Asia & the Pacific

8 Items

Journal Article - Small Wars Journal

Twilight Zone Conflicts: Employing Gray Tactics in Cyber Operations

| October 27, 2016

"...[A]ctors that employ gray tactics in cyber operations need not be successful in actually infiltrating a system to further their revisionist ambitions. Rather, the sheer ramifications from the cyber action itself, has the power to disturb a nation's psyche and challenge the geopolitical status quo."

Analysis & Opinions - The Huffington Post

Decrypting the Global Encryption Debate

| October 20, 2016

"As the U.S. Congress considers the appropriate role for the federal government in the encryption debate, policymakers should be mindful of the impact of their actions both within and beyond the United States. To date, the U.S. and Europe are on one side of an Internet governance spectrum favoring the multi-stakeholder status quo with India in the middle, followed by China, and Russia undertaking the most state-centric approach to both Internet governance generally and encryption specifically."

Analysis & Opinions - The Huffington Post

Is Cybersecurity Like Arms Control?

| May 18, 2015

"In little more than a generation, the Internet has become the substrate of the global economy and governance worldwide. Several billion more human users will be added in the next decade, as will tens of billions of devices, ranging from thermostats to industrial control systems (the 'Internet of Things'). All of this burgeoning interdependence implies vulnerabilities that governments and non-governmental actors can exploit. At the same time, we are only beginning to come to terms with the national-security implications of this. Strategic studies of the cyber domain resemble nuclear strategy in the 1950s: analysts are still not clear about the meaning of offense, defense, deterrence, escalation, norms, and arms control."

March 8, 2012: Norwich University student Adam Marenna, of Belair, Md.  Deep in the bowels of a building on the campus of the nation's oldest private military academy, students from across the globe are being taught to fight the war of the future.

AP Photo/Toby Talbot

Journal Article - Quarterly Journal: International Security

The Meaning of the Cyber Revolution: Perils to Theory and Statecraft

| Fall 2013

While decisionmakers warn about the cyber threat constantly, there is little systematic analysis of the issue from an international security studies perspective. Cyberweapons are expanding the range of possible harm between the concepts of war and peace, and give rise to enormous defense complications and dangers to strategic stability. It is detrimental to the intellectual progress and policy relevance of the security studies field to continue to avoid the cyber revolution's central questions.

Analysis & Opinions - The Washington Post

A Global Cyber-crisis in Waiting

| February 7, 2013

"Like-minded nations should also agree that governments should not steal data from private corporations and then give that information to competing companies, as the government of China has been doing on a massive scale. The victims of Chinese economic espionage should seek to establish clear guidelines and penalties within the World Trade Organization system or, if China blocks that, victim states should seek to develop countermeasures and sanctions outside of that structure."

- Belfer Center for Science and International Affairs, Harvard Kennedy School Belfer Center Newsletter

Scholars Weigh Info-Tech Policy Challenges

| Winter 2011-2012

In September, experts from Harvard University, the Massachusetts Institute of Technology, and other Boston-area universities participated in a three day conference convened by the Belfer Center to examine policy choices facing the fast-changing field of information and communications technology.

Discussion Paper - Science, Technology, and Public Policy Program, Belfer Center

WikiLeaks 2010: A Glimpse of the Future?

    Author:
  • Tim Maurer
| August 2011

The recent publications on WikiLeaks reveal a story about money, fame, sex, underground hackers, and betrayal. But it also involves fundamental questions regarding cyber-security and foreign policy. This paper argues WikiLeaks is only the symptom of a new, larger problem which is the result of technological advances that allow a large quantity of data to be 'stolen' at low or no cost by one or more individuals and to be potentially made public and to go 'viral', spreading exponentially online.

In this Sept. 24, 2010, file photo the National Cybersecurity & Communications Integration Center (NCCIC) prepares for the Cyber Storm III exercise at its operations center in Arlington, Va.

AP Photo

Magazine Article - Bulletin of the American Academy of Arts and Sciences

The Future of Power

| Spring 2011

"The conventional wisdom among those who looked at the Middle East used to be that you had a choice either of supporting the autocrat or being stuck with the religious extremists. The extraordinary diffusion of information created in Egypt and other Middle Eastern countries reveals a strong middle that we weren't fully aware of. What is more, new technologies allow this new middle to coordinate in ways unseen before Twitter, Facebook, and so forth, and this could lead to a very different politics of the Middle East. This introduces a new complexity to our government's dealings with the region."