApp Has Shared Your Data with Facebook for Years Actually</strong> https://www.wired.com/story/whatsapp-facebook-data-share-notification/</p><p><strong>Gizmodo - Rights Groups Say the Pentagon is Buying its Way Around the Fourth Amendment </strong>https://gizmodo.com/rights-groups-say-pentagon-buys-freedom-from-fourth-ame-1849604210</p><p><strong>Gizmodo - The American Data Privacy Act Would Be a Bipartisan Triumph - If It Could Pass</strong> https://gizmodo.com/can-american-data-privacy-protection-act-pass-1849413911</p><p><strong>Gizmodo - Congresswoman Urges FTC to Investigate Newly Revealed Police Software Surveilling Americans’ Movements</strong> https://gizmodo.com/congresswoman-ftc-to-investigate-fog-data-science-softw-1849547432</p><p><strong>Brookings - The FTC Can Rise to the Privacy Challenge, but Not Without Help from Congress</strong> https://www.brookings.edu/blog/techtank/2019/08/08/the-ftc-can-rise-to-the-privacy-challenge-but-not-without-help-from-congress/</p><p><strong>Berkman Klein Center and Minnesota Law Review - Understanding Chilling Effects </strong>https://cyber.harvard.edu/story/2021-06/understanding-chilling-effects</p><p><strong>PEN America - Chilling Effects: NSA Surveillance Drives US Writers to Self-Censor</strong> https://pen.org/research-resources/chilling-effects/</p><p> </p>
]]></content:encoded>
      <enclosure length="34381428" type="audio/mpeg" url="https://cdn.simplecast.com/audio/66718cf8-0c42-42bf-aea1-8c54e5ace017/episodes/4275c3ec-88c7-4395-b5be-9c1187e0dea7/audio/c3ddd18e-a7a5-47e5-85be-899070e49be9/default_tc.mp3?aid=rss_feed&amp;feed=Z7I7LeKR"/>
      <itunes:title>Your Data is Oozing: How the US Government Accesses Citizens&apos; Data Using Consumer AdTech</itunes:title>
      <itunes:author>Belfer Center for Science and International Affairs</itunes:author>
      <itunes:duration>00:35:48</itunes:duration>
      <itunes:summary>US government agencies, including law enforcement, are purchasing data sets created through private citizens’ use of consumer technology. This practice enables these agencies to access to information that they otherwise would’ve needed a warrant to acquire if they were collecting it themselves. Is this a problem? What are the risks of the widespread proliferation of our personal data among government users? Should data sets created through advertising ecosystems be restricted from government use? The Cyber.RaR team explores these questions and talks about policy options for balancing security and privacy. </itunes:summary>
      <itunes:subtitle>US government agencies, including law enforcement, are purchasing data sets created through private citizens’ use of consumer technology. This practice enables these agencies to access to information that they otherwise would’ve needed a warrant to acquire if they were collecting it themselves. Is this a problem? What are the risks of the widespread proliferation of our personal data among government users? Should data sets created through advertising ecosystems be restricted from government use? The Cyber.RaR team explores these questions and talks about policy options for balancing security and privacy. </itunes:subtitle>
      <itunes:keywords>cyber, privacy, security, adtech, policy</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>15</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">db59a7f8-cfa0-4b1e-964b-e58e82185a57</guid>
      <title>Are Turtles War Machines? AI-Enabled Cybersecurity Has an Answer</title>
      <description><![CDATA[<p>AI-enabled security can process data faster and more accurately than humans, but can it tell the difference between turtles and rifles? We answer this question and more as we cover AI-enabled cybersecurity for network defense, insider threat, and user privacy, including considering whether AI ethics are simply business ethics. We also discuss asymmetric uses for nation-states on both offensive and defensive postures and AI-enabled malware and social engineering. Dani concludes with a deep dive into "Fog Reveal" a law enforcement cellphone tracking tool that'll make you squirm.</p><ul><li>The Verge - Google's AI Thinks Turtles are Rifles: <a href="https://www.theverge.com/2017/11/2/16597276/google-ai-image-attacks-adversarial-turtle-rifle-3d-printed">https://www.theverge.com/2017/11/2/16597276/google-ai-image-attacks-adversarial-turtle-rifle-3d-printed</a></li><li>Forbes - Ukrainian Drones Strike Russian Artillery: <a href="https://www.forbes.com/sites/davidaxe/2022/09/02/ukraines-drones-are-back-and-blowing-up-russian-artillery/?sh=71b8f8946b8f">https://www.forbes.com/sites/davidaxe/2022/09/02/ukraines-drones-are-back-and-blowing-up-russian-artillery/?sh=71b8f8946b8f</a></li><li>DefenseNews - Torch.AI wins DoD Contract for Insider Threat Detection: <a href="https://www.defensenews.com/cyber/2022/08/15/torchai-wins-pentagon-insider-threat-cybersecurity-contract/">https://www.defensenews.com/cyber/2022/08/15/torchai-wins-pentagon-insider-threat-cybersecurity-contract/</a></li><li>Lawfare - AI and National Security: <a href="https://www.lawfareblog.com/recent-developments-ai-and-national-security-what-you-need-know">https://www.lawfareblog.com/recent-developments-ai-and-national-security-what-you-need-know</a></li><li>Oxford Internet Institute ‘<a href="https://philarchive.org/archive/TADTAI-2">Trusting Artificial Intelligence in Cybersecurity is a Double-Edged Sword</a>’</li><li>National Security Commission on Artificial Intelligence Final Report: <a href="https://www.nscai.gov/wp-content/uploads/2021/03/Full-Report-Digital-1.pdf">https://www.nscai.gov/wp-content/uploads/2021/03/Full-Report-Digital-1.pdf</a></li><li>AP Report on Fog Reveal: https://apnews.com/article/technology-police-government-surveillance-d395409ef5a8c6c3f6cdab5b1d0e27ef</li></ul>
]]></description>
      <pubDate>Wed, 21 Sep 2022 11:00:00 +0000</pubDate>
      <author>belfercenter@gmail.com (Grace Park, Winnona DeSombre, Bethan Saunders, Danielle Levin, Sophie Faaborg-Andersen)</author>
      <link>https://cyber-rar.simplecast.com/episodes/ai-enabled-cybersecurity-VAWKXzRp</link>
      <content:encoded><![CDATA[<p>AI-enabled security can process data faster and more accurately than humans, but can it tell the difference between turtles and rifles? We answer this question and more as we cover AI-enabled cybersecurity for network defense, insider threat, and user privacy, including considering whether AI ethics are simply business ethics. We also discuss asymmetric uses for nation-states on both offensive and defensive postures and AI-enabled malware and social engineering. Dani concludes with a deep dive into "Fog Reveal" a law enforcement cellphone tracking tool that'll make you squirm.</p><ul><li>The Verge - Google's AI Thinks Turtles are Rifles: <a href="https://www.theverge.com/2017/11/2/16597276/google-ai-image-attacks-adversarial-turtle-rifle-3d-printed">https://www.theverge.com/2017/11/2/16597276/google-ai-image-attacks-adversarial-turtle-rifle-3d-printed</a></li><li>Forbes - Ukrainian Drones Strike Russian Artillery: <a href="https://www.forbes.com/sites/davidaxe/2022/09/02/ukraines-drones-are-back-and-blowing-up-russian-artillery/?sh=71b8f8946b8f">https://www.forbes.com/sites/davidaxe/2022/09/02/ukraines-drones-are-back-and-blowing-up-russian-artillery/?sh=71b8f8946b8f</a></li><li>DefenseNews - Torch.AI wins DoD Contract for Insider Threat Detection: <a href="https://www.defensenews.com/cyber/2022/08/15/torchai-wins-pentagon-insider-threat-cybersecurity-contract/">https://www.defensenews.com/cyber/2022/08/15/torchai-wins-pentagon-insider-threat-cybersecurity-contract/</a></li><li>Lawfare - AI and National Security: <a href="https://www.lawfareblog.com/recent-developments-ai-and-national-security-what-you-need-know">https://www.lawfareblog.com/recent-developments-ai-and-national-security-what-you-need-know</a></li><li>Oxford Internet Institute ‘<a href="https://philarchive.org/archive/TADTAI-2">Trusting Artificial Intelligence in Cybersecurity is a Double-Edged Sword</a>’</li><li>National Security Commission on Artificial Intelligence Final Report: <a href="https://www.nscai.gov/wp-content/uploads/2021/03/Full-Report-Digital-1.pdf">https://www.nscai.gov/wp-content/uploads/2021/03/Full-Report-Digital-1.pdf</a></li><li>AP Report on Fog Reveal: https://apnews.com/article/technology-police-government-surveillance-d395409ef5a8c6c3f6cdab5b1d0e27ef</li></ul>
]]></content:encoded>
      <enclosure length="42685137" type="audio/mpeg" url="https://cdn.simplecast.com/audio/66718cf8-0c42-42bf-aea1-8c54e5ace017/episodes/5fda50df-481f-44b3-ae19-74596d2aef11/audio/5de9a1aa-0ec9-487e-a610-d590ad3a63af/default_tc.mp3?aid=rss_feed&amp;feed=Z7I7LeKR"/>
      <itunes:title>Are Turtles War Machines? AI-Enabled Cybersecurity Has an Answer</itunes:title>
      <itunes:author>Grace Park, Winnona DeSombre, Bethan Saunders, Danielle Levin, Sophie Faaborg-Andersen</itunes:author>
