Tag: National Security

23 Articles

Uncategorized

Perspective: Not all Vendors and Products are Created Equal

We do not just use the Internet, we rely upon it, and as we continue to use it across the globe it in ways previously undiscovered, the criticality for it increases in parallel.…

March 23, 2013

Online Archive

Achieving International Cyber Stability

New inventions often generate new problems. Information technology, the Internet, digital networks, cyberspace—whatever the preferred appellation—is no different. Cyber crime…

March 23, 2013

Uncategorized

Why Cybersecurity is Hard

In the twenty-first century we face unprecedented challenges in securing the information assets and intellectual property of our public and private organizations. Yet only a few…

March 23, 2013

Online Archive

China’s Perceptions of Cyber Security

Interest and research in cybersecurity issues began in China in the 1980s. In April 1987, retired Major Shen Wei- guang published the essay “The Harbingers of Information…

March 23, 2013

Conflict & Security
Online Archive

Confidence-Building Measures and the Future of the Global Information Infrastructure

Creating confidence-building measures in the information sphere has become a major foreign policy priority for many states.1 Confidence-building measures and other collaborative…

March 23, 2013

Conflict & Security
Online Archive

Introduction: Building Trust in Cyberspace

In 2007 Georgetown University established the CyberProject under the auspices of the Institute for Law, Science & Global Security. The CyberProject seeks to hone the…

March 23, 2013

Online Archive

Use of Force & Cyber Operations by Catherine Lotrionte

Cyberspace, however, can also be used by states to conduct a war without ever needing to engage in kinetic military operations. In 2007, ethnic tension escalated between native…

March 23, 2013

Online Archive

Multilateral Approaches for Improving Global Security in Cyberspace

Effective cyber security requires that national governments, private companies, and non-governmental organizations work together to understand threats in cyberspace and to share…

March 22, 2013

Online Archive

Is Russia Becoming a Police State?

Last June, Putin signed a law imposing draconian fees on participants of unauthorized gatherings that violate “public order.” In July, laws were enacted which criminalized…

February 13, 2013

Online Archive

A Theory of Cyber Deterrence

Deterrence is an example of a traditional security theory that could be superimposed on the cyber realm. Richard L. Kugler, a well-regarded analyst of national security policy,…

February 6, 2013