Our national discussions about cybersecurity and privacy follow a frustrating pattern: a headline-grabbing incident like the recent Capital One breach occurs, Congress wrings its hands and policymakers more or less move on. So it is no surprise cybersecurity hasn't been much of a focus as the race to the 2020 presidential election heats up.
The issue is here to stay, and it should be debated by the candidates. Here are some concrete ideas that would significantly improve the safety and security of the nation — but require presidential leadership if they are to come to fruition.
Next to military means, causing disruption and interdiction, Western and local powers also relied on policies of containment to halt the expansion of the Islamic State’s territorial strongholds. Yet, a Cold War state-based strategy of containment seems not apt to counter a transformed Islamic State. This article, first, examines why containing the Islamic State was successful in the past.
Truth to Power, the first-ever history of the U.S. National Intelligence Council (NIC), is told through the reflections of its eight Chairs in the period from the end of the Cold War until 2017. Co-editors Robert Hutchings and Gregory Treverton add a substantial introduction placing the NIC in its historical context going all the way back to the Board of National Estimates in the 1940s, as well as a concluding chapter that highlights key themes and judgments.
This report urges policymakers, in both government and the private sector, to act immediately in order to protect the integrity and independence of U.S. elections, particularly in the run-up to the 2020 presidential election, and recommends a number of actions in order to do so. This report was distributed at the launch of the new Cyber Policy Center on June 6th, 2019.
What are the effects of international intervention on the rule of law after civil war? Rule of law requires not only that state authorities abide by legal limits on their power, but also that citizens rely on state laws and institutions to adjudicate disputes.
The fruits of a long anticipated technology finally hit the market, with promise to extend human life, revolutionize production, improve consumer welfare, reduce poverty, and inspire countless yet-imagined innovations. A marvel of science and engineering, it reflects the cumulative efforts of a generation of researchers backed by research funding from the U.S. government and private sector investments in (predominantly American) technology companies.
Offensive cyber operations have become increasingly important elements of U.S. national security policy. From the deployment of Stuxnet to disrupt Iranian centrifuges to the possible use of cyber methods against North Korean ballistic missile launches, the prominence of offensive cyber capabilities as instruments of national power continues to grow. Yet conceptual thinking lags behind the technical development of these new weapons. How might offensive cyber operations be used in coercion or conflict? What strategic considerations should guide their development and use?
The Digital Transformation (DX) is a broad term describing the changes and innovations brought about by the introduction of information and communication technologies into all aspects of society. One such innovation is to empower bottom-up, self-governing socio-technical systems for a range of applications. Such systems can be based on Ostrom’s design principles for self-governing institutions for sustainable common-pool resource management.
This study’s purpose was to highlight the changing safety and security landscape engendered by the emergence of new genome editing technologies, help policy-makers and other stakeholders navigate this space, and illuminate broader trends in the life sciences that may impact the biosecurity landscape.
For three and a half decades following the end of the Maoist era, China adhered to Deng Xiaoping’s policies of “reform and opening to the outside world” and “peaceful development.” After Deng retired as paramount leader, these principles continued to guide China’s international behavior in the leadership eras of Jiang Zemin and Hu Jintao.
Excerpt from: "Cyber Security Derailed? Recommendations for Smarter Investments in Infrastructure." War on the Rocks. November, 2018. Online.
A state-owned Chinese company receives a contract to build and maintain the next generation of railcars that service Metro stations at the Pentagon, near the White House and Capitol Hill, and throughout the Washington, D.C., metro area. What could possibly go wrong?
This publication summarizes the agricultural policy analyses conducted in nine Caribbean countries (Suriname, Guyana, Haiti, Dominican Republic, Jamaica, Belize, Barbados, The Bahamas, and Trinidad and Tobago) in the framework of the IDB’s Agrimonitor initiative. The document discusses how agricultural policies affect producers and consumers as well as how the limited funding for agricultural services, such as research and infrastructure, could limit the ability of Caribbean farmers to compete effectively in global markets.
Abstract: The failure of experts and lay people to understand each other has been fueling conflict around the environmental clean-up of the many sites in the United States that are contaminated by the nuclear weapons program. This mutual distrust was exacerbated by the culture of secrecy surrounding the atomic weapons program during World War II, and later by the innate culture of bureaucracy in the federal agencies that have sprung up since then.
The extent to which armed conflicts—events such as civil wars, rebellions, and interstate conflicts—are an important driver of child mortality is unclear. While young children are rarely direct combatants in armed conflict, the violent and destructive nature of such events might harm vulnerable populations residing in conflict-affected areas. A 2017 review estimated that deaths of individuals not involved in combat outnumber deaths of those directly involved in the conflict, often more than five to one.
Abstract: Across the world, states are establishing military cyber commands or similar units to develop offensive cyber capabilities. One of the key dilemmas faced by these states is whether (and how) to integrate their intelligence and military capabilities to develop a meaningful offensive cyber capacity. This topic, however, has received little theoretical treatment. The purpose of this paper is therefore to address the following question: What are the benefits and risks of organizational integration of offensive cyber capabilities (OIOCC)?
In March 2018 the Taiwan Democracy and Security Project, a part of the U.S.-Asia Security Initiative at Stanford University’s Shorenstein Asia- Pacific Research Center, convened a workshop that examined Taiwan’s place in the evolving security environment of East Asia. Participants from the United States, Taiwan, and elsewhere in Asia were experts on a wide array of economic, diplomatic, and security topics.
From 31 January through 1 February 2018, Stanford University’s U.S.-Asia Security Initiative (USASI) and the Sasakawa Peace Foundation (SPF), gathered in Tokyo representatives from the government, defense, and academic sectors of the United States and Japan for the second workshop of the U.S.-Japan Security and Defense Dialogue Series.
Abstract: This commentary reviews and discusses HBO’s new documentary, Atomic Homefront, which shows how communities are still struggling to live with radiation from radioactive waste generated more than 70 years ago during the race to build the atomic bomb—part of a secret government effort during World War II known as the Manhattan Project.
Climate-induced shocks in grain production are a major contributor to global market volatility, which creates uncertainty for cereal farmers and agribusiness and reduces food access for poor consumers when production falls and prices spike.
Poor air quality is thought to be an important mortality risk factor globally, but there is little direct evidence from the developing world on how mortality risk varies with changing exposure to ambient particulate matter. Current global estimates apply exposure-response relationships that have been derived mostly from wealthy, mid-latitude countries to spatial population data, and these estimates remain unvalidated across large portions of the globe.
This third volume in the Japan Decides series remains the premier venue for scholarly research on Japanese elections. Spotlighting the 2017 general election, the contributors discuss the election results, party politics, coalition politics with Komeito, the cabinet, constitutional revision, new opposition parties, and Abenomics. Additionally, the volume looks at campaigning, public opinion, media, gender issues and representation, North Korea and security issues, inequality, immigration and cabinet scandals.
Supported by Chinese officials and authoritative commentary, President Xi Jinping continued a moderate and cooperative posture toward Southeast Asia in early 2018, reaching a highpoint in Xi’s keynote address on April 10 at the annual Boao Forum for Asia in Hainan Province. Then, the posture switched dramatically to the surprise of many at home and abroad. On April 12, Xi appeared in military uniform addressing troops in the South China Sea participating in the largest naval review in China’s history.