      <itunes:duration>00:44:27</itunes:duration>
      <itunes:summary>AI-enabled security can process data faster and more accurately than humans, but can it tell the difference between turtles and rifles? We answer this question and more as we cover AI-enabled cybersecurity for network defense, insider threat, and user privacy, including considering whether AI ethics are simply business ethics. We also discuss asymmetric uses for nation-states on both offensive and defensive postures and AI-enabled malware and social engineering. Dani concludes with a deep dive into &quot;Fog Reveal&quot; a law enforcement cellphone tracking tool that&apos;ll make you squirm.</itunes:summary>
      <itunes:subtitle>AI-enabled security can process data faster and more accurately than humans, but can it tell the difference between turtles and rifles? We answer this question and more as we cover AI-enabled cybersecurity for network defense, insider threat, and user privacy, including considering whether AI ethics are simply business ethics. We also discuss asymmetric uses for nation-states on both offensive and defensive postures and AI-enabled malware and social engineering. Dani concludes with a deep dive into &quot;Fog Reveal&quot; a law enforcement cellphone tracking tool that&apos;ll make you squirm.</itunes:subtitle>
      <itunes:keywords>ai transparency, ai-enabled cybersecurity, privacy, ai safety, arificial intelligence, ai, cybersecurity, ai privacy, ai-enabled cyber</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>14</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ebbd70d7-92de-4afa-8cf9-776ef07ba63c</guid>
      <title>Crypto &amp; Lowrise Jeans: Cybersecurity on the Blockchain</title>
      <description><![CDATA[<p>What do Cryptocurrency and the 90's have in common? Easily exploitable bugs and also Paris Hilton, apparently.</p><p>We cover the state of regulation and cybersecurity within the blockchain and cryptocurrency space - covering environmental, democratization, and equity concerns, as well as user vs. system security, code audits and minimum standards. Corinna Fehst (MPP'18 and crypto strategy expert) makes a surprise guest appearance. Bethan talks about whether you should post your laptop screen on BeReal [spoiler alert, please don't]. </p><p>Show Notes:</p><ul><li>Corinna Fehst: <a href="https://www.belfercenter.org/person/corinna-fehst">https://www.belfercenter.org/person/corinna-fehst</a></li><li>Security:<ul><li>Scams:<ul><li><a href="https://www.ftc.gov/news-events/data-visualizations/data-spotlight/2022/06/reports-show-scammers-cashing-crypto-craze">Reports show scammers cashing in on crypto craze | Federal Trade Commission</a></li><li><a href="https://www.cnbc.com/2022/07/08/crypto-lender-celsius-is-a-fraud-and-ponzi-scheme-lawsuit-claims.html">Embattled crypto lender Celsius is a 'fraud' and 'Ponzi scheme,' lawsuit alleges</a></li></ul></li><li>Exploiting vulnerabilities in smart contracts/wallets/code:<ul><li><a href="https://www.theverge.com/2022/8/2/23288785/nomad-bridge-200-million-chaotic-hack-smart-contract-cryptocurrency">Nomad crypto bridge loses $200 million in ‘chaotic’ hack - The Verge</a></li><li><a href="https://decrypt.co/106649/solana-wallet-hack-what-we-know-so-far">Solana Wallet Hack: Here’s What We Know So Far - Decrypt</a></li><li><a href="https://www.prnewswire.com/news-releases/number-of-blockchain-hacks-on-the-rise-301610778.html">Number of Blockchain Hacks on the Rise</a></li></ul></li><li>Money laundering / enabler of illegal activity:<ul><li><a href="https://www.reuters.com/business/energy/us-announce-recovery-millions-colonial-pipeline-ransomware-attack-2021-06-07/">U.S. seizes $2.3 mln in bitcoin paid to Colonial Pipeline hackers | Reuters</a></li><li><a href="https://thehackernews.com/2022/07/fbi-seizes-500000-ransomware-payments.html">FBI Seizes $500,000 Ransomware Payments and Crypto from North Korean Hackers</a></li></ul></li><li><a href="https://time.com/nextadvisor/investing/cryptocurrency/what-is-defi/">DeFi Is the Wild West of Banking and Investing. Here's What Crypto Investors Should Know</a></li><li><a href="https://blog.chainalysis.com/reports/2022-crypto-crime-report-introduction/">Crypto Crime Trends for 2022: Illicit Transaction Activity Reaches All-Time High in Value, All-Time Low in Share of All Cryptocurrency Activity - Chainalysis</a></li><li><a href="https://blog.chainalysis.com/reports/crypto-crime-midyear-update-2022/">Mid-year Crypto Crime Update: Illicit Activity Falls With Rest of Market, With Some Notable Exceptions - Chainalysis</a></li><li><a href="https://www.cnbc.com/2022/05/18/china-is-second-biggest-bitcoin-mining-hub-as-miners-go-underground.html">https://www.cnbc.com/2022/05/18/china-is-second-biggest-bitcoin-mining-hub-as-miners-go-underground.html</a></li></ul></li></ul>
]]></description>
      <pubDate>Wed, 7 Sep 2022 11:00:00 +0000</pubDate>
      <author>belfercenter@gmail.com (Belfer Center for Science and International Affairs)</author>
      <link>https://cyber-rar.simplecast.com/episodes/crypto-lowrise-jeans-cybersecurity-on-the-blockchain-Y2SbfzCy</link>
      <content:encoded><![CDATA[<p>What do Cryptocurrency and the 90's have in common? Easily exploitable bugs and also Paris Hilton, apparently.</p><p>We cover the state of regulation and cybersecurity within the blockchain and cryptocurrency space - covering environmental, democratization, and equity concerns, as well as user vs. system security, code audits and minimum standards. Corinna Fehst (MPP'18 and crypto strategy expert) makes a surprise guest appearance. Bethan talks about whether you should post your laptop screen on BeReal [spoiler alert, please don't]. </p><p>Show Notes:</p><ul><li>Corinna Fehst: <a href="https://www.belfercenter.org/person/corinna-fehst">https://www.belfercenter.org/person/corinna-fehst</a></li><li>Security:<ul><li>Scams:<ul><li><a href="https://www.ftc.gov/news-events/data-visualizations/data-spotlight/2022/06/reports-show-scammers-cashing-crypto-craze">Reports show scammers cashing in on crypto craze | Federal Trade Commission</a></li><li><a href="https://www.cnbc.com/2022/07/08/crypto-lender-celsius-is-a-fraud-and-ponzi-scheme-lawsuit-claims.html">Embattled crypto lender Celsius is a 'fraud' and 'Ponzi scheme,' lawsuit alleges</a></li></ul></li><li>Exploiting vulnerabilities in smart contracts/wallets/code:<ul><li><a href="https://www.theverge.com/2022/8/2/23288785/nomad-bridge-200-million-chaotic-hack-smart-contract-cryptocurrency">Nomad crypto bridge loses $200 million in ‘chaotic’ hack - The Verge</a></li><li><a href="https://decrypt.co/106649/solana-wallet-hack-what-we-know-so-far">Solana Wallet Hack: Here’s What We Know So Far - Decrypt</a></li><li><a href="https://www.prnewswire.com/news-releases/number-of-blockchain-hacks-on-the-rise-301610778.html">Number of Blockchain Hacks on the Rise</a></li></ul></li><li>Money laundering / enabler of illegal activity:<ul><li><a href="https://www.reuters.com/business/energy/us-announce-recovery-millions-colonial-pipeline-ransomware-attack-2021-06-07/">U.S. seizes $2.3 mln in bitcoin paid to Colonial Pipeline hackers | Reuters</a></li><li><a href="https://thehackernews.com/2022/07/fbi-seizes-500000-ransomware-payments.html">FBI Seizes $500,000 Ransomware Payments and Crypto from North Korean Hackers</a></li></ul></li><li><a href="https://time.com/nextadvisor/investing/cryptocurrency/what-is-defi/">DeFi Is the Wild West of Banking and Investing. Here's What Crypto Investors Should Know</a></li><li><a href="https://blog.chainalysis.com/reports/2022-crypto-crime-report-introduction/">Crypto Crime Trends for 2022: Illicit Transaction Activity Reaches All-Time High in Value, All-Time Low in Share of All Cryptocurrency Activity - Chainalysis</a></li><li><a href="https://blog.chainalysis.com/reports/crypto-crime-midyear-update-2022/">Mid-year Crypto Crime Update: Illicit Activity Falls With Rest of Market, With Some Notable Exceptions - Chainalysis</a></li><li><a href="https://www.cnbc.com/2022/05/18/china-is-second-biggest-bitcoin-mining-hub-as-miners-go-underground.html">https://www.cnbc.com/2022/05/18/china-is-second-biggest-bitcoin-mining-hub-as-miners-go-underground.html</a></li></ul></li></ul>
]]></content:encoded>
      <enclosure length="46257797" type="audio/mpeg" url="https://cdn.simplecast.com/audio/66718cf8-0c42-42bf-aea1-8c54e5ace017/episodes/b1819d89-afae-4eca-9001-649af51ff5c9/audio/f079ecc5-6ea5-468c-b22c-86599567f100/default_tc.mp3?aid=rss_feed&amp;feed=Z7I7LeKR"/>
      <itunes:title>Crypto &amp; Lowrise Jeans: Cybersecurity on the Blockchain</itunes:title>
      <itunes:author>Belfer Center for Science and International Affairs</itunes:author>
      <itunes:duration>00:48:11</itunes:duration>
      <itunes:summary>What do Cryptocurrency and the 90&apos;s have in common? Easily exploitable bugs and also Paris Hilton, apparently. 
