Governance

11 Items

Book Chapter - Oxford University Press

Israel's National Security Policy

| 2019

This article presents both the fundamental changes that have taken place in Israel's strategic environment, from conventional, state-based threats to primarily asymmetrical ones, and the responses it has developed to date. It also addresses Israel's relations with the United States and other primary international actors, as well as Israel's nuclear and regional arms control policy.

teaser image

Journal Article - Journal of Conflict Resolution

Invisible Digital Front

| Nov. 10, 2017

Recent years have seen growing concern over the use of cyber attacks in wartime, but little evidence that these new tools of coercion can change battlefield events. We present the first quantitative analysis of the relationship between cyber activities and physical violence during war. Using new event data from the armed conflict in Ukraine—and additional data from Syria’s civil war—we analyze the dynamics of cyber attacks and find that such activities have had little or no impact on fighting.

Israeli Prime Minister Benjamin Netanyahu gives the opening speech of the 'CyberTech 2014' international conference on January 27, 2014 in Tel-Aviv.

Getty Images

Announcement - Belfer Center for Science and International Affairs, Harvard Kennedy School

Study Group with Dan Meridor on Israel's Defense in the Changing Middle East

October 5, 2015

Join Dan Meridor, former Chairman of the Foreign Affairs and Defense Committee of the Knesset, former Chairman of the committee which wrote the report on the Israel Defense Doctrine, and former Minister of Intelligence and Atomic Energy, for a three-session study group on Israel's Defense in the Changing Middle East in November.

Analysis & Opinions - The Huffington Post

Is Cybersecurity Like Arms Control?

| May 18, 2015

"In little more than a generation, the Internet has become the substrate of the global economy and governance worldwide. Several billion more human users will be added in the next decade, as will tens of billions of devices, ranging from thermostats to industrial control systems (the 'Internet of Things'). All of this burgeoning interdependence implies vulnerabilities that governments and non-governmental actors can exploit. At the same time, we are only beginning to come to terms with the national-security implications of this. Strategic studies of the cyber domain resemble nuclear strategy in the 1950s: analysts are still not clear about the meaning of offense, defense, deterrence, escalation, norms, and arms control."

Analysis & Opinions - The Australian

The Information Revolution Gets Political

| February 11, 2013

"Beneath the Arab political revolutions lies a deeper and longer process of radical change that is sometimes called the information revolution. We cannot yet fully grasp its implications, but it is fundamentally transforming the nature of power in the twenty-first century, in which all states exist in an environment that even the most powerful authorities cannot control as they did in the past."

Presentation

Cyber Disorders: Rivalry and Conflict in a Global Information Age

| May 3, 2012

The risks posed by the proliferation of cyber weapons are gaining wide recognition among security planners. Yet the general reaction of scholars of international relations has been to neglect the cyber peril owing to its technical novelties and intricacies. This attitude amounts to either one or both of two claims: the problem is not of sufficient scale to warrant close inspection, or it is not comprehensible to a non-technical observer. This seminar challenged both assertions.

A security guard, right, stands at the entrance of El Al sales offices in Tel Aviv, Israel, Jan. 16, 2012. Hackers disrupted the websites of Israel's stock exchange and El Al in a deepening cyber war launched by a group claiming to be Saudis.

AP Photo

Analysis & Opinions - The Wall Street Journal

Cyber Attacks Can Spark Real Wars

| February 16, 2012

"The recent hacker exchange should also remind us that just as hacking could escalate to the use of conventional force in the Middle East, the reverse is also true. Bombing Iran, for example, could unleash an Iranian government cyber attack. Israelis say they could handle that, despite the recent evidence to the contrary. Unfortunately, much of the critical infrastructure in the U.S. is still not ready for a sophisticated nation-state cyber attack either."