23 Items

Analysis & Opinions - The National Interest

Attribution from Behind the Veil of Ignorance

| November 13, 2016

"Perfect selective attribution is the most well-balanced in accounting for social justice and security culture needs. The reason being is that it enables all cyber stakeholders with the freedom of choice in disclosing their true personal and/or organizational attributes to an intended recipient, and equally importantly, to what extent. And although each actor is endowed with the power of freedom of choice, every cyber action is also accompanied by the freedom of failure."

Paper - Potomac Institute for Policy Studies

Cyber Readiness Index 2.0

    Authors:
  • Chris Demchak
  • Jason Kerben
  • Jennifer McArdle
  • Francesca Spidalieri
| November 30, 2015

"Building on CRI 1.0, Cyber Readiness Index 2.0 examines one hundred twenty-five countries that have embraced, or are starting to embrace, ICT and the Internet and then applies an objective methodology to evaluate each country's maturity and commitment to cyber security across seven essential elements."

Presentation

Cyber Disorders: Rivalry and Conflict in a Global Information Age

| May 3, 2012

The risks posed by the proliferation of cyber weapons are gaining wide recognition among security planners. Yet the general reaction of scholars of international relations has been to neglect the cyber peril owing to its technical novelties and intricacies. This attitude amounts to either one or both of two claims: the problem is not of sufficient scale to warrant close inspection, or it is not comprehensible to a non-technical observer. This seminar challenged both assertions.

A security guard, right, stands at the entrance of El Al sales offices in Tel Aviv, Israel, Jan. 16, 2012. Hackers disrupted the websites of Israel's stock exchange and El Al in a deepening cyber war launched by a group claiming to be Saudis.

AP Photo

Analysis & Opinions - The Wall Street Journal

Cyber Attacks Can Spark Real Wars

| February 16, 2012

"The recent hacker exchange should also remind us that just as hacking could escalate to the use of conventional force in the Middle East, the reverse is also true. Bombing Iran, for example, could unleash an Iranian government cyber attack. Israelis say they could handle that, despite the recent evidence to the contrary. Unfortunately, much of the critical infrastructure in the U.S. is still not ready for a sophisticated nation-state cyber attack either."

Discussion Paper - Science, Technology, and Public Policy Program, Belfer Center

Cyber Norm Emergence at the United Nations—An Analysis of the UN's Activities Regarding Cyber-security

    Author:
  • Tim Maurer
| September 2011

Cyber-warfare is no longer science fiction and the debate among policy-makers on what norms will guide behavior in cyber-space is in full swing. The United Nations (UN) is one of the fora where this debate is taking place exhibiting an astonishing rate of norm emergence in cyber-space. Most recently, Russia together with China proposed an “International code of conduct for information security” in September 2011 after the U.S. reversed its long-standing policy position in 2010.

Norton Cybercrime Index

AP Photo

Paper - Science, Technology, and Public Policy Program, Belfer Center

Taking a Byte Out of Cybercrime

| October 2011

"Cybersecurity is a means to enable social stability and promote digital democracy; a method by which to govern the Internet; and a process by which to secure critical infrastructure from cybercrime, cyberespionage, cyberterrorism and cyberwar. As nations and corporations recognize their dependence on ICT, policymakers must find the proper balance in protecting their investments without strangling future growth."

President Barack Obama greets German Chancellor Angela Merkel during the official arrivals for the Nuclear Security Summit in Washington, April 12, 2010.

AP Photo

Analysis & Opinions - Belfer Center for Science and International Affairs, Harvard Kennedy School

A Call for German Leadership in Combating Nuclear Terrorism

| April 12, 2010

"...Germany has an opportunity at the Washington summit — and thereafter — to step up and lend non-American leadership to the problem. Recognizing that in many of the world's capitals the threat of nuclear terrorism is not yet being taken seriously, and when in some of them the very notion is even considered an American pretext for an entirely different, potentially hostile political agenda, non-American leadership is most urgently needed."

People of various faiths participate in a multi-faith candle light vigil to commemorate the 2008 terror attacks at Nariman House in Mumbai, India, Nov. 17, 2009. Nariman House is the Chabad center that was targeted by the terrorists.

AP Photo

Analysis & Opinions - The Hindu

Lessons and Challenges for Pakistan

| November 25, 2009

Pakistan has an ideal opportunity to show to India that it is fully committed to defeat terrorism in all its shapes and forms. Political rhetoric for public consumption on the subject, both in India and Pakistan, should not be allowed to disrupt honest and professional investigations of the Mumbai attacks. All other disputes between the two countries should be dealt with and tackled separately from this case and no quid pro quo arrangement or expectation should come in the way of giving an exemplary punishment to those responsible for this crime against humanity. This includes all who are to be found involved in planning, facilitating, or orchestrating the atrocity.