We cover the state of regulation and cybersecurity within the blockchain and cryptocurrency space - covering environmental, democratization, and equity concerns, as well as user vs. system security, code audits and minimum standards. We also have a special guest appearance by crypto strategy expert, Corinna Fehst. Bethan talks about whether you should post your laptop screen on BeReal [spoiler alert, please don&apos;t]. </itunes:summary>
      <itunes:subtitle>What do Cryptocurrency and the 90&apos;s have in common? Easily exploitable bugs and also Paris Hilton, apparently. 
We cover the state of regulation and cybersecurity within the blockchain and cryptocurrency space - covering environmental, democratization, and equity concerns, as well as user vs. system security, code audits and minimum standards. We also have a special guest appearance by crypto strategy expert, Corinna Fehst. Bethan talks about whether you should post your laptop screen on BeReal [spoiler alert, please don&apos;t]. </itunes:subtitle>
      <itunes:keywords>monetary policy, cyber, blockchain, cybersecurity, infosec, cryptocurrency, cryptocurrency regulation, policy, cryptocurrency policy</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>13</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fa9cb6a2-7791-4d63-82f9-1392bb01c3dc</guid>
      <title>State of the Practice - The Chips &amp; Science Act</title>
      <description><![CDATA[<ul><li>Good WashPo article: <a href="https://www.washingtonpost.com/us-policy/2022/08/09/micron-40-billion-us-subsidies/">A new era of industrial policy kicks off with signing of the Chips Act</a></li><li>General relationship between semiconductors/cyber: <a href="https://www.vyrian.com/cybersecurity-and-semiconductors-how-are-they-related/">Cybersecurity and Semiconductors: How are they related? </a></li><li>Helpful article for context: <a href="https://rollcall.com/2022/07/26/how-the-chips-plus-bill-grew-by-nearly-1000-pages/">How the 'chips-plus' bill grew by nearly 1,000 pages - Roll Call</a></li><li>Read “Discussion of the CHIPS Act Section: <a href="https://thecyberwire.com/newsletters/policy-briefing/4/154">The US CHIPS Act.</a></li><li>From Grace - <a href="https://www.congress.gov/117/crec/2022/07/20/168/120/CREC-2022-07-20-pt1-PgS3548-2.pdf">AAPI Amendment that was removed</a></li><li>Skim DoD Statement for the national security angle (re microelectronics): <a href="https://www.defense.gov/News/News-Stories/Article/Article/3123699/chips-act-advances-dods-emphasis-on-microelectronics/">CHIPS Act Advances DOD's Emphasis on Microelectronics</a></li><li>Chips Act Summary by the <a href="https://www.commerce.senate.gov/services/files/1201E1CA-73CB-44BB-ADEB-E69634DA9BB9"><strong>Department of Commerce</strong></a></li><li><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2022/07/28/statement-from-president-biden-on-house-passage-of-chips-and-science-act-to-lower-costs-create-good-pay-jobs-and-strengthen-our-national-security/"><strong>Industry Matching of Chips Act</strong></a></li><li><strong>Bloomberg's "</strong><a href="https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies"><strong>The Big Hack - How China Used a Tiny Chip to Infiltrate US Companies"</strong></a></li><li><a href="https://www.nbcnews.com/tech/tech-news/bloomberg-stands-microchip-stories-denials-skepticism-mount-n923466"><strong>"Bloomberg Stands Firm as Story Denials Mount"</strong></a></li><li><a href="https://www.congress.gov/117/crec/2022/07/20/168/120/CREC-2022-07-20-pt1-PgS3548-2.pdf"><strong>AAPI Profiling amendment that was removed from the CHIPS Act</strong></a></li></ul>
]]></description>
      <pubDate>Wed, 24 Aug 2022 10:00:00 +0000</pubDate>
      <author>belfercenter@gmail.com (Belfer Center for Science and International Affairs)</author>
      <link>https://cyber-rar.simplecast.com/episodes/state-of-the-practice-the-chips-science-act-gxrpRU3Q</link>
      <content:encoded><![CDATA[<ul><li>Good WashPo article: <a href="https://www.washingtonpost.com/us-policy/2022/08/09/micron-40-billion-us-subsidies/">A new era of industrial policy kicks off with signing of the Chips Act</a></li><li>General relationship between semiconductors/cyber: <a href="https://www.vyrian.com/cybersecurity-and-semiconductors-how-are-they-related/">Cybersecurity and Semiconductors: How are they related? </a></li><li>Helpful article for context: <a href="https://rollcall.com/2022/07/26/how-the-chips-plus-bill-grew-by-nearly-1000-pages/">How the 'chips-plus' bill grew by nearly 1,000 pages - Roll Call</a></li><li>Read “Discussion of the CHIPS Act Section: <a href="https://thecyberwire.com/newsletters/policy-briefing/4/154">The US CHIPS Act.</a></li><li>From Grace - <a href="https://www.congress.gov/117/crec/2022/07/20/168/120/CREC-2022-07-20-pt1-PgS3548-2.pdf">AAPI Amendment that was removed</a></li><li>Skim DoD Statement for the national security angle (re microelectronics): <a href="https://www.defense.gov/News/News-Stories/Article/Article/3123699/chips-act-advances-dods-emphasis-on-microelectronics/">CHIPS Act Advances DOD's Emphasis on Microelectronics</a></li><li>Chips Act Summary by the <a href="https://www.commerce.senate.gov/services/files/1201E1CA-73CB-44BB-ADEB-E69634DA9BB9"><strong>Department of Commerce</strong></a></li><li><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2022/07/28/statement-from-president-biden-on-house-passage-of-chips-and-science-act-to-lower-costs-create-good-pay-jobs-and-strengthen-our-national-security/"><strong>Industry Matching of Chips Act</strong></a></li><li><strong>Bloomberg's "</strong><a href="https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies"><strong>The Big Hack - How China Used a Tiny Chip to Infiltrate US Companies"</strong></a></li><li><a href="https://www.nbcnews.com/tech/tech-news/bloomberg-stands-microchip-stories-denials-skepticism-mount-n923466"><strong>"Bloomberg Stands Firm as Story Denials Mount"</strong></a></li><li><a href="https://www.congress.gov/117/crec/2022/07/20/168/120/CREC-2022-07-20-pt1-PgS3548-2.pdf"><strong>AAPI Profiling amendment that was removed from the CHIPS Act</strong></a></li></ul>
]]></content:encoded>
      <enclosure length="39810814" type="audio/mpeg" url="https://cdn.simplecast.com/audio/66718cf8-0c42-42bf-aea1-8c54e5ace017/episodes/0da4d94f-c9a8-449b-be65-ab3ea143bff9/audio/7073b049-eed6-4dc0-9cfa-2ce7a1f51ac1/default_tc.mp3?aid=rss_feed&amp;feed=Z7I7LeKR"/>
      <itunes:title>State of the Practice - The Chips &amp; Science Act</itunes:title>
      <itunes:author>Belfer Center for Science and International Affairs</itunes:author>
      <itunes:duration>00:41:28</itunes:duration>
      <itunes:summary>Your favorite cyber policy podcast is back for Season 2! New format, same old hosts. 
