50 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

nuclear power plant

Wikimedia CC/Korea Yonggwang NPP

Journal Article - Journal for Peace and Nuclear Disarmament

The Nuclear Fuel Cycle and the Proliferation ‘Danger Zone’

| May 27, 2020

Horizontal nuclear proliferation presents what is sometimes referred to as the "Nth country problem," or identifying which state could be next to acquire nuclear weapons. Nuclear fuel cycle technologies can contribute to both nuclear power generation and weapons development. Consequently, observers often view civilian nuclear programs with suspicion even as research on nuclear latency and the technological inputs of proliferation has added nuance to these discussions. To contribute to this debate, the author puts forth a simple theoretical proposition: En route to developing a civilian nuclear infrastructure and mastering the fuel cycle, states pass through a proliferation "danger zone."

Blogtrepreneur/Flickr

Blogtrepreneur/Flickr

Journal Article - Nonproliferation Review

Solving the Jurisdictional Conundrum: How U.S. Enforcement Agencies Target Overseas Illicit Procurement Networks Using Civil Courts

| September 2018

Over the past two decades, the United States has increasingly turned to targeted sanctions and export restrictions, such as those imposed against Iran and North Korea, in order to curb the spread of weapons of mass destruction. One vexing problem, however, is how to contend with jurisdictional hurdles when the violations occur overseas, in countries that are unable or unwilling to assist US enforcement efforts. To solve this problem, US prosecutors are turning to strategies with significant extraterritorial implications—that is, exercising legal authority beyond national borders. One such tool is to use civil legal procedures to seize assets linked to sanctions or export-control violations in jurisdictions that lack cooperative arrangements with US enforcement agencies. While this may be an attractive strategy to bolster enforcement efforts against overseas illicit procurement, using such tools is not without consequence. This article explores the political, legal, and technical implications of enforcing extraterritorial controls against overseas non-state actors by exploring the recent uses of civil-asset forfeiture against Iranian and North Korean procurement networks.

A U.S. Navy Grumman F-14A-90-GR Tomcat.

U.S. Navy

Journal Article - Strategic Trade Review

Tomcat and Mouse: Iranian Illicit Procurement of U.S. Legacy Military Technologies, 1979–2016

| Autumn 2017

Since the 1979 revolution, Iran has sought to illicitly procure parts for the U.S. origin fighter aircraft sold to the country under the rule of the Shah. The U.S. has taken steps to quash this trade—these efforts have constituted a relatively large proportion of U.S. export control enforcement over the past near-to-four decades. 

University of Michigan Journal of Law Reform

University of Michigan Journal of Law Reform

Journal Article - University of Michigan Journal of Law Reform

Making Democracy Harder to Hack

| Spring 2017 (Volume 50, Issue 3)

With the Russian government hack of the Democratic National Convention email servers and related leaks, the drama of the 2016 U.S. presidential race highlights an important point: nefarious hackers do not just pose a risk to vulnerable companies; cyber attacks can potentially impact the trajectory of democracies.

Journal Article - Survival

Cryptography and Sovereignty

    Author:
  • Ben Buchanan
| October-November 2016

Encryption's new normal is changing the way in which states assert their sovereignty at home and abroad. Cryptography has gone mainstream. Now more than ever, encryption is used by ordinary citizens, often without their knowledge, and is a subject of national debate.

Journal Article - Georgetown Journal of International Affairs

Introduction: International Engagement on Cyber V: Securing Critical Infrastructure

| October 2015

In this issue of International Engagement on Cyber, authors discuss developments, challenges, and improvements to critical infrastructure cybersecurity from legal, policy, and technical perspectives. Cyber V also evaluates cybersecurity in Brazil, suggests improved government and private sector cybersecurity practices, and theorizes military actions in the information age.

Journal Article - IEEE Security & Privacy

Regulating Cybersecurity: Institutional Learning or a Lesson in Futility?

| November-December 2014

On 22 November 2013, the Federal Energy Regulatory Commission approved the latest version of mandatory cybersecurity regulations for the bulk electric system—known as Critical Infrastructure Protection (CIP) Reliability Standards. The CIP standards are relatively unique: they are developed through an unusual model of industry-led regulation that places industry, and not federal regulators, at the center of regulatory design and enforcement. The CIP regulations have received a significant amount of criticism. Critics argue that the regulations are incomplete at best and irreparably flawed at worst. The author examines the lessons we can learn from the CIP standards and poses a provocative question: Are the regulations actually a secret success?