Articles

14 Items

A security guard stands near a sculpture of the Chinese Communist Party flag at the Museum of the Communist Party of China on May 26, 2022, in Beijing.

AP Photo/Ng Han Guan

Journal Article - Quarterly Journal: International Security

Strategic Substitution: China’s Search for Coercive Leverage in the Information Age

    Author:
  • Fiona Cunningham
| Summer 2022

After the mistaken U.S. bombing of the Chinese Embassy in Belgrade in 1999, China turned to information-age weapons to create a risk of escalation to nuclear war with the United States. This shift helps compensate for its conventional military inferiority.

U.S. Military Academy cadets watch data on computers

AP Photo

Journal Article - Quarterly Journal: International Security

Prediction and Judgment: Why Artificial Intelligence Increases the Importance of Humans in War

    Authors:
  • Avi Goldfarb
  • Jon R. Lindsay
| Winter 2021/22

Rather than rapid robotic wars and decisive shifts in military power, AI-enabled conflict will likely involve significant uncertainty, organizational friction, and chronic controversy. Greater military reliance on AI will therefore make the human element in war even more important, not less.

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

FORT GORDON NELSON HALL, Augusta, Georgia, June 10, 2014 – The U.S. Army’s ‘Cyber Center of Excellence’, Fort Gordon in Augusta, Georgia, hosted a multi-service ‘NetWar’ to show, and build, cyber Warrior capabilities Tuesday, June 10.

Georgia Army National Guard photo by Staff Sgt. Tracy J. Smith

Journal Article - Quarterly Journal: International Security

The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations

    Author:
  • Lennart Maschmeyer
| Fall 2021

Although cyber conflict has existed for thirty years, the strategic utility of cyber operations remains unclear. The subversive trilemma explains why cyber operations tend to fall short of their promise in both warfare and low-intensity competition.

tenth grader attending a class how to investigate a computer network that has been hacked in Beit Shemesh, Israel.

AP

Journal Article - Cyber, Intelligence, and Security

Four Big "Ds" and a Little "r": A New Model for Cyber Defense

| June 2017

This article argues that cyberthreats are not fundamentally different from other asymmetric threats, and it provides a conceptual model for developing a response by drawing on classic principles of military strategy, the "four Ds"— Detection, Deterrence, Defense, and Defeat—as well as resilience (the little "r"). The authors offer a model for how countries can create policies addressing each of these principles that will enhance the security of national cyber systems.