Reshaping U.S. Smart Power: Towards a Post-Pandemic Security Architecture
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Analysis of Cyberwarfare Ethics As It Pertains to Civilian Computer Networks/Infrastructures
Analysis of Cyberwarfare Ethics as It Pertains to Civilian Computer Networks/Infrastructures Vanessa Paradine Terms of Reference and Scope The Department of Defense (DoD) currently operates more than fifteen thousand different computer networks across four thousand military installations around the world, with as many as seven million DoD computers and telecommunications tools in use in eighty-eight countries.1 These networks experience over six million unauthorized probes per day.2 Due to the close integration of DoD and commercial networks, an attack within the cyber domain may significantly impact critical civilian infrastructures and networks. For the purpose of this article, the following definitions are pro vided: • Cyberspace, as defined by the National Security Presidential Di rective 541H0meland Security Presidential Directive 23, is "the interdependent network of information technology infrastruc tures, and includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers in critical industries."3 • Cyberspace operations is defined as "the employment of cy berspace capabilities where the primary purpose is to achieve military objectives or effects in or through cyberspace."4 • Cyberwarfare/cyberattack has not been defined by the Depart ment of the Defense (DoD); however, according to Deputy Defense Secretary William J. Lynn III, it can include a range of things-"from exploitation and exfiltration of data to degrada tion of networks to destruction of networks or even physical equipment, physical property."5 • Cyber Threats6 o Virtual-nonkinetic threats to DoD information networks that are just as real and damaging as physical threats. 34 Internatianal Journal of Intelligence Ethics, Vol. 4, No. 1 / Spring/Summer 2013 Analysis of Cyberwarfare Ethics 35 o Physical-kinetic threats mixed with nonkinetic threats; can severely impact the effectiveness of military joint operations. -
1 Brazil's Smart Power: a New Way to Influence International Politics Danielle Jacon Ayres Pinto1 SUMARY the Strategy of Brazili
Brazil's Smart Power: A New Way to Influence International Politics Danielle Jacon Ayres Pinto1 SUMARY The strategy of Brazilian foreign policy in the last decade shows a latent desire to increase your international importance and regional leadership. However, the molds of this projection and leadership were grounded, reveals a change in traditional patterns of international influence, the focus of Brazilian’s foreign policy is influence others countries without coercive force, just with cooperation and multilateral relations. In that sense, this paper aims to explore the idea of a new form of leadership and international influence that can be analyzed through the conceptual prism of Smart Power created by the author Joseph Nye Jr., and how this new perspective can be applied in the current Brazilian foreign policy. Smart Power is understood as the junction of three kinds of power: military, economic and soft power, and to improve it is necessary to think develop five areas: alliances, partnerships and institutions, global development, public diplomacy; economic integration and innovation and technology. So, this paper wants to show how that new way of power, SMART POWER, can be useful to build a different kind of international influence in the twenty-first century. Keywords: Smart Power, Absolute Gains, Foreign Policy, Brazil 1. Introduction To think the Brazilian’s strategy foreign policy in the last decade, more than an exercise in analyzing the facts of reality, it is a rethinking of theories of international relations and how States, major actors on the international scene, adapted their actions to achieve their political, economic and also military objectives. -
Reaching Beyond the Ivory Tower: a “How To” Manual *
Reaching Beyond the Ivory Tower: A “How To” Manual * Daniel Byman and Matthew Kroenig Security Studies (forthcoming, June 2016) *For helpful comments on earlier versios of this article, the authors would like to thank Michael C. Desch, Rebecca Friedman, Bruce Jentleson, Morgan Kaplan, Marc Lynch, Jeremy Shapiro, and participants in the Program on International Politics, Economics, and Security Speaker Series at the University of Chicago, participants in the Nuclear Studies Research Initiative Launch Conference, Austin, Texas, October 17-19, 2013, and members of a Midwest Political Science Association panel. Particular thanks to two anonymous reviewers and the editors of Security Studies for their helpful comments. 1 Joseph Nye, one of the rare top scholars with experience as a senior policymaker, lamented “the walls surrounding the ivory tower never seemed so high” – a view shared outside the academy and by many academics working on national security.1 Moreover, this problem may only be getting worse: a 2011 survey found that 85 percent of scholars believe the divide between scholars’ and policymakers’ worlds is growing. 2 Explanations range from the busyness of policymakers’ schedules, a disciplinary shift that emphasizes theory and methodology over policy relevance, and generally impenetrable academic prose. These and other explanations have merit, but such recommendations fail to recognize another fundamental issue: even those academic works that avoid these pitfalls rarely shape policy.3 Of course, much academic research is not designed to influence policy in the first place. The primary purpose of academic research is not, nor should it be, to shape policy, but to expand the frontiers of human knowledge. -
Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type. -
Cognitive Warfare.Pdf