We&apos;ll be covering the Chips &amp; Science Act in a discussion that goes through great power competition, hardware nuance, hardware supply chain security, AAPI advocacy, and workforce education. Winnona also talks a little bit about DEFCON policy for her &quot;Cyber Show &amp; Tell&quot;.</itunes:summary>
      <itunes:subtitle>Your favorite cyber policy podcast is back for Season 2! New format, same old hosts. 
We&apos;ll be covering the Chips &amp; Science Act in a discussion that goes through great power competition, hardware nuance, hardware supply chain security, AAPI advocacy, and workforce education. Winnona also talks a little bit about DEFCON policy for her &quot;Cyber Show &amp; Tell&quot;.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>12</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9d090d12-666f-4f11-a3b2-2740be7d7379</guid>
      <title>Expert Interview: Protecting Vulnerable Populations in Cyberspace</title>
      <description><![CDATA[<p>Michaela dives deeper into the nexus of cyber and vulnerable populations through an interview with Eva Galperin, the Director of Cybersecurity at the Electronic Frontier Foundation (EFF). Listen in on our conversation about stalkerware, privacy, and activism! Listen to the end of the episode to hear what the Cyber.RAR team is up to (plus the prospect of Season 2!?). If you'd like to reach out to us, send an email to cyberRAR.podcast@gmail.com!</p><p>Girls Lean Back Everywhere: The Law of Obscenity and the Assault on Genius: <a href="https://en.wikipedia.org/wiki/Girls_Lean_Back_Everywhere">https://en.wikipedia.org/wiki/Girls_Lean_Back_Everywhere</a></p><p>Maryland SB 134: https://www.eff.org/deeplinks/2022/04/victory-maryland-police-must-now-be-trained-recognize-stalkerware</p><p>Resources for vulnerable populations: </p><p>--EFF: https://www.eff.org/pages/tools </p><p>--Access Now: https://www.accessnow.org/help/ </p><p>--Department of Homeland Security: https://www.ready.gov/cybersecurity </p><p>--Consumer Reports: https://securityplanner.consumerreports.org/</p>
]]></description>
      <pubDate>Wed, 13 Jul 2022 11:05:00 +0000</pubDate>
      <author>belfercenter@gmail.com (Eva Galperin, Michaela Lee, Winnona DeSombre)</author>
      <link>https://cyber-rar.simplecast.com/episodes/expert-interview-protecting-vulnerable-populations-in-cyberspace-ARZVUuKe</link>
      <content:encoded><![CDATA[<p>Michaela dives deeper into the nexus of cyber and vulnerable populations through an interview with Eva Galperin, the Director of Cybersecurity at the Electronic Frontier Foundation (EFF). Listen in on our conversation about stalkerware, privacy, and activism! Listen to the end of the episode to hear what the Cyber.RAR team is up to (plus the prospect of Season 2!?). If you'd like to reach out to us, send an email to cyberRAR.podcast@gmail.com!</p><p>Girls Lean Back Everywhere: The Law of Obscenity and the Assault on Genius: <a href="https://en.wikipedia.org/wiki/Girls_Lean_Back_Everywhere">https://en.wikipedia.org/wiki/Girls_Lean_Back_Everywhere</a></p><p>Maryland SB 134: https://www.eff.org/deeplinks/2022/04/victory-maryland-police-must-now-be-trained-recognize-stalkerware</p><p>Resources for vulnerable populations: </p><p>--EFF: https://www.eff.org/pages/tools </p><p>--Access Now: https://www.accessnow.org/help/ </p><p>--Department of Homeland Security: https://www.ready.gov/cybersecurity </p><p>--Consumer Reports: https://securityplanner.consumerreports.org/</p>
]]></content:encoded>
      <enclosure length="44699369" type="audio/mpeg" url="https://cdn.simplecast.com/audio/66718cf8-0c42-42bf-aea1-8c54e5ace017/episodes/8b0140e3-784c-4d73-844a-e2ed4914a482/audio/0c496bfe-47fc-4487-9fd2-3034af660e88/default_tc.mp3?aid=rss_feed&amp;feed=Z7I7LeKR"/>
      <itunes:title>Expert Interview: Protecting Vulnerable Populations in Cyberspace</itunes:title>
      <itunes:author>Eva Galperin, Michaela Lee, Winnona DeSombre</itunes:author>
      <itunes:duration>00:46:33</itunes:duration>
      <itunes:summary>Michaela dives deeper into the nexus of cyber and vulnerable populations through an interview with Eva Galperin, the Director of Cybersecurity at the Electronic Frontier Foundation (EFF). Listen in on our conversation about stalkerware, privacy, and activism!   Listen to the end of the episode to hear what the Cyber.RAR team is up to (plus the prospect of Season 2!?). If you&apos;d like to reach out to us, send an email to cyber.rar.podcast@gmail.com!</itunes:summary>
      <itunes:subtitle>Michaela dives deeper into the nexus of cyber and vulnerable populations through an interview with Eva Galperin, the Director of Cybersecurity at the Electronic Frontier Foundation (EFF). Listen in on our conversation about stalkerware, privacy, and activism!   Listen to the end of the episode to hear what the Cyber.RAR team is up to (plus the prospect of Season 2!?). If you&apos;d like to reach out to us, send an email to cyber.rar.podcast@gmail.com!</itunes:subtitle>
      <itunes:keywords>populations, vulnerable, cyber, protection, privacy, stalkerware, cybersecurity, belfer center, activism, harvard</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>11</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">40ed5d86-0f59-464f-af6f-b2c5482c54e1</guid>
      <title>Protecting Vulnerable Populations in Cyberspace</title>
      <description><![CDATA[<p>How do we better protect our most vulnerable populations from cyber incidents? Michaela leads the conversation and posits that instead of thinking about it as a domain of war, we should use a climate analogy to think about the increasing vulnerability of our digital ecosystem. This could help us understand the disaggregated impacts on different communities and change the way we think about building resilience. If you'd like to reach out to us, send an email to cyber.rar.podcast@gmail.com!</p><p>Dusseldorf University Hospital Ransomware Attack: https://www.wired.co.uk/article/ransomware-hospital-death-germany</p><p>CISA alert on the increased threat of ransomware: https://www.cisa.gov/uscert/ncas/alerts/aa22-040a</p><p>Darknet Diaries Episode: https://darknetdiaries.com/transcript/106/</p><p>Cuckoo’s Egg: https://en.wikipedia.org/wiki/The_Cuckoo%27s_Egg_(book)</p><p>Resources for vulnerable populations:</p><p>--EFF: https://www.eff.org/pages/tools</p><p>--Access Now: https://www.accessnow.org/help/</p><p>--Department of Homeland Security: https://www.ready.gov/cybersecurity</p><p>--Consumer Reports: https://securityplanner.consumerreports.org/</p>
]]></description>
      <pubDate>Wed, 13 Jul 2022 11:00:00 +0000</pubDate>
      <author>belfercenter@gmail.com (Grace Park, Sophie Faaborg-Andersen, Danielle Levin, Bethan Saunders, Michaela Lee, Winnona DeSombre)</author>
      <link>https://cyber-rar.simplecast.com/episodes/protecting-vulnerable-populations-in-cyberspace-3rUOBw5Y</link>
      <content:encoded><![CDATA[<p>How do we better protect our most vulnerable populations from cyber incidents? Michaela leads the conversation and posits that instead of thinking about it as a domain of war, we should use a climate analogy to think about the increasing vulnerability of our digital ecosystem. This could help us understand the disaggregated impacts on different communities and change the way we think about building resilience. If you'd like to reach out to us, send an email to cyber.rar.podcast@gmail.com!</p><p>Dusseldorf University Hospital Ransomware Attack: https://www.wired.co.uk/article/ransomware-hospital-death-germany</p><p>CISA alert on the increased threat of ransomware: https://www.cisa.gov/uscert/ncas/alerts/aa22-040a</p><p>Darknet Diaries Episode: https://darknetdiaries.com/transcript/106/</p><p>Cuckoo’s Egg: https://en.wikipedia.org/wiki/The_Cuckoo%27s_Egg_(book)</p><p>Resources for vulnerable populations:</p><p>--EFF: https://www.eff.org/pages/tools</p><p>--Access Now: https://www.accessnow.org/help/</p><p>--Department of Homeland Security: https://www.ready.gov/cybersecurity</p><p>--Consumer Reports: https://securityplanner.consumerreports.org/</p>
