In these early days of the regulatory renaissance for digital technologies, China, Europe, and the United States are competing over whose image will be most reflected in market-defining rules and norms. Despite new lows in the trans-Atlantic relationship in the era of Trump, Europe and the United States still have far more in common with each other about how technology should be developed, deployed, and regulated than they do with China.
Popular culture has contemplated societies of thinking machines for generations, envisioning futures from utopian to dystopian. These futures are, arguably, here now-we find ourselves at the doorstep of technology that can at least simulate the appearance of thinking, acting, and feeling. The real question is: now what?
At the end of July, Dan Coats, the U.S. director of national intelligence (DNI), announced his resignation. When he leaves office on August 15, the U.S. intelligence community will be left with two crises to confront. One is obvious and immediate: how to protect the objectivity and professionalism of the intelligence agencies against the rising tide of politicization by the White House.
Our national discussions about cybersecurity and privacy follow a frustrating pattern: a headline-grabbing incident like the recent Capital One breach occurs, Congress wrings its hands and policymakers more or less move on. So it is no surprise cybersecurity hasn't been much of a focus as the race to the 2020 presidential election heats up.
The issue is here to stay, and it should be debated by the candidates. Here are some concrete ideas that would significantly improve the safety and security of the nation — but require presidential leadership if they are to come to fruition.
Next to military means, causing disruption and interdiction, Western and local powers also relied on policies of containment to halt the expansion of the Islamic State’s territorial strongholds. Yet, a Cold War state-based strategy of containment seems not apt to counter a transformed Islamic State. This article, first, examines why containing the Islamic State was successful in the past.
Truth to Power, the first-ever history of the U.S. National Intelligence Council (NIC), is told through the reflections of its eight Chairs in the period from the end of the Cold War until 2017. Co-editors Robert Hutchings and Gregory Treverton add a substantial introduction placing the NIC in its historical context going all the way back to the Board of National Estimates in the 1940s, as well as a concluding chapter that highlights key themes and judgments.
This report urges policymakers, in both government and the private sector, to act immediately in order to protect the integrity and independence of U.S. elections, particularly in the run-up to the 2020 presidential election, and recommends a number of actions in order to do so. This report was distributed at the launch of the new Cyber Policy Center on June 6th, 2019.
What are the effects of international intervention on the rule of law after civil war? Rule of law requires not only that state authorities abide by legal limits on their power, but also that citizens rely on state laws and institutions to adjudicate disputes.
The fruits of a long anticipated technology finally hit the market, with promise to extend human life, revolutionize production, improve consumer welfare, reduce poverty, and inspire countless yet-imagined innovations. A marvel of science and engineering, it reflects the cumulative efforts of a generation of researchers backed by research funding from the U.S. government and private sector investments in (predominantly American) technology companies.
A new account of modern Iraqi politics that overturns the conventional wisdom about its sectarian divisions
How did Iraq become one of the most repressive dictatorships of the late twentieth century? The conventional wisdom about Iraq's modern political history is that the country was doomed by its diverse social fabric. But in State of Repression, Lisa Blaydes challenges this belief by showing that the country's breakdown was far from inevitable. At the same time, she offers a new way of understanding the behavior of other authoritarian regimes and their populations.
Offensive cyber operations have become increasingly important elements of U.S. national security policy. From the deployment of Stuxnet to disrupt Iranian centrifuges to the possible use of cyber methods against North Korean ballistic missile launches, the prominence of offensive cyber capabilities as instruments of national power continues to grow. Yet conceptual thinking lags behind the technical development of these new weapons. How might offensive cyber operations be used in coercion or conflict? What strategic considerations should guide their development and use?
The Digital Transformation (DX) is a broad term describing the changes and innovations brought about by the introduction of information and communication technologies into all aspects of society. One such innovation is to empower bottom-up, self-governing socio-technical systems for a range of applications. Such systems can be based on Ostrom’s design principles for self-governing institutions for sustainable common-pool resource management.
This study’s purpose was to highlight the changing safety and security landscape engendered by the emergence of new genome editing technologies, help policy-makers and other stakeholders navigate this space, and illuminate broader trends in the life sciences that may impact the biosecurity landscape.
For three and a half decades following the end of the Maoist era, China adhered to Deng Xiaoping’s policies of “reform and opening to the outside world” and “peaceful development.” After Deng retired as paramount leader, these principles continued to guide China’s international behavior in the leadership eras of Jiang Zemin and Hu Jintao.
Excerpt from: "Cyber Security Derailed? Recommendations for Smarter Investments in Infrastructure." War on the Rocks. November, 2018. Online.
A state-owned Chinese company receives a contract to build and maintain the next generation of railcars that service Metro stations at the Pentagon, near the White House and Capitol Hill, and throughout the Washington, D.C., metro area. What could possibly go wrong?
This publication summarizes the agricultural policy analyses conducted in nine Caribbean countries (Suriname, Guyana, Haiti, Dominican Republic, Jamaica, Belize, Barbados, The Bahamas, and Trinidad and Tobago) in the framework of the IDB’s Agrimonitor initiative. The document discusses how agricultural policies affect producers and consumers as well as how the limited funding for agricultural services, such as research and infrastructure, could limit the ability of Caribbean farmers to compete effectively in global markets.
Abstract: The failure of experts and lay people to understand each other has been fueling conflict around the environmental clean-up of the many sites in the United States that are contaminated by the nuclear weapons program. This mutual distrust was exacerbated by the culture of secrecy surrounding the atomic weapons program during World War II, and later by the innate culture of bureaucracy in the federal agencies that have sprung up since then.
The extent to which armed conflicts—events such as civil wars, rebellions, and interstate conflicts—are an important driver of child mortality is unclear. While young children are rarely direct combatants in armed conflict, the violent and destructive nature of such events might harm vulnerable populations residing in conflict-affected areas. A 2017 review estimated that deaths of individuals not involved in combat outnumber deaths of those directly involved in the conflict, often more than five to one.