Special Promotional Release
International Engagement on Cyber: 2012
On Sale at 15% off the cover price. Shop HERE.
(Sales are done through our online partner, GUiSD)
by Catherine Lotrionte and Tim Maurer
In a diverse cyberspace, building and maintaining trust amongst the public and private entities that operate within the domain becomes increasingly necessary. Without proper institutions to safeguard this understanding, a myriad of moving pieces will render the system increasingly volatile. (continue reading…)
Nation-states must take the lead in promoting greater cyber security by being appropriately orga- nized, employing best technical capabilities, and partnering with the private sector. (continue reading…)
The post-Charter digital era presents complex and unique challenges to the manner in which the traditional protocol of warfare interacts with international legal norms. The rubric of inter-state cyber policy needs to be augmented in order to account for hostile engagement in this new domain. (continue reading…)
Confidence-building measures can serve as international rules of law governing state actors’ use of “information weapons” and thereby produce the mutual understanding needed for a peaceful infor- mation domain. (continue reading…)
Despite taking the threat of cyber warfare seriously, the Chinese government has actually struggled to create a bureaucratic mechanism to handle emergencies. China’s reluctance to engage in inter- national cyber security cooperation stems more from its diplomatic discourse and national interests than from any desire to engage in cyber warfare. (continue reading…)
Hazy notions of cyber security and the inconsistency of mandates of international organizations result in oftentimes trivial and non-actionable output from these organizations’ discussions of strategic cyber issues. Venue-shopping for friendly entities by nations compounds the problem of ineffective international cyber-security governance. Better defining the issues and expected remedies as well as a reasonable choice of venue would add consistency and credibility to international cyber deliberations. (continue reading…)
The Internet as it exists today faces the threat of the potential collapse of the Internet standards- development process, as many nations feel the current process unfairly benefits Western and developed countries. Were the Internet standards development process to collapse, the Internet would likely “balkanize” with individual nations or groups of nations using different underlying technologies for the Internet. (continue reading…)
The War Powers Resolution should apply to cyber operations in the same way that it applies to physical conflicts because the waging of cyber warfare should not be left to the Executive alone. This article analyzes the critical provisions of the WPR, discusses its narrow interpretation by the current administration, and introduces the concept of ‘logical presence.’ (continue reading…)
Leaders in government and private industry must work proactively to study, adapt, and enact cyber security measures and integrate them into core infrastructures to meet the continuously evolving nature of cyber threats. When this fails to occur, leaders must be held accountable. (continue reading…)
Cyber security remains an unresolved problem because it is a complex adaptive system that is complicated by multiple technical, policy, and social dimensions. Unfortunately, the wider cyber security community has yet to recognize the real nature of the threat and persists in utiliz- ing rigid strategies. Ghanea-Hercock outlines a number of defenses that must be implemented to address this problem. (continue reading…)
In an electronic world, digital security threats have myriad ways of infiltrating infrastructure systems and supply chains. Preventing this requires a renewed focus on verifiable, quantifiable trust at every step of the business process. (continue reading…)
Traditional, Clausewitzean concepts of key terrain apply to the realm of cybersecurity. This critical cyber terrain must be controlled, or at least decisively influenced, to maintain relevancy and construct the future path of cyber. (continue reading…)
The Budapest Convention on Cybercrime represents the only international instrument and the best hope for countries to establish common minimum standards of relevant offenses, prevent criminals operating from jurisdictions with lower standards, and enable speedy and twenty- four-seven international cooperation between law enforcement. However, the Convention faces determined and organized opposition from several corners, which have traditionally promoted a greater role in the regulation of the Internet for UN bodies. (continue reading…)
Stabilization of the cyber domain is key to the security interests of both the United States and the international community. Building up relevant institutions and norms to ensure a measure of order will rely upon a tri-pronged platform of resilience, cooperation, and transparency. (continue reading…)
Free transcripts of all 4 expert panels featured at the Institute for Law, Science, and Global Security’s “International Engagement in Cyberspace 2012” conference
Moderator: Catherine Lotrionte | Keynote Speakers: William J. Lynn III, Jane Holl Lute, Howard A. Schmidt
Panel Chair: Christopher M. Painter | Panelists: Gerben Klein Baltink, Steven Schleien, Rear Admiral Samuel J. Cox, Dr. Anatoly Streltsov
Panel Chair: Shawn Henry | Panelists: Adrian Ciprian Miron, Zahid Jamil, Judge Stein Schjolberg, Noboru Nakatani
Panel Chair: Eddie Schwartz | Panelists: Robert Dix, Dr. Robert Ghanea-Hercock, Rick Howard, Rear Admiral Jamie Barnett (Ret.), Scott Borg
Panel Chair: Gen. Michael Hayden (Ret.) | Panelists: Andrea Rigoni, Dr. Gregory J. Rattray, Rt. Hon. Lord Reid of Cardowan, Peiran Wang, Gavin Reid, Jaan Priisalu
Support the Journal’s “International Engagement on Cyber” Initiative
- Order International Engagement on Cyber: 2012 HERE.
- To place an advertisement in the 2013 edition, click HERE.
- To explore bulk deal options for distribution at conferences and events, click HERE.
- To read articles from International Engagement on Cyber: 2011, click HERE.
- To make a gift/donation to the initiative, please contact William Handel at email@example.com for details.