Tag: National Security
23 Articles
- Uncategorized
Perspective: Not all Vendors and Products are Created Equal
We do not just use the Internet, we rely upon it, and as we continue to use it across the globe it in ways previously undiscovered, the criticality for it increases in parallel.…
March 23, 2013
- Online Archive
Achieving International Cyber Stability
New inventions often generate new problems. Information technology, the Internet, digital networks, cyberspace—whatever the preferred appellation—is no different. Cyber crime…
March 23, 2013
- Uncategorized
Why Cybersecurity is Hard
In the twenty-first century we face unprecedented challenges in securing the information assets and intellectual property of our public and private organizations. Yet only a few…
March 23, 2013
- Online Archive
China’s Perceptions of Cyber Security
Interest and research in cybersecurity issues began in China in the 1980s. In April 1987, retired Major Shen Wei- guang published the essay “The Harbingers of Information…
March 23, 2013
- Conflict & Security
- Online Archive
Confidence-Building Measures and the Future of the Global Information Infrastructure
Creating confidence-building measures in the information sphere has become a major foreign policy priority for many states.1 Confidence-building measures and other collaborative…
March 23, 2013
- Conflict & Security
- Online Archive
Introduction: Building Trust in Cyberspace
In 2007 Georgetown University established the CyberProject under the auspices of the Institute for Law, Science & Global Security. The CyberProject seeks to hone the…
March 23, 2013
- Online Archive
Use of Force & Cyber Operations by Catherine Lotrionte
Cyberspace, however, can also be used by states to conduct a war without ever needing to engage in kinetic military operations. In 2007, ethnic tension escalated between native…
March 23, 2013
- Online Archive
Multilateral Approaches for Improving Global Security in Cyberspace
Effective cyber security requires that national governments, private companies, and non-governmental organizations work together to understand threats in cyberspace and to share…
March 22, 2013
- Online Archive
Is Russia Becoming a Police State?
Last June, Putin signed a law imposing draconian fees on participants of unauthorized gatherings that violate “public order.” In July, laws were enacted which criminalized…
February 13, 2013
- Online Archive
A Theory of Cyber Deterrence
Deterrence is an example of a traditional security theory that could be superimposed on the cyber realm. Richard L. Kugler, a well-regarded analyst of national security policy,…
February 6, 2013