]]></content:encoded>
      <enclosure length="33645223" type="audio/mpeg" url="https://cdn.simplecast.com/audio/66718cf8-0c42-42bf-aea1-8c54e5ace017/episodes/ca3436fd-d431-48fe-a86b-a554605c8891/audio/9a1f49dd-bc1a-4e0e-8c8d-efd122bbd190/default_tc.mp3?aid=rss_feed&amp;feed=Z7I7LeKR"/>
      <itunes:title>Protecting Vulnerable Populations in Cyberspace</itunes:title>
      <itunes:author>Grace Park, Sophie Faaborg-Andersen, Danielle Levin, Bethan Saunders, Michaela Lee, Winnona DeSombre</itunes:author>
      <itunes:duration>00:35:02</itunes:duration>
      <itunes:summary>How do we better protect our most vulnerable populations from cyber incidents? Michaela leads the conversation and posits that instead of thinking about it as a domain of war, we should use a climate analogy to think about the increasing vulnerability of our digital ecosystem. This could help us understand the disaggregated impacts on different communities and change the way we think about building resilience. If you&apos;d like to reach out to us, send an email to cyberRAR.podcast@gmail.com!</itunes:summary>
      <itunes:subtitle>How do we better protect our most vulnerable populations from cyber incidents? Michaela leads the conversation and posits that instead of thinking about it as a domain of war, we should use a climate analogy to think about the increasing vulnerability of our digital ecosystem. This could help us understand the disaggregated impacts on different communities and change the way we think about building resilience. If you&apos;d like to reach out to us, send an email to cyberRAR.podcast@gmail.com!</itunes:subtitle>
      <itunes:keywords>protect, vulnerable, climate, cyber, online, incidents, belfer center, hacking, communities, cyberspace, harvard</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>10</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e5b4019b-8456-4e02-bb38-3ffa27989123</guid>
      <title>Expert Interview: Defense Innovation? Walk Before You Run</title>
      <description><![CDATA[<p>Eric Rosenbach, Co-Director of the Belfer Center and Former Chief of Staff of the Pentagon, joins Cyber.RAR to talk about the major roadblocks facing innovation within the Department of Defense. Eric, Bethan, and Sophie dive into the challenges facing talent management in national security, overcoming the DoD's aversion to innovative risk-taking, and why the DoD still doesn't have central cloud computing.</p><p>Eric Rosenbach Bio: <a href="https://www.hks.harvard.edu/faculty/eric-rosenbach">https://www.hks.harvard.edu/faculty/eric-rosenbach</a></p><p>https://www.dds.mil/about</p><p>https://www.defense.gov/News/News-Stories/Article/Article/2327021/diu-making-transformative-impact-five-years-in/</p>
]]></description>
      <pubDate>Wed, 6 Jul 2022 11:05:00 +0000</pubDate>
      <author>belfercenter@gmail.com (Eric Rosenbach, Bethan Saunders, Sophie Faaborg-Andersen)</author>
      <link>https://cyber-rar.simplecast.com/episodes/expert-interview-defense-innovation-walk-before-you-run-DqlmWxHn</link>
      <content:encoded><![CDATA[<p>Eric Rosenbach, Co-Director of the Belfer Center and Former Chief of Staff of the Pentagon, joins Cyber.RAR to talk about the major roadblocks facing innovation within the Department of Defense. Eric, Bethan, and Sophie dive into the challenges facing talent management in national security, overcoming the DoD's aversion to innovative risk-taking, and why the DoD still doesn't have central cloud computing.</p><p>Eric Rosenbach Bio: <a href="https://www.hks.harvard.edu/faculty/eric-rosenbach">https://www.hks.harvard.edu/faculty/eric-rosenbach</a></p><p>https://www.dds.mil/about</p><p>https://www.defense.gov/News/News-Stories/Article/Article/2327021/diu-making-transformative-impact-five-years-in/</p>
]]></content:encoded>
      <enclosure length="29207176" type="audio/mpeg" url="https://cdn.simplecast.com/audio/66718cf8-0c42-42bf-aea1-8c54e5ace017/episodes/a29fd8fc-1c2d-4c23-b252-b7b58616310a/audio/b7734d64-16c1-40f5-939f-3dcc5c169fce/default_tc.mp3?aid=rss_feed&amp;feed=Z7I7LeKR"/>
      <itunes:title>Expert Interview: Defense Innovation? Walk Before You Run</itunes:title>
      <itunes:author>Eric Rosenbach, Bethan Saunders, Sophie Faaborg-Andersen</itunes:author>
      <itunes:duration>00:30:25</itunes:duration>
      <itunes:summary>Eric Rosenbach, Co-Director of the Belfer Center and Former Chief of Staff of the Pentagon, joins Cyber.RAR to talk about the major roadblocks facing innovation within the Department of Defense. Eric, Bethan, and Sophie dive into the challenges facing talent management in national security, overcoming the DoD&apos;s aversion to innovative risk-taking, and why the DoD still doesn&apos;t have central cloud computing.</itunes:summary>
      <itunes:subtitle>Eric Rosenbach, Co-Director of the Belfer Center and Former Chief of Staff of the Pentagon, joins Cyber.RAR to talk about the major roadblocks facing innovation within the Department of Defense. Eric, Bethan, and Sophie dive into the challenges facing talent management in national security, overcoming the DoD&apos;s aversion to innovative risk-taking, and why the DoD still doesn&apos;t have central cloud computing.</itunes:subtitle>
      <itunes:keywords>tech, defense, dod, army, defense department, technology, national security, military, department of defense, innovation</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>9</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">692a19f9-ffc7-4db9-b0a2-90b92f9ae759</guid>
      <title>Defense Innovation? Walk Before You Run</title>
      <description><![CDATA[<p>Bethan and Sophie explore why it's so hard to get innovative digital technologies into the Defese Department. The discussion starts with JEDI (and no, not from Star Wars) and covers the challenges facing the defense innovation ecosystem and how a new aqusitions playbook is needed for software and cyber capabilities. Grace shares their experience working with technology as an Army Signal Officer and Winnona asks some tough questions about the DoD procurement and contracting process. Get ready for a few Star Wars puns! </p><p>https://aida.mitre.org/dod-innovation-ecosystem/</p><p>https://www.diu.mil/about https://innovation.defense.gov/ </p><p>https://techcrunch.com/2021/11/19/pentagon-announces-new-cloud-initiative-to-replace-ill-fated-jedi-contract/ </p><p>https://www.nationaldefensemagazine.org/articles/2022/1/26/silicon-valley-takes-on-the-valley-of-death </p><p>https://www.fedscoop.com/list/7-cloud-programs-leading-the-way-in-government/</p><p>https://dl.dod.cyber.mil/wp-content/uploads/dces/pdf/GeneralCESFAQs.pdf https://aida.mitre.org/ota/ <br /><br /> </p>
]]></description>
      <pubDate>Wed, 6 Jul 2022 11:00:00 +0000</pubDate>
      <author>belfercenter@gmail.com (Bethan Saunders, Winnona DeSombre, Danielle Levin, Sophie Faaborg-Andersen, Grace Park, Michaela Lee)</author>
      <link>https://cyber-rar.simplecast.com/episodes/defense-innovation-walk-before-you-run-JNumTgX4</link>
      <content:encoded><![CDATA[<p>Bethan and Sophie explore why it's so hard to get innovative digital technologies into the Defese Department. The discussion starts with JEDI (and no, not from Star Wars) and covers the challenges facing the defense innovation ecosystem and how a new aqusitions playbook is needed for software and cyber capabilities. Grace shares their experience working with technology as an Army Signal Officer and Winnona asks some tough questions about the DoD procurement and contracting process. Get ready for a few Star Wars puns! </p><p>https://aida.mitre.org/dod-innovation-ecosystem/</p><p>https://www.diu.mil/about https://innovation.defense.gov/ </p><p>https://techcrunch.com/2021/11/19/pentagon-announces-new-cloud-initiative-to-replace-ill-fated-jedi-contract/ </p><p>https://www.nationaldefensemagazine.org/articles/2022/1/26/silicon-valley-takes-on-the-valley-of-death </p><p>https://www.fedscoop.com/list/7-cloud-programs-leading-the-way-in-government/</p><p>https://dl.dod.cyber.mil/wp-content/uploads/dces/pdf/GeneralCESFAQs.pdf https://aida.mitre.org/ota/ <br /><br /> </p>
