Nuclear Security Matters

24 Items

A boy plays with his toy soldiers inside a school that is being used as a shelter for people who fled the war, in Dnipro city, Ukraine, on Tuesday, April 12, 2022.

AP Photo/Petros Giannakouris

Analysis & Opinions - Offensive Cyber Working Group

Subversion over Offense: Why the Practice of Cyber Conflict Looks Nothing Like Its Theory and What This Means for Strategy and Scholarship

    Author:
  • Lennart Maschmeyer
| Jan. 19, 2022

Cyber attacks are both exciting and terrifying, but the ongoing obsession with ‘cyber warfare’ clouds analysis and hampers strategy development. Much commentary and analysis of cyber conflict continues to use the language of war, where actors use ‘offensive cyber operations’ to meet adversaries in ‘engagements’ striving for victory on the ‘battlefield’ in the ‘cyber domain’. This discourse persists despite a growing consensus that cyber operations are primarily relevant in conflict short of war.

FORT GORDON NELSON HALL, Augusta, Georgia, June 10, 2014 – The U.S. Army’s ‘Cyber Center of Excellence’, Fort Gordon in Augusta, Georgia, hosted a multi-service ‘NetWar’ to show, and build, cyber Warrior capabilities Tuesday, June 10.

Georgia Army National Guard photo by Staff Sgt. Tracy J. Smith

Journal Article - Quarterly Journal: International Security

The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations

    Author:
  • Lennart Maschmeyer
| Fall 2021

Although cyber conflict has existed for thirty years, the strategic utility of cyber operations remains unclear. The subversive trilemma explains why cyber operations tend to fall short of their promise in both warfare and low-intensity competition.

Analysis & Opinions - The Washington Post

America’s Pandemic Response Doesn’t Bode Well for a Potential Cyberattack

| June 25, 2020

America’s botched response to the coronavirus pandemic is a warning that, unless our broken political and administrative systems are fixed, the country could experience a similar breakdown in future national crises, such as a massive cyberattack.

teaser image

Analysis & Opinions - Global Policy

Factoring Pandemic Risks into Financial Modelling

| Apr. 01, 2020

Today’s economic crisis leaves us with an unsettling and perplexing regret. Why weren’t financial portfolios already adjusted for risks that stem from health events such as pandemics? After all, financial portfolios are adjusted for liquidity risks, market risks, credit risks, and even operational and political risks.

Blog Post - Views on the Economy and the World

Black Swans Like COVID-19 are Predictable

| Mar. 30, 2020

Events like the COVID-19 pandemic of 2020, the US housing crash of 2007-09, and the terrorist attack of September 11, 2001, are called “black swans”: in each case, few people were able to predict them reliably, at least not with precision.  But they were known unknowns, not unknown unknowns.  That is, in each case, knowledgeable analysts were fully aware that such a thing could happen, even that it was likely to happen eventually.  They could not predict that the event would happen with high probability in any given year.  But the consequences of each of these events were severe, and predictably so.  Thus, policymakers should have listened to the warnings and should have taken steps in advance. They could have helped avert or mitigate disaster if they had done so.

The Silk Road between a Rock and a Hard Place: Russian and Chinese Competition for Central Asia's Energy

kremlin.ru/Wikimedia Commons

Analysis & Opinions - Insight Turkey

The Silk Road between a Rock and a Hard Place: Russian and Chinese Competition for Central Asia's Energy

| Oct. 01, 2018

China’s displacement of Russian economic influence in Central Asia is generating great interest in Western academic and policy circles, but this research has, as yet, yielded few analytical nuances. This article attempts to shed light on the under-researched question of what explains Central Asian governments’ failure to more effectively capitalize on the growing Central Asian rivalry between Russia, China, the United States, Turkey, Iran, South Korea, Japan, and other regional powers that, since the early 1990s, has been overwhelmingly directed towards strategic energy considerations and hydrocarbon interests.

Book - Random House/Crown

The Perfect Weapon

| June 19, 2018

For 70 years, the thinking inside the Pentagon was that only nations with nuclear weapons could threaten America’s existence. But that assumption is now in doubt: in a world in which almost everything is interconnected – phones, cars, electrical grids, and satellites – everything can be disrupted, if not destroyed. In THE PERFECT WEAPON, Belfer Center Senior Fellow and Adjunct Lecturer in Public Policy David Sanger, the New York Times national security correspondent, details how this new revolution, being conducted largely in secret, is reshaping global power.

The Palace of Nations

Creative Commons

Analysis & Opinions - Strategist

How Will New Cybersecurity Norms Develop?

| Mar. 12, 2018

Many observers have called for laws and norms to secure this new environment. But developing such standards in the cyber domain faces a number of difficult hurdles. Although Moore's law about the doubling of computing power every two years means that cyber time moves quickly, human habits, norms, and state practices change more slowly.