Asia & the Pacific

37 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

man wearing a shirt promoting TikTok

AP/Ng Han Guan

Analysis & Opinions - Project Syndicate

The Other Global Power Shift

| Aug. 06, 2020

Joseph Nye writes that the world is increasingly obsessed with the ongoing power struggle between the United States and China. But the technology-driven shift of power away from states to transnational actors and global forces brings a new and unfamiliar complexity to global affairs.

a guide is silhouetted in an exhibition promoting Huawei's 5G technologies

AP/Ng Han Guan

Analysis & Opinions - The New York Times

Every Part of the Supply Chain Can Be Attacked

| Sep. 25, 2019

Bruce Schneier writes that when it comes to 5G technology, a trustworthy system needs to be built out of untrustworthy parts.  It is not even really known how to build secure systems out of secure parts, let alone out of parts and processes that aren't trustworthy and that are almost certainly being subverted by governments and criminals around the world.

new MBTA Orange Line car produced by CRRC

Wikimedia CC/Edward Order

Analysis & Opinions - CNN

The Real Threat from China Isn't 'Spy Trains'

| Sep. 21, 2019

Bruce Schneier  explains that there is no escaping the technology of inevitable surveillance. Consumers have little choice but to rely on the companies that build their computers and write their software, whether in  smartphones,  5G wireless infrastructure, or subway cars.  China is more likely to try to get data from the U.S. communications infrastructure like the United States does rather than try to produce a subway car outfitted with surveillance apparatus.

Paper - Carnegie Endowment for International Peace

Russia and Cyber Operations: Challenges and Opportunities for the Next U.S. Administration

| December 13, 2016

Russian cyber operations against the United States aim to both collect information and develop offensive capabilities against future targets. Washington must strengthen its defenses in response.

Analysis & Opinions - Aljazeera

The Kremlin and the US Election

| December 6, 2016

"But what about deterring operations that are not equivalent to an armed attack? There are grey areas in which important targets, say, a free political process, are not strategically vital in the same way as the electrical grid or the financial system. Destroying the latter two could damage lives and property; interference with the former threatens deeply held political values."