Asia & the Pacific

54 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

man wearing a shirt promoting TikTok

AP/Ng Han Guan

Analysis & Opinions - Project Syndicate

The Other Global Power Shift

| Aug. 06, 2020

Joseph Nye writes that the world is increasingly obsessed with the ongoing power struggle between the United States and China. But the technology-driven shift of power away from states to transnational actors and global forces brings a new and unfamiliar complexity to global affairs.

a guide is silhouetted in an exhibition promoting Huawei's 5G technologies

AP/Ng Han Guan

Analysis & Opinions - The New York Times

Every Part of the Supply Chain Can Be Attacked

| Sep. 25, 2019

Bruce Schneier writes that when it comes to 5G technology, a trustworthy system needs to be built out of untrustworthy parts.  It is not even really known how to build secure systems out of secure parts, let alone out of parts and processes that aren't trustworthy and that are almost certainly being subverted by governments and criminals around the world.

new MBTA Orange Line car produced by CRRC

Wikimedia CC/Edward Order

Analysis & Opinions - CNN

The Real Threat from China Isn't 'Spy Trains'

| Sep. 21, 2019

Bruce Schneier  explains that there is no escaping the technology of inevitable surveillance. Consumers have little choice but to rely on the companies that build their computers and write their software, whether in  smartphones,  5G wireless infrastructure, or subway cars.  China is more likely to try to get data from the U.S. communications infrastructure like the United States does rather than try to produce a subway car outfitted with surveillance apparatus.

Analysis & Opinions - Lawfare

Three Observations on China's Approach to State Action in Cyberspace

| Jan. 22, 2017

Cyber Security Project Director Michael Sulmeyer and Project Affiliate Amy Chang discuss their observations on China's Approach to cyber after a recent visit to Beijing. Sulmeyer and Chang were part of a small group of American academics and goernment representatives to meet with Chinese counterparts about contemporary issues in cybersecurity.