Science & Technology

8 Items

an alert from the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency

AP/Jon Elswick

Journal Article - Foreign Affairs

The End of Cyber-Anarchy?

| January/February 2022

Joseph Nye argues that prudence results from the fear of creating unintended consequences in unpredictable systems and can develop into a norm of nonuse or limited use of certain weapons or a norm of limiting targets. Something like this happened with nuclear weapons when the superpowers came close to the brink of nuclear war in 1962, during the Cuban missile crisis. The Limited Test Ban Treaty followed a year later.

Security specialist Erik Dickmeyer works at a computer station with a cyber threat map displayed on a wall in front of him

AP Photo/John Minchillo

Analysis & Opinions - Project Syndicate

Can Cyberwarfare Be Regulated?

| Oct. 02, 2019

Joseph Nye writes that In the cyber realm, the same program can be used for legitimate or malicious purposes, depending on the user’s intent. But if that makes traditional arms-control treaties impossible to verify, it may still be possible to set limits on certain types of civilian targets and negotiate rough rules of the road that limit conflict.

Panorama of Pyongyang, North Korea.

Wikimedia CC/Sven Unbehauen

Analysis & Opinions - Project Syndicate

Deterrence in Cyberspace

| June 03, 2019

Understanding deterrence in cyberspace is often difficult, because  minds remain captured by an image of deterrence shaped by the Cold War: a threat of massive retaliation to a nuclear attack by nuclear means. A better analogy is crime: governments can only imperfectly prevent it.

Analysis & Opinions - The Diplomat

Can China Be Deterred in Cyber Space?

| February 3, 2016

"Along with punishment and denial, entanglement is an important means of making an actor perceive that the costs of an action will exceed the benefits.  Entanglement refers to the existence of  interdependences which makes a successful attack simultaneously impose serious costs on the attacker as well as the victim. This is not unique to cyber. For example, in 2009, when the People's Liberation Army urged the Chinese government to dump some of China's massive holdings of dollar reserves to punish the United States for selling arms to Taiwan, the Central Bank pointed out that this would impose large costs on China as well and the government decided against it."

Analysis & Opinions - The Washington Post

A Global Cyber-crisis in Waiting

| February 7, 2013

"Like-minded nations should also agree that governments should not steal data from private corporations and then give that information to competing companies, as the government of China has been doing on a massive scale. The victims of Chinese economic espionage should seek to establish clear guidelines and penalties within the World Trade Organization system or, if China blocks that, victim states should seek to develop countermeasures and sanctions outside of that structure."

Protesters gather at Gani Fawehinmi Park as a national strike over fuel prices and government corruption entered its 2nd day in Lagos, Nigeria, Jan. 10, 2012. Angry youths erected a burning roadblock outside luxury enclaves in Nigeria's commercial capital

AP Photo

Analysis & Opinions - The Guardian

Roads and Rail in Nigeria Could Be at the Centre of Job Creation

| January 24, 2012

"...[N]ew jobs can be directly created in the design, construction, operation and maintenance of infrastructure projects. However, such job creation is unlikely to happen unless there are deliberate policy guidelines. This is mainly because construction projects tend to focus primarily on immediate cost-effectiveness and less on indirect benefits such as youth employment."

In this Sept. 24, 2010, file photo the National Cybersecurity & Communications Integration Center (NCCIC) prepares for the Cyber Storm III exercise at its operations center in Arlington, Va.

AP Photo

Magazine Article - Bulletin of the American Academy of Arts and Sciences

The Future of Power

| Spring 2011

"The conventional wisdom among those who looked at the Middle East used to be that you had a choice either of supporting the autocrat or being stuck with the religious extremists. The extraordinary diffusion of information created in Egypt and other Middle Eastern countries reveals a strong middle that we weren't fully aware of. What is more, new technologies allow this new middle to coordinate in ways unseen before Twitter, Facebook, and so forth, and this could lead to a very different politics of the Middle East. This introduces a new complexity to our government's dealings with the region."

Analysis & Opinions - The Washington Post

The Cybersecurity Changes We Need

| May 29, 2010

"There is widespread agreement that this long-term trend of grabbing the economic gains from information technology advances and ignoring their security costs has reached a crisis point," write Melissa Hathaway and Jack Goldsmith. "As we progress digitally, we must also adopt and embed sometimes-costly security solutions into our core infrastructures and enterprises and stop playing the game of chance."