International Security & Defense

192 Items

tenth grader attending a class how to investigate a computer network that has been hacked in Beit Shemesh, Israel.

AP

Journal Article - Cyber, Intelligence, and Security

Four Big "Ds" and a Little "r": A New Model for Cyber Defense

| June 2017

This article argues that cyberthreats are not fundamentally different from other asymmetric threats, and it provides a conceptual model for developing a response by drawing on classic principles of military strategy, the "four Ds"— Detection, Deterrence, Defense, and Defeat—as well as resilience (the little "r"). The authors offer a model for how countries can create policies addressing each of these principles that will enhance the security of national cyber systems.

Paper - Cyber Security Project, Belfer Center

Too Connected to Fail

| May 2017

This paper argues that threats to core internet infrastructure and services can, in fact, rise to the level of a serious national security threat to the United States and will explore scenarios where this may be the case. The paper will discuss several kinds of core internet services and infrastructure and explore the challenges with understanding interdependencies between the internet and critical infrastructure; review recent attack techniques that can cause systemic risk to the internet; discuss various nation state capabilities, intentions and recent activities in this area; and describe how these attacks could be used against the United States to deter the U.S., control escalation, or potentially degrade U.S. warfighting capabilities in a conflict. Finally, the paper concludes with recommendations for what the United States and other governments can do to build defenses and resiliency against systemic threats to the internet.

University of Michigan Journal of Law Reform

University of Michigan Journal of Law Reform

Journal Article - University of Michigan Journal of Law Reform

Making Democracy Harder to Hack

| Spring 2017 (Volume 50, Issue 3)

With the Russian government hack of the Democratic National Convention email servers and related leaks, the drama of the 2016 U.S. presidential race highlights an important point: nefarious hackers do not just pose a risk to vulnerable companies; cyber attacks can potentially impact the trajectory of democracies.

Cluver, Chaudhry and Najam

Benn Craig/Belfer Center

News - India and South Asia Project

Ambassador of Pakistan to the US: "Now is the ideal time to reset relations."

| Apr. 27, 2017

Two days after presenting his credentials to President Trump, His Excellency Aizaz Ahmad Chaudhry, the newly appointed Ambassador of Pakistan to the United States, expressed optimism about bilateral relations between the two countries. Respondent Adil Najam, Dean of the Frederick S. Pardee School of Global Studies at Boston University, was more cautious in his assessment of the relationship after years of "reset."

Paper - Centre for International Governance Innovation

Getting beyond Norms: When Violating the Agreement Becomes Customary Practice

| Apr. 20, 2017

This paper offers five standards of care that can be used to test individual states' true commitment to the international norms of behaviour. Only with a concerted and coordinated effort across the global community will it be possible to change the new normal of "anything goes" and move forward to ensure the future safety and security of the Internet and Internet-based infrastructures.

Analysis & Opinions - The Conversation

Should Cybersecurity Be A Human Right?

| Feb. 13, 2017

As people use online services more in their daily lives, their expectations of digital privacy and freedom of expression will lead them to demand better protections... Now is the time for businesses, governments and individuals to prepare for this development by incorporating cybersecurity as a fundamental ethical consideration in telecommunications, data storage, corporate social responsibility and enterprise risk management.