Asia & the Pacific

12 Items

In this Feb. 5, 2016 file photo, WikiLeaks founder Julian Assange speaks from the balcony of the Ecuadorean Embassy in London. (AP Photo/Kirsty Wigglesworth, File)

AP Photo/Kirsty Wigglesworth, File

Analysis & Opinions - Jewish World Review

Cyber War I has already begun

| Mar. 15, 2017

There is good reason to fear it could be the Second Korean War, with craziness in North Korea and chaos in the South. Or it could be yet another quagmire in the Middle East. Trump's most excitable critics keep warning that World War III will happen on his watch. But I am more worried about Cyber War I - especially as it has already begun.

Journal Article - Small Wars Journal

Twilight Zone Conflicts: Employing Gray Tactics in Cyber Operations

| October 27, 2016

"...[A]ctors that employ gray tactics in cyber operations need not be successful in actually infiltrating a system to further their revisionist ambitions. Rather, the sheer ramifications from the cyber action itself, has the power to disturb a nation's psyche and challenge the geopolitical status quo."

Analysis & Opinions - The Huffington Post

Decrypting the Global Encryption Debate

| October 20, 2016

"As the U.S. Congress considers the appropriate role for the federal government in the encryption debate, policymakers should be mindful of the impact of their actions both within and beyond the United States. To date, the U.S. and Europe are on one side of an Internet governance spectrum favoring the multi-stakeholder status quo with India in the middle, followed by China, and Russia undertaking the most state-centric approach to both Internet governance generally and encryption specifically."

Hezbollah political party religion Shia Shiism Lebanon Shiite

Wikimedia Commons

Book Chapter - Routledge

Organizing Politics: Religion and Political Parties in Comparative Perspective

| January 2016

This book chapter discusses in theory the various ways that religion and political parties can intersect, and then consider three sets of cases that have provoked considerable scholarship in recent years – Christian Democratic parties in Europe, religion and parties in the United States, and Islamic parties in the Middle East

Analysis & Opinions - The Huffington Post

Is Cybersecurity Like Arms Control?

| May 18, 2015

"In little more than a generation, the Internet has become the substrate of the global economy and governance worldwide. Several billion more human users will be added in the next decade, as will tens of billions of devices, ranging from thermostats to industrial control systems (the 'Internet of Things'). All of this burgeoning interdependence implies vulnerabilities that governments and non-governmental actors can exploit. At the same time, we are only beginning to come to terms with the national-security implications of this. Strategic studies of the cyber domain resemble nuclear strategy in the 1950s: analysts are still not clear about the meaning of offense, defense, deterrence, escalation, norms, and arms control."

March 8, 2012: Norwich University student Adam Marenna, of Belair, Md.  Deep in the bowels of a building on the campus of the nation's oldest private military academy, students from across the globe are being taught to fight the war of the future.

AP Photo/Toby Talbot

Journal Article - Quarterly Journal: International Security

The Meaning of the Cyber Revolution: Perils to Theory and Statecraft

| Fall 2013

While decisionmakers warn about the cyber threat constantly, there is little systematic analysis of the issue from an international security studies perspective. Cyberweapons are expanding the range of possible harm between the concepts of war and peace, and give rise to enormous defense complications and dangers to strategic stability. It is detrimental to the intellectual progress and policy relevance of the security studies field to continue to avoid the cyber revolution's central questions.

Analysis & Opinions - The Washington Post

A Global Cyber-crisis in Waiting

| February 7, 2013

"Like-minded nations should also agree that governments should not steal data from private corporations and then give that information to competing companies, as the government of China has been doing on a massive scale. The victims of Chinese economic espionage should seek to establish clear guidelines and penalties within the World Trade Organization system or, if China blocks that, victim states should seek to develop countermeasures and sanctions outside of that structure."

Analysis & Opinions - Forbes

Why We Need Innovation To Prepare For the Global Aging Society

| October 3, 2012

"Technology alone will not be adequate to address the needs of the elderly. But policy proposals that fail to take into account advances in medicine and engineering are unlikely to take advantage of human creativity. In fact, strategies that put the elderly at the center of the innovation process could significantly increase the prospects of turning the elderly from being a burden on society to being an asset."

- Belfer Center for Science and International Affairs, Harvard Kennedy School Belfer Center Newsletter

Scholars Weigh Info-Tech Policy Challenges

| Winter 2011-2012

In September, experts from Harvard University, the Massachusetts Institute of Technology, and other Boston-area universities participated in a three day conference convened by the Belfer Center to examine policy choices facing the fast-changing field of information and communications technology.

Professor Venkatesh "Venky" Narayanamurti

Martha Stewart Photo

News - Science, Technology, and Public Policy Program, Belfer Center

Information and Communications Technology and Public Policy: The Next Wave

| November 15, 2011

Industry and academic experts from Harvard, MIT, and other Boston-area universities met for a three-day conference in September 2011 to examine policy choices facing the fast-changing field of information and communications technology at the intersection of public policy. The conference was convened by the Belfer Center for Science and International Affair’s Information and Communications Technology and Public Policy Project (ICTPP) at the Harvard Kennedy School.