]]></content:encoded>
      <enclosure length="30741645" type="audio/mpeg" url="https://cdn.simplecast.com/audio/66718cf8-0c42-42bf-aea1-8c54e5ace017/episodes/0237bf61-7297-4460-bc89-448f01672b0e/audio/4614b408-06b1-4412-af4f-5790b803520f/default_tc.mp3?aid=rss_feed&amp;feed=Z7I7LeKR"/>
      <itunes:title>Defense Innovation? Walk Before You Run</itunes:title>
      <itunes:author>Bethan Saunders, Winnona DeSombre, Danielle Levin, Sophie Faaborg-Andersen, Grace Park, Michaela Lee</itunes:author>
      <itunes:duration>00:32:01</itunes:duration>
      <itunes:summary>Bethan and Sophie explore why it&apos;s so hard to get innovative digital technologies into the Defese Department. The discussion starts with JEDI (and no, not from Star Wars) and covers the challenges facing the defense innovation ecosystem and how a new aqusitions playbook is needed for software and cyber capabilities. Grace shares their experience working with technology as an Army Signal Officer and Winnona asks some tough questions about the DoD procurement and contracting process. Get ready for a few Star Wars puns! </itunes:summary>
      <itunes:subtitle>Bethan and Sophie explore why it&apos;s so hard to get innovative digital technologies into the Defese Department. The discussion starts with JEDI (and no, not from Star Wars) and covers the challenges facing the defense innovation ecosystem and how a new aqusitions playbook is needed for software and cyber capabilities. Grace shares their experience working with technology as an Army Signal Officer and Winnona asks some tough questions about the DoD procurement and contracting process. Get ready for a few Star Wars puns! </itunes:subtitle>
      <itunes:keywords>united states, u.s., cyber, procurement, defense, contract, dod, software, army, defense department, technology, military, innovation</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>8</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">63b9f696-4368-4442-8398-f24d1aba3614</guid>
      <title>Expert Interviews: Hacktivism</title>
      <description><![CDATA[<p>Grace continues the conversation on so-called hacktivism and the future landscape of cyber activism with Bruce Schneier, author of the book 'Data and Goliath,' and fellow and lecturer at Harvard Kennedy School.</p><p>Bruce Schneier website and bio: https://www.schneier.com/</p>
]]></description>
      <pubDate>Wed, 29 Jun 2022 11:05:00 +0000</pubDate>
      <author>belfercenter@gmail.com (Bruce Schneier, Grace Park)</author>
      <link>https://cyber-rar.simplecast.com/episodes/expert-interviews-hacktivism-nShbZSNc</link>
      <content:encoded><![CDATA[<p>Grace continues the conversation on so-called hacktivism and the future landscape of cyber activism with Bruce Schneier, author of the book 'Data and Goliath,' and fellow and lecturer at Harvard Kennedy School.</p><p>Bruce Schneier website and bio: https://www.schneier.com/</p>
]]></content:encoded>
      <enclosure length="25642291" type="audio/mpeg" url="https://cdn.simplecast.com/audio/66718cf8-0c42-42bf-aea1-8c54e5ace017/episodes/e254ce5d-6731-48b3-ba5b-ed45ab2ef1df/audio/0e642419-69d8-4af2-8563-98f7335a5fc2/default_tc.mp3?aid=rss_feed&amp;feed=Z7I7LeKR"/>
      <itunes:title>Expert Interviews: Hacktivism</itunes:title>
      <itunes:author>Bruce Schneier, Grace Park</itunes:author>
      <itunes:duration>00:26:42</itunes:duration>
      <itunes:summary>Grace continues the conversation on so-called hacktivism and the future landscape of cyber activism with Bruce Schneier, author of the book &apos;Data and Goliath,&apos; and fellow and lecturer at Harvard Kennedy School.</itunes:summary>
      <itunes:subtitle>Grace continues the conversation on so-called hacktivism and the future landscape of cyber activism with Bruce Schneier, author of the book &apos;Data and Goliath,&apos; and fellow and lecturer at Harvard Kennedy School.</itunes:subtitle>
      <itunes:keywords>cyber, political hacking, cyber activism, activism, hacktivism</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>7</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">08e7ca8d-3fc6-436c-a1ed-78c085d9a56d</guid>
      <title>The Chaos of Political Hacking</title>
      <description><![CDATA[<p>Grace asks the question: Political Hacktivism (Hacking + Activism), chaotic good or chaotic evil? What even counts as activism versus terrorism in cyberspace? Is it simply ideological or is it normative? And looking forward, what does the second rise of hacktivism mean for the global order? </p>
]]></description>
      <pubDate>Wed, 29 Jun 2022 11:00:00 +0000</pubDate>
      <author>belfercenter@gmail.com (Sophie Faaborg-Andersen, Danielle Levin, Michaela Lee, Winnona DeSombre, Bethan Saunders, Grace Park)</author>
      <link>https://cyber-rar.simplecast.com/episodes/the-chaos-of-political-hacking-mqulw9WX</link>
      <content:encoded><![CDATA[<p>Grace asks the question: Political Hacktivism (Hacking + Activism), chaotic good or chaotic evil? What even counts as activism versus terrorism in cyberspace? Is it simply ideological or is it normative? And looking forward, what does the second rise of hacktivism mean for the global order? </p>
]]></content:encoded>
      <enclosure length="32424547" type="audio/mpeg" url="https://cdn.simplecast.com/audio/66718cf8-0c42-42bf-aea1-8c54e5ace017/episodes/a9c11ff5-0f2f-451a-9322-54c5bf2ae068/audio/c4714c6f-d69e-42fa-ad70-e6b4129f2a03/default_tc.mp3?aid=rss_feed&amp;feed=Z7I7LeKR"/>
      <itunes:title>The Chaos of Political Hacking</itunes:title>
      <itunes:author>Sophie Faaborg-Andersen, Danielle Levin, Michaela Lee, Winnona DeSombre, Bethan Saunders, Grace Park</itunes:author>
      <itunes:duration>00:33:46</itunes:duration>
      <itunes:summary>Grace asks the question: Political Hacktivism (Hacking + Activism), chaotic good or chaotic evil? What even counts as activism versus terrorism in cyberspace? Is it simply ideological or is it normative? And looking forward, what does the second rise of hacktivism mean for the global order? </itunes:summary>
      <itunes:subtitle>Grace asks the question: Political Hacktivism (Hacking + Activism), chaotic good or chaotic evil? What even counts as activism versus terrorism in cyberspace? Is it simply ideological or is it normative? And looking forward, what does the second rise of hacktivism mean for the global order? </itunes:subtitle>
      <itunes:keywords>cyber, political hacking, hacking, activism, hacktivism</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">35ab8ac9-73b6-4aa6-8e41-cbc530f09cc4</guid>
      <title>Expert Interviews: Cyber Mercenaries</title>
      <description><![CDATA[<p>Winnona continues her exploration of cyber mercenaries by interviewing three experts: Sophia D'Antoine & Dave Aitel, two professionals in the offensive security industry, and Sean McFate - an expert on private military contractors.</p><p>Cyber policy papers: <a href="https://docs.google.com/spreadsheets/d/1pnISykZe1nn1wwWBJRiaxYaqDoj4ADeBtsoUL41Hw2Y/edit?usp=drive_web&ouid=116612216017356103570">https://docs.google.com/spreadsheets/d/1pnISykZe1nn1wwWBJRiaxYaqDoj4ADeBtsoUL41Hw2Y/edit?usp=drive_web&ouid=116612216017356103570</a></p><p>The Modern Mercenary: https://www.amazon.com/Modern-Mercenary-Private-Armies-World/dp/0199360103</p>
]]></description>
      <pubDate>Wed, 22 Jun 2022 11:05:00 +0000</pubDate>
      <author>belfercenter@gmail.com (Winnona DeSombre, Sophia D&apos;Antoine, Dave Aitel, Sean McFate)</author>
      <link>https://cyber-rar.simplecast.com/episodes/expert-interviews-cyber-mercenaries-52fK10qS</link>
      <content:encoded><![CDATA[<p>Winnona continues her exploration of cyber mercenaries by interviewing three experts: Sophia D'Antoine & Dave Aitel, two professionals in the offensive security industry, and Sean McFate - an expert on private military contractors.</p><p>Cyber policy papers: <a href="https://docs.google.com/spreadsheets/d/1pnISykZe1nn1wwWBJRiaxYaqDoj4ADeBtsoUL41Hw2Y/edit?usp=drive_web&ouid=116612216017356103570">https://docs.google.com/spreadsheets/d/1pnISykZe1nn1wwWBJRiaxYaqDoj4ADeBtsoUL41Hw2Y/edit?usp=drive_web&ouid=116612216017356103570</a></p><p>The Modern Mercenary: https://www.amazon.com/Modern-Mercenary-Private-Armies-World/dp/0199360103</p>
