Articles

32 Items

teaser image

Magazine Article

Inside China's controversial mission to reinvent the internet

| Mar. 27, 2020

On a cool day late last September, half a dozen Chinese engineers walked into a conference room in the heart of Geneva's UN district with a radical idea. They had one hour to persuade delegates from more than 40 countries of their vision: an alternative form of the internet, to replace the technological architecture that has underpinned the web for half a century. 

Whereas today's internet is owned by everyone and no one, they were in the process of building something very different - a new infrastructure that could put power back in the hands of nation states, instead of individuals.

U.S. President Dwight D. Eisenhower and Secretary of State John Foster Dulles (from left) greet South Vietnamese President Ngo Dinh Diem at Washington National Airport

DoD/Department of the Air Force

Journal Article - Small Wars Journal

Bernard Fall as an Andrew Marshall Avant la Lettre (Part II)

| Dec. 09, 2019

SWJ interview with Nathaniel L. Moir, Ph.D., an Ernest May Postdoctoral Fellow in History and Policy at the Belfer Center for Science and International Affairs, Harvard Kennedy School. Dr. Moir is completing a book manuscript on Bernard Fall for publication.

Journal Article - Quarterly Journal: International Security

Correspondence: Military-Technological Imitation and Rising Powers

| Fall 2019

Michael C. Horowitz and Shahryar Pasandideh respond to Andrea Gilli and Mauro Gilli’s winter 2018/19 article, “Why China Has Not Caught Up Yet: Military-Technological Superiority and the Limits of Imitation, Reverse Engineering, and Cyber Espionage.”

Chinese stealth fighter in the air

(China Military Online)

Journal Article - Quarterly Journal: International Security

Why China Has Not Caught Up Yet: Military-Technological Superiority, Systems Integration, and the Challenges of Imitation, Reverse Engineering, and Cyber-Espionage

| Winter 2018/19

The extraordinary complexity of today’s advanced weapons systems has significantly reduced the ability of states to imitate other states’ military technology. Consequently, U.S. rivals such as China will continue to struggle to develop indigenous capabilities that can match those of the United States.

Journal Article - Small Wars Journal

Twilight Zone Conflicts: Employing Gray Tactics in Cyber Operations

| October 27, 2016

"...[A]ctors that employ gray tactics in cyber operations need not be successful in actually infiltrating a system to further their revisionist ambitions. Rather, the sheer ramifications from the cyber action itself, has the power to disturb a nation's psyche and challenge the geopolitical status quo."

In this May 19, 2014, file photo, press materials are displayed on a table before a news conference to announce that a U.S. grand jury had charged five Chinese hackers with economic espionage and trade secret theft.

Charles Dharapak/ AP

Journal Article - Quarterly Journal: International Security

The Impact of China on Cybersecurity: Fiction and Friction

    Author:
  • Jon R. Lindsay
| Winter 2014/15

The Chinese cyber threat to the United States has been exaggerated. China's cyber capabilities are outmatched by those of the West, and Beijing reaps too many benefits from the internet's liberal norms to attempt to seriously undermine them.