Articles

64 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

a new barrier is built along the Texas-Mexico border near downtown El Paso

AP/Eric Gay

Newspaper Article - The Huffington Post

Border Security Expert Tells 'Mansplaining' Rep. Dan Crenshaw Why A Wall Won't Work

    Author:
  • David Moye
| Feb. 05, 2019

Juliette Kayyem suggested that freshman Texas GOP Representative Dan Crenshaw support his argument on border security with facts — "not with mocking a woman."  This article covers the Twitter exchange.

Magazine Article - Harvard Gazette

Britain muses: play bridge or solitaire?

    Author:
  • Christina Pazzanese
| June 17, 2016

On Thursday, voters in the U.K. will decide by a simple majority whether to remain in the E.U. during a national referendum known as “Brexit” (a portmanteau of the words British and exit). Over the last month, public opinion polling showed voters evenly split, with the “leave” campaign edging upslightly in recent days. Douglas Alexander is a senior fellow in The Future of Diplomacy Project.The Gazette spoke with Alexander about the upcoming referendum and the potential fallout for the U.K. and Europe.

Sub-Saharan migrants climb over a metallic fence that divides Morocco and the Spanish enclave of Melilla on Friday, March 28, 2014.

Santi Palacios/ AP

Journal Article - Quarterly Journal: International Security

Barriers to Entry: Who Builds Fortified Boundaries and Why

    Authors:
  • Ron E. Hassner
  • Jason Wittenberg
| Summer 2015

Contrary to conventional wisdom, states do not typically construct fortified boundaries in response to border disputes or to prevent terrorism. Instead, most build such boundaries for economic reasons, to keep out unwanted migrants from poorer states. Further, Muslim states are more likely to both build and be the targets of fortified boundaries.

US and Ukrainian soldiers stand guard during opening ceremony of the 'Fiarles Guardian - 2015', Ukrainian-US Peacekeeping and Security command and staff training, in western Ukraine, in Lviv region, Monday, April 20, 2015.

(AP Photo/Efrem Lukatsky)

Magazine Article - The National Interest

Russia and America: Stumbling to War

| May-June 2015

In the United States and Europe, many believe that the best way to prevent Russia’s resumption of its historic imperial mission is to assure the independence of Ukraine. They insist that the West must do whatever is required to stop the Kremlin from establishing direct or indirect control over that country. Otherwise, they foresee Russia reassembling the former Soviet empire and threatening all of Europe. Conversely, in Russia, many claim that while Russia is willing to recognize Ukraine’s sovereignty and territorial integrity (with the exception of Crimea), Moscow will demand no less than any other great power would on its border. Security on its western frontier requires a special relationship with Ukraine and a degree of deference expected in major powers’ spheres of influence. More specifically, Russia’s establishment sentiment holds that the country can never be secure if Ukraine joins NATO or becomes a part of a hostile Euro-Atlantic community. From their perspective, this makes Ukraine’s nonadversarial status a nonnegotiable demand for any Russia powerful enough to defend its national-security interests.

Journal Article - IEEE Security & Privacy

Regulating Cybersecurity: Institutional Learning or a Lesson in Futility?

| November-December 2014

On 22 November 2013, the Federal Energy Regulatory Commission approved the latest version of mandatory cybersecurity regulations for the bulk electric system—known as Critical Infrastructure Protection (CIP) Reliability Standards. The CIP standards are relatively unique: they are developed through an unusual model of industry-led regulation that places industry, and not federal regulators, at the center of regulatory design and enforcement. The CIP regulations have received a significant amount of criticism. Critics argue that the regulations are incomplete at best and irreparably flawed at worst. The author examines the lessons we can learn from the CIP standards and poses a provocative question: Are the regulations actually a secret success?

Journal Article - Politique étrangère

The Virtual Weapon: Dilemmas and Future Scenarios

| Winter 2014-15

The cyber revolution challenges conventional mechanisms of deterrence and conflict management. It is difficult to attribute responsibility for and even detect cyberoperations. The growing ability of nonstate actors to conduct offensive action further complicates the design of measures to repulse it. A large-scale cyberattack could instigate an intensifying spiral of escalation involving conventional strikes.

Journal Article - American Foreign Policy Interests

Connected Choices: How the Internet Is Challenging Sovereign Decisions

| November 2014

"Modern societies are in the middle of a strategic, multidimensional competition for money, power, and control over all aspects of the Internet and the Internet economy. This article discusses the increasing pace of discord and the competing interests that are unfolding in the current debate concerning the control and governance of the Internet and its infrastructure."