248 Items

teaser image

Report - Centre for International Governance Innovation

Getting beyond Norms: New Approaches to International Cyber Security Challenges

| Sep. 07, 2017

In March 2017, CIGI and the Belfer Center for Science and International Affairs at the Harvard Kennedy School brought together 28 academics, diplomats and other specialists for a one-day workshop in Cambridge, Massachusetts, to discuss and search for effective approaches to these and other international cyber security challenges. These essays provide a report on that workshop and the ideas that emerged.

Engima machine

Wikimedia

Paper - Hoover Institution Press

Nobody But Us

| Aug. 30, 2017

In the modern era, there is great convergence in the technologies used by friendly nations and by hostile ones. Signals intelligence agencies find themselves penetrating the technologies that they also at times must protect. To ease this tension, the United States and its partners have relied on an approach sometimes called Nobody But Us, or NOBUS: target communications mechanisms using unique methods accessible only to the United States. This paper examines how the NOBUS approach works, its limits, and the challenging matter of what comes next.

Analysis & Opinions - The Cipher Brief

The Making of a Cyber Diplomat

| Aug. 23, 2017

Cyber diplomacy thus far has been a careful balance of promoting both the U.S.’s interests and values in cyberspace. Obvious as it may sound, we think that the next step for the Trump Administration should be to consider and then explain the interests and values it wants to pursue. Although anything is possible, they may well come out similar to past Republican and Democrat administrations. But now is the time to turn ambiguity into clarity and to ensure we continue to channel our considerable diplomatic heft towards the pursuit of core interests and values.

Paper - Cyber Security Project, Belfer Center

A Legislator's Guide to Reauthorizing Section 702

| Aug. 20, 2017

Section 702 of the Foreign Intelligence Surveillance Act (FISA) Amendments Act of 2008, a powerful surveillance tool that allows U.S. government agencies to spy on foreign persons to collect counter-terrorism intelligence, will expire on December 31, 2017 without Congressional reauthorization. This paper has two goals: to concisely describe how agencies obtain information under Section 702, and to provide guidance to legislators and their staffers by examining the core issues they will confront as they consider reauthorizing this legislation.

Marina Kaljurand

AP

Analysis & Opinions - Project Syndicate

Controlling Cyber Conflict

| Aug. 08, 2017

"While cyber and nuclear technologies are vastly different, the process by which society learns to cope with a highly disruptive technology shows instructive similarities. It took states about two decades to reach the first cooperative agreements in the nuclear era. If one dates the cyber-security problem not from the beginning of the Internet in the 1970s, but from the late 1990s, when burgeoning participation made the Internet the substrate for economic and military interdependence (and thus increased our vulnerability), cooperation is now at about the two-decade mark."