]]></content:encoded>
      <enclosure length="48767306" type="audio/mpeg" url="https://cdn.simplecast.com/audio/66718cf8-0c42-42bf-aea1-8c54e5ace017/episodes/ef4bc239-9312-4ce5-98f6-fd8e84760a28/audio/f77379f9-bce7-4d0c-afe6-51fbff143238/default_tc.mp3?aid=rss_feed&amp;feed=Z7I7LeKR"/>
      <itunes:title>Expert Interviews: Cyber Mercenaries</itunes:title>
      <itunes:author>Winnona DeSombre, Sophia D&apos;Antoine, Dave Aitel, Sean McFate</itunes:author>
      <itunes:duration>00:50:47</itunes:duration>
      <itunes:summary>Winnona continues her exploration of cyber mercenaries by interviewing three experts: Sophia D&apos;Antoine &amp; Dave Aitel, two professionals in the offensive security industry, and Sean McFate - an expert on private military contractors.</itunes:summary>
      <itunes:subtitle>Winnona continues her exploration of cyber mercenaries by interviewing three experts: Sophia D&apos;Antoine &amp; Dave Aitel, two professionals in the offensive security industry, and Sean McFate - an expert on private military contractors.</itunes:subtitle>
      <itunes:keywords>cyber capabilities, offensive security, mercenaries, hack for hire, cyber policy, vulnerability research</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0a2e5b98-bb8b-49ed-b04a-06f93d01c0ca</guid>
      <title>A Tangled Web: Cyber Mercenaries</title>
      <description><![CDATA[<p>Winnona asks: how does one regulate an industry that operates so far in the shadows? This is a major problem in the hack for hire industry, and something we’re going to try and tackle on our podcast episode today on Cyber.RAR. We will be looking at what it looks like to be selling hacking capabilities to governments, what the nuances within the space are, and what concerning trade-offs we’re making that governments may not understand but industry does.</p><p>Show Notes: NSO: https://www.zdnet.com/article/commerce-dept-sanctions-nso-group-positive-technologies-and-more-for-selling-spyware-and-hacking-tools/</p><p>https://www.apple.com/newsroom/2021/11/apple-sues-nso-group-to-curb-the-abuse-of-state-sponsored-spyware/ </p><p>https://www.theverge.com/2021/12/21/22848485/pegasus-spyware-jamal-khashoggi-murder-nso-hanan-elatr-new-analysis </p><p>https://citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/</p><p>https://www.theguardian.com/us-news/2021/nov/08/nso-israeli-spyware-company-whatsapp-lawsuit-ruling </p><p>https://www.wired.com/story/nso-group-forcedentry-pegasus-spyware-analysis/</p><p>https://citizenlab.ca/2018/11/mexican-journalists-investigating-cartels-targeted-nso-spyware-following-assassination-colleague/ </p><p>Offensive Cyber Capabilities https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/a-primer-on-the-proliferation-of-offensive-cyber-capabilities/ Coseinc: <a href="https://risky.biz/RB310/">https://risky.biz/RB310/</a></p>
]]></description>
      <pubDate>Wed, 22 Jun 2022 11:00:00 +0000</pubDate>
      <author>belfercenter@gmail.com (Winnona DeSombre, Bethan Saunders, Michaela Lee, Sophie Faaborg-Andersen, Danielle Levin, Grace Park)</author>
      <link>https://cyber-rar.simplecast.com/episodes/a-tangled-web-cyber-mercenaries-lM_0fZLo</link>
      <content:encoded><![CDATA[<p>Winnona asks: how does one regulate an industry that operates so far in the shadows? This is a major problem in the hack for hire industry, and something we’re going to try and tackle on our podcast episode today on Cyber.RAR. We will be looking at what it looks like to be selling hacking capabilities to governments, what the nuances within the space are, and what concerning trade-offs we’re making that governments may not understand but industry does.</p><p>Show Notes: NSO: https://www.zdnet.com/article/commerce-dept-sanctions-nso-group-positive-technologies-and-more-for-selling-spyware-and-hacking-tools/</p><p>https://www.apple.com/newsroom/2021/11/apple-sues-nso-group-to-curb-the-abuse-of-state-sponsored-spyware/ </p><p>https://www.theverge.com/2021/12/21/22848485/pegasus-spyware-jamal-khashoggi-murder-nso-hanan-elatr-new-analysis </p><p>https://citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/</p><p>https://www.theguardian.com/us-news/2021/nov/08/nso-israeli-spyware-company-whatsapp-lawsuit-ruling </p><p>https://www.wired.com/story/nso-group-forcedentry-pegasus-spyware-analysis/</p><p>https://citizenlab.ca/2018/11/mexican-journalists-investigating-cartels-targeted-nso-spyware-following-assassination-colleague/ </p><p>Offensive Cyber Capabilities https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/a-primer-on-the-proliferation-of-offensive-cyber-capabilities/ Coseinc: <a href="https://risky.biz/RB310/">https://risky.biz/RB310/</a></p>
]]></content:encoded>
      <enclosure length="30053976" type="audio/mpeg" url="https://cdn.simplecast.com/audio/66718cf8-0c42-42bf-aea1-8c54e5ace017/episodes/2cfc9449-e1b2-4d8d-a700-dcff18f1827d/audio/8097b188-4586-4280-a77d-bac5653cc925/default_tc.mp3?aid=rss_feed&amp;feed=Z7I7LeKR"/>
      <itunes:title>A Tangled Web: Cyber Mercenaries</itunes:title>
      <itunes:author>Winnona DeSombre, Bethan Saunders, Michaela Lee, Sophie Faaborg-Andersen, Danielle Levin, Grace Park</itunes:author>
      <itunes:duration>00:31:18</itunes:duration>
      <itunes:summary>Winnona asks: how does one regulate an industry that operates so far in the shadows? This is a major problem in the hack for hire industry, and something we’re going to try and tackle on our podcast episode today on Cyber.rar. We will be looking at what it looks like to be selling hacking capabilities to governments, what the nuances within the space are, and what concerning trade-offs we’re making that governments may not understand but industry does.</itunes:summary>
      <itunes:subtitle>Winnona asks: how does one regulate an industry that operates so far in the shadows? This is a major problem in the hack for hire industry, and something we’re going to try and tackle on our podcast episode today on Cyber.rar. We will be looking at what it looks like to be selling hacking capabilities to governments, what the nuances within the space are, and what concerning trade-offs we’re making that governments may not understand but industry does.</itunes:subtitle>
      <itunes:keywords>cyber capabilities, offensive security, mercenaries, hack for hire, cyber policy, vulnerability research</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ac649365-2e43-4655-8726-86cab34157b4</guid>
      <title>Rose/Bud/Thorn: Cyberwar in Ukraine</title>
      <description><![CDATA[<p>Dani asks: how does cyber fit into modern warfare strategies? How have cyber strategies evolved in the last two decades, what can we learn from the uses of cyber capabilities in Russia's invasion of Ukraine, and how should the U.S. evolve its cyberwarfare strategy going forward? We will be exploring myths of cyberwarfare strategy - like the escalation of cyber offense into kinetic warfare - and examining where and why cyberwarfare has been effective or ineffective.</p><p>History of Russian Cyber Strategy: <a href="https://www.boozallen.com/c/insight/publication/the-logic-behind-russian-military-cyber-operations.html">https://www.boozallen.com/c/insight/publication/the-logic-behind-russian-military-cyber-operations.html</a></p>
]]></description>
      <pubDate>Wed, 15 Jun 2022 12:00:00 +0000</pubDate>
      <author>belfercenter@gmail.com (Danielle Levin)</author>
      <link>https://cyber-rar.simplecast.com/episodes/11-rose-bud-thorn-cyberwar-in-ukraine-iCjEmDLK</link>
