Articles

28 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

teaser image

Magazine Article

Inside China's controversial mission to reinvent the internet

| Mar. 27, 2020

On a cool day late last September, half a dozen Chinese engineers walked into a conference room in the heart of Geneva's UN district with a radical idea. They had one hour to persuade delegates from more than 40 countries of their vision: an alternative form of the internet, to replace the technological architecture that has underpinned the web for half a century. 

Whereas today's internet is owned by everyone and no one, they were in the process of building something very different - a new infrastructure that could put power back in the hands of nation states, instead of individuals.

teaser image

Magazine Article

Jack Ma Offers to Supply the US With Covid-19 Tests and Masks

| Mar. 13, 2020

As the US government promises to ramp up more Covid-19 testing, an unlikely billionaire is offering to lend help: Jack Ma, cofounder of the Chinese tech giant Alibaba. Ma's philanthropic organization, the Jack Ma Foundation, said early Friday morning it would donate 500,000 Covid-19 testing kits and 1 million protective face masks to the US.

University of Michigan Journal of Law Reform

University of Michigan Journal of Law Reform

Journal Article - University of Michigan Journal of Law Reform

Making Democracy Harder to Hack

| Spring 2017 (Volume 50, Issue 3)

With the Russian government hack of the Democratic National Convention email servers and related leaks, the drama of the 2016 U.S. presidential race highlights an important point: nefarious hackers do not just pose a risk to vulnerable companies; cyber attacks can potentially impact the trajectory of democracies.

Magazine Article - Global South Development Magazine

A Few Thoughts on Engineering Peaceful and Inclusive Societies

| November 3, 2016

"The rise of nations such as South Korea, Singapore and China as global economic players illustrated the importance of expanding and deepening human competence. A key starting point in the growth process is recognising that building engineering capabilities offered the best opportunity for technological leapfrogging and catch-up in a variety of industries."

Journal Article - Survival

Cryptography and Sovereignty

    Author:
  • Ben Buchanan
| October-November 2016

Encryption's new normal is changing the way in which states assert their sovereignty at home and abroad. Cryptography has gone mainstream. Now more than ever, encryption is used by ordinary citizens, often without their knowledge, and is a subject of national debate.

Journal Article - Georgetown Journal of International Affairs

Introduction: International Engagement on Cyber V: Securing Critical Infrastructure

| October 2015

In this issue of International Engagement on Cyber, authors discuss developments, challenges, and improvements to critical infrastructure cybersecurity from legal, policy, and technical perspectives. Cyber V also evaluates cybersecurity in Brazil, suggests improved government and private sector cybersecurity practices, and theorizes military actions in the information age.

Journal Article - IEEE Security & Privacy

Regulating Cybersecurity: Institutional Learning or a Lesson in Futility?

| November-December 2014

On 22 November 2013, the Federal Energy Regulatory Commission approved the latest version of mandatory cybersecurity regulations for the bulk electric system—known as Critical Infrastructure Protection (CIP) Reliability Standards. The CIP standards are relatively unique: they are developed through an unusual model of industry-led regulation that places industry, and not federal regulators, at the center of regulatory design and enforcement. The CIP regulations have received a significant amount of criticism. Critics argue that the regulations are incomplete at best and irreparably flawed at worst. The author examines the lessons we can learn from the CIP standards and poses a provocative question: Are the regulations actually a secret success?