International Engagement on Cyber: 2012

Special Promotional Release

International Engagement on Cyber: 2012

On Sale at 15% off the cover price. Shop HERE.

(Sales are done through our online partner, GUiSD)



by Catherine Lotrionte and Tim Maurer

In a diverse cyberspace, building and maintaining trust amongst the public and private entities that operate within the domain becomes increasingly necessary. Without proper institutions to safeguard this understanding, a myriad of moving pieces will render the system increasingly volatile. (continue reading…) 


CONTENT

Multilateral Approaches for Improving Global Security in Cyberspace by Bob Butler and Irving Lachow

Nation-states must take the lead in promoting greater cyber security by being appropriately orga- nized, employing best technical capabilities, and partnering with the private sector.  (continue reading…)

Use of Force & Cyber Operations by Catherine Lotrionte

The post-Charter digital era presents complex and unique challenges to the manner in which the traditional protocol of warfare interacts with international legal norms. The rubric of inter-state cyber policy needs to be augmented in order to account for hostile engagement in this new domain. (continue reading…)

Confidence-building measures can serve as international rules of law governing state actors’ use of “information weapons” and thereby produce the mutual understanding needed for a peaceful infor- mation domain. (continue reading…)

Despite taking the threat of cyber warfare seriously, the Chinese government has actually struggled to create a bureaucratic mechanism to handle emergencies. China’s reluctance to engage in inter- national cyber security cooperation stems more from its diplomatic discourse and national interests than from any desire to engage in cyber warfare. (continue reading…)

The Implications of Mandates in International Cyber Affairs by Eneken Tikk-Ringas

Hazy notions of cyber security and the inconsistency of mandates of international organizations result in oftentimes trivial and non-actionable output from these organizations’ discussions of strategic cyber issues. Venue-shopping for friendly entities by nations compounds the problem of ineffective international cyber-security governance. Better defining the issues and expected remedies as well as a reasonable choice of venue would add consistency and credibility to international cyber deliberations. (continue reading…)

A Balkanized Internet? The Uncertain Future of Global Internet Standards by Jonah Force Hill

The Internet as it exists today faces the threat of the potential collapse of the Internet standards- development process, as many nations feel the current process unfairly benefits Western and developed countries. Were the Internet standards development process to collapse, the Internet would likely “balkanize” with individual nations or groups of nations using different underlying technologies for the Internet. (continue reading…)

Congressional Oversight of Hostilities in the Fifth Domain: Cyber Conflict and the War Powers Resolution by Jason Healey and A.J. Wilson

The War Powers Resolution should apply to cyber operations in the same way that it applies to physical conflicts because the waging of cyber warfare should not be left to the Executive alone. This article analyzes the critical provisions of the WPR, discusses its narrow interpretation by the current administration, and introduces the concept of ‘logical presence.’ (continue reading…)

Leadership and Responsibility for Cybersecurity by Melissa Hathaway

Leaders in government and private industry must work proactively to study, adapt, and enact cyber security measures and integrate them into core infrastructures to meet the continuously evolving nature of cyber threats. When this fails to occur, leaders must be held accountable.  (continue reading…)

Why Cybersecurity is Hard by Robert Ghanea-Hercock

Cyber security remains an unresolved problem because it is a complex adaptive system that is complicated by multiple technical, policy, and social dimensions. Unfortunately, the wider cyber security community has yet to recognize the real nature of the threat and persists in utiliz- ing rigid strategies. Ghanea-Hercock outlines a number of defenses that must be implemented to address this problem. (continue reading…)

Perspective: Not all Vendors and Products are Created Equal by John N. Stewart

In an electronic world, digital security threats have myriad ways of infiltrating infrastructure systems and supply chains. Preventing this requires a renewed focus on verifiable, quantifiable trust at every step of the business process. (continue reading…)

The Key Terrain of Cyber by John R. Mills

Traditional, Clausewitzean concepts of key terrain apply to the realm of cybersecurity. This critical cyber terrain must be controlled, or at least decisively influenced, to maintain relevancy and construct the future path of cyber. (continue reading…)

Global Fight Against Cybercrime: Undoing the Paralysis by Zahid Jamil

The Budapest Convention on Cybercrime represents the only international instrument and the best hope for countries to establish common minimum standards of relevant offenses, prevent criminals operating from jurisdictions with lower standards, and enable speedy and twenty- four-seven international cooperation between law enforcement. However, the Convention faces determined and organized opposition from several corners, which have traditionally promoted a greater role in the regulation of the Internet for UN bodies.  (continue reading…)

Achieving International Cyber Stability by Franklin D. Kramer

Stabilization of the cyber domain is key to the security interests of both the United States and the international community. Building up relevant institutions and norms to ensure a measure of order will rely upon a tri-pronged platform of resilience, cooperation, and transparency.  (continue reading…)


 TRANSCRIPTIONS

Free transcripts of all 4 expert panels featured at the Institute for Law, Science, and Global Security’s “International Engagement in Cyberspace 2012” conference

Introductory Remarks 

Moderator: Catherine Lotrionte | Keynote Speakers: William J. Lynn III, Jane Holl Lute, Howard A. Schmidt

Panel 1: National Security and Diplomatic Efforts 

Panel Chair: Christopher M. Painter | Panelists: Gerben Klein Baltink, Steven Schleien, Rear Admiral Samuel J. Cox, Dr. Anatoly Streltsov

Panel 2: Law Enforcement Efforts Across National Borders 

Panel Chair: Shawn Henry | Panelists: Adrian Ciprian Miron, Zahid Jamil, Judge Stein Schjolberg, Noboru Nakatani

Panel 3: Commercial Perspectives on Cyber Security 

Panel Chair: Eddie Schwartz | Panelists: Robert Dix, Dr. Robert Ghanea-Hercock, Rick Howard, Rear Admiral Jamie Barnett (Ret.), Scott Borg

Panel 4: International Collaborative Responses to Cyber Incidences 

Panel Chair: Gen. Michael Hayden (Ret.) | Panelists: Andrea Rigoni, Dr. Gregory J. Rattray, Rt. Hon. Lord Reid of Cardowan, Peiran Wang, Gavin Reid, Jaan Priisalu



Support the Journal’s “International Engagement on Cyber” Initiative

  • Order International Engagement on Cyber: 2012 HERE.
  • To place an advertisement in the 2013 edition, click HERE.
  • To explore bulk deal options for distribution at conferences and events, click HERE.
  • To read articles from International Engagement on Cyber: 2011, click HERE.
  • To make a gift/donation to the initiative, please contact William Handel at wsh23@georgetown.edu for details.