      <content:encoded><![CDATA[<p>Dani asks: how does cyber fit into modern warfare strategies? How have cyber strategies evolved in the last two decades, what can we learn from the uses of cyber capabilities in Russia's invasion of Ukraine, and how should the U.S. evolve its cyberwarfare strategy going forward? We will be exploring myths of cyberwarfare strategy - like the escalation of cyber offense into kinetic warfare - and examining where and why cyberwarfare has been effective or ineffective.</p><p>History of Russian Cyber Strategy: <a href="https://www.boozallen.com/c/insight/publication/the-logic-behind-russian-military-cyber-operations.html">https://www.boozallen.com/c/insight/publication/the-logic-behind-russian-military-cyber-operations.html</a></p>
]]></content:encoded>
      <enclosure length="27192392" type="audio/mpeg" url="https://cdn.simplecast.com/audio/66718cf8-0c42-42bf-aea1-8c54e5ace017/episodes/ea83d28c-c815-4d13-bada-e67166b3254f/audio/3378ead2-db74-46b4-aabc-8e5672105129/default_tc.mp3?aid=rss_feed&amp;feed=Z7I7LeKR"/>
      <itunes:title>Rose/Bud/Thorn: Cyberwar in Ukraine</itunes:title>
      <itunes:author>Danielle Levin</itunes:author>
      <itunes:duration>00:28:19</itunes:duration>
      <itunes:summary>Dani asks: how does cyber fit into modern warfare strategies? How have cyber strategies evolved in the last two decades, what can we learn from the uses of cyber capabilities in Russia&apos;s invasion of Ukraine, and how should the U.S. evolve its cyberwarfare strategy going forward? We will be exploring myths of cyberwarfare strategy - like the escalation of cyber offense into kinetic warfare - and examining where and why cyberwarfare has been effective or ineffective.</itunes:summary>
      <itunes:subtitle>Dani asks: how does cyber fit into modern warfare strategies? How have cyber strategies evolved in the last two decades, what can we learn from the uses of cyber capabilities in Russia&apos;s invasion of Ukraine, and how should the U.S. evolve its cyberwarfare strategy going forward? We will be exploring myths of cyberwarfare strategy - like the escalation of cyber offense into kinetic warfare - and examining where and why cyberwarfare has been effective or ineffective.</itunes:subtitle>
      <itunes:keywords>cyber strategy, cyber war, cyber policy, russia ukraine conflict</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5b3fab62-1be4-4cdd-9562-9cfe4dbdef69</guid>
      <title>Expert Interviews: Cyberwar</title>
      <description><![CDATA[<p>Dani explores the cyber escalation fallacy and the evolution of cyberwarfare strategies with Erica Lonergan, Assistant Professor in the Army Cyber Institute, Research Scholar at the Saltzman Institute of War and Peace Studies and former Senior Director on the U.S. Cyberspace Solarium Commission.</p><p>Cyber Escalation Fallacy: <a href="https://www.foreignaffairs.com/articles/russian-federation/2022-04-15/cyber-escalation-fallacy">https://www.foreignaffairs.com/articles/russian-federation/2022-04-15/cyber-escalation-fa</a>llacy</p><p>History of Russian Cyber Strategy:<a href="https://www.boozallen.com/c/insight/publication/the-logic-behind-russian-military-cyber-operations.html"> https://www.boozallen.com/c/insight/publication/the-logic-behind-russian-military-cyber-operations.htm</a>l</p>
]]></description>
      <pubDate>Wed, 15 Jun 2022 12:00:00 +0000</pubDate>
      <author>belfercenter@gmail.com (Danielle Levin, Erica Lonergan)</author>
      <link>https://cyber-rar.simplecast.com/episodes/12-expert-interviews-cyberwar-fFr4jFjh</link>
      <content:encoded><![CDATA[<p>Dani explores the cyber escalation fallacy and the evolution of cyberwarfare strategies with Erica Lonergan, Assistant Professor in the Army Cyber Institute, Research Scholar at the Saltzman Institute of War and Peace Studies and former Senior Director on the U.S. Cyberspace Solarium Commission.</p><p>Cyber Escalation Fallacy: <a href="https://www.foreignaffairs.com/articles/russian-federation/2022-04-15/cyber-escalation-fallacy">https://www.foreignaffairs.com/articles/russian-federation/2022-04-15/cyber-escalation-fa</a>llacy</p><p>History of Russian Cyber Strategy:<a href="https://www.boozallen.com/c/insight/publication/the-logic-behind-russian-military-cyber-operations.html"> https://www.boozallen.com/c/insight/publication/the-logic-behind-russian-military-cyber-operations.htm</a>l</p>
]]></content:encoded>
      <enclosure length="42882781" type="audio/mpeg" url="https://cdn.simplecast.com/audio/66718cf8-0c42-42bf-aea1-8c54e5ace017/episodes/e15f522b-69d9-4b11-b2bd-01da18a6d054/audio/f86d108f-b940-4996-aef4-df4ee11693a0/default_tc.mp3?aid=rss_feed&amp;feed=Z7I7LeKR"/>
      <itunes:title>Expert Interviews: Cyberwar</itunes:title>
      <itunes:author>Danielle Levin, Erica Lonergan</itunes:author>
      <itunes:duration>00:44:40</itunes:duration>
      <itunes:summary>Dani explores the cyber escalation fallacy and the evolution of cyberwarfare strategies with Erica Lonergan, Assistant Professor in the Army Cyber Institute, Research Scholar at the Saltzman Institute of War and Peace Studies and former Senior Director on the U.S. Cyberspace Solarium Commission.</itunes:summary>
      <itunes:subtitle>Dani explores the cyber escalation fallacy and the evolution of cyberwarfare strategies with Erica Lonergan, Assistant Professor in the Army Cyber Institute, Research Scholar at the Saltzman Institute of War and Peace Studies and former Senior Director on the U.S. Cyberspace Solarium Commission.</itunes:subtitle>
      <itunes:keywords>cyber strategy, cyber war, cyber policy, russia ukraine conflict</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">220a6f90-df07-4471-a6dd-46f965ce7ce3</guid>
      <title>Welcome to Cyber.RAR!</title>
      <description><![CDATA[<p>Meet Michaela, Grace, Winnona, Bethan, Sophie, and Danielle and hear why they came together to record a limited podcast series on cyber policy issues. They dive into some nuances and laugh with each other throughout the process. Hope you enjoy!</p><p>Harvard Reading and Research Credits <a href="https://www.hks.harvard.edu/educational-programs/courses/course-registration">https://www.hks.harvard.edu/educational-programs/courses/course-registration</a></p>
]]></description>
      <pubDate>Tue, 14 Jun 2022 16:48:01 +0000</pubDate>
      <author>belfercenter@gmail.com (Sophie Faaborg-Andersen, Winnona DeSombre, Bethan Saunders, Michaela Lee, Danielle Levin, Grace Park)</author>
      <link>https://cyber-rar.simplecast.com/episodes/welcome-to-cyberrar-8j_nOu7_</link>
      <content:encoded><![CDATA[<p>Meet Michaela, Grace, Winnona, Bethan, Sophie, and Danielle and hear why they came together to record a limited podcast series on cyber policy issues. They dive into some nuances and laugh with each other throughout the process. Hope you enjoy!</p><p>Harvard Reading and Research Credits <a href="https://www.hks.harvard.edu/educational-programs/courses/course-registration">https://www.hks.harvard.edu/educational-programs/courses/course-registration</a></p>
]]></content:encoded>
      <enclosure length="6110361" type="audio/mpeg" url="https://cdn.simplecast.com/audio/66718cf8-0c42-42bf-aea1-8c54e5ace017/episodes/3a6ce38c-e928-45ad-b369-31662fd6bf23/audio/f4ee1494-f75c-46cf-a211-8d059b249f9e/default_tc.mp3?aid=rss_feed&amp;feed=Z7I7LeKR"/>
      <itunes:title>Welcome to Cyber.RAR!</itunes:title>
      <itunes:author>Sophie Faaborg-Andersen, Winnona DeSombre, Bethan Saunders, Michaela Lee, Danielle Levin, Grace Park</itunes:author>
      <itunes:duration>00:06:21</itunes:duration>
      <itunes:summary>Meet Michaela, Grace, Winnona, Bethan, Sophie, and Danielle and hear why they came together to record a limited podcast series on cyber policy issues. They dive into some nuances and laugh with each other throughout the process. Hope you enjoy!</itunes:summary>
      <itunes:subtitle>Meet Michaela, Grace, Winnona, Bethan, Sophie, and Danielle and hear why they came together to record a limited podcast series on cyber policy issues. They dive into some nuances and laugh with each other throughout the process. Hope you enjoy!</itunes:subtitle>
      <itunes:keywords>harvard kennedy school, cyber, hks, cybersecurity, belfer center, students, harvard</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
    </item>
  </channel>
</rss>