1 Table of Contents Executive Summary 3 Introduction 5 Evolution of Non-Kinetic Warfare 6 Origins 6 Psychological Warfare (PsyOps) 7 Electronic Warfare (EW) 7 Cyberwarfare 8 Information Warfare 8 Cognitive Warfare 9 Goals of Cognitive Warfare 11 Destabilization 12 Case 1: Destabilization through Confusion 13 Case 2: Destabilization by Sowing Division 15 Case 3: Destabilization as a Means to Influence 17 Influence 20 Case 1: Influencing to Recruit 21 Case 2: Influencing Policy Enactment 22 Case 3: Influencing as a Means to Destabilize 23 Future Threats 27 Looking Ahead 27 Threat 1: Ease of Selection and Virality 29 Threat 2: A New Age of Truth 30 Threat 3: Cyber-induced Institutional Discomfort and Distrust 31 Threat 4: Biological and Therapeutic Emotional Manipulation 32 Threat 5: Enhanced Recruitment of Agents 33 Strategy Recommendations 35 Threat Recognition Framework and Criteria 35 Risk Assessment 36 Organizational Implementations 37 Offensive Considerations 39 Closing Thoughts 40 Bibliography 41 2 Executive Summary Warfare has shifted dramatically over the past several decades, moving away from the physical threats of conventional warfare. War now moves towards the social and ideological threats brought about by mass media and advances in technology. The advent of this new type of warfare is different from anything we have seen before. Although it takes elements from previous types of hybrid warfare, the reach and level of impact it possesses make it far more dangerous than its predecessors. We have dubbed this new way of war cognitive warfare. Cognitive warfare, although sharing various similarities to other non-conventional and non-kinetic types of warfare/operations, is ultimately unique in its execution and purpose. -
H-Diplo Article Review Forum Commissioned for H-Diplo by Thomas Maddux Published on 16 May 2016
H-Diplo Article Review 20 16 H-Diplo Article Review Editors: Thomas Maddux H-Diplo and Diane Labrosse H-Diplo Article Reviews Web and Production Editor: George Fujii No. 614 An H-Diplo Article Review Forum Commissioned for H-Diplo by Thomas Maddux Published on 16 May 2016 H-Diplo Forum on “Beyond and Between the Cold War Blocs,” Special Issue of The International History Review 37:5 (December 2015): 901-1013. Introduction by Janick Marina Schaufelbuehl, University of Lausanne; Sandra Bott University of Lausanne; Jussi Hanhimäki, Graduate Institute of International and Development Studies; and Marco Wyss, University of Chichester Reviewed by: Anne Deighton, The University of Oxford Juergen Dinkel, Justus-Liebig-University Wen-Qing Ngoei, Northwestern University Johanna Rainio-Niemi, University of Helsinki, Finland URL: http://tiny.cc/AR614 Introduction1 by Janick Marina Schaufelbuehl, Sandra Bott, Jussi Hanhimäki, and Marco Wyss2 “Non-Alignment, the Third Force, or Fence-Sitting: Independent Pathways in the Cold War” n his recollection of recent events such as the Bandung Conference, the Soviet proposals for a unified and neutralised Germany, and the signing of the Austrian Treaty, veteran journalist Hanson W. Baldwin Iwrote in the New York Times in May 1955 that these ‘and half a dozen other developments in Europe and 1 H-Diplo would like to thanks Professor Andrew Williams, editor of IHR, and the four authors of this introduction, for granting us permission to publish this review. It original appeared as “Janick Marina Schaufelbuehl, Sandra Bott, Jussi Hanhimäki, and Marco Wyss, “Non-Alignment, the Third Force, or Fence-Sitting: Independent Pathways in the Cold War.” The International History Review 37:5 (December 2015): 901-911. -
International Relations in a Changing World: a New Diplomacy? Edward Finn
INTERNATIONAL RELATIONS IN A CHANGING WORLD: A NEW DIPLOMACY? EDWARD FINN Edward Finn is studying Comparative Literature in Latin and French at Princeton University. INTRODUCTION The revolutionary power of technology to change reality forces us to re-examine our understanding of the international political system. On a fundamental level, we must begin with the classic international relations debate between realism and liberalism, well summarised by Stephen Walt.1 The third paradigm of constructivism provides the key for combining aspects of both liberalism and realism into a cohesive prediction for the political future. The erosion of sovereignty goes hand in hand with the burgeoning Information Age’s seemingly unstoppable mechanism for breaking down physical boundaries and the conceptual systems grounded upon them. Classical realism fails because of its fundamental assumption of the traditional sovereignty of the actors in its system. Liberalism cannot adequately quantify the nebulous connection between prosperity and freedom, which it assumes as an inherent truth, in a world with lucrative autocracies like Singapore and China. Instead, we have to accept the transformative power of ideas or, more directly, the technological, social, economic and political changes they bring about. From an American perspective, it is crucial to examine these changes, not only to understand their relevance as they transform the US, but also their effects in our evolving global relationships.Every development in international relations can be linked to some event that happened in the past, but never before has so much changed so quickly at such an expansive global level. In the first section of this article, I will examine the nature of recent technological changes in diplomacy and the larger derivative effects in society, which relate to the future of international politics. -
The 'Great Debates' in International Relations Theory
The ‘Great Debates’ in international relations theory Written by IJ Benneyworth This PDF is auto-generated for reference only. As such, it may contain some conversion errors and/or missing information. For all formal use please refer to the official version on the website, as linked below. The ‘Great Debates’ in international relations theory https://www.e-ir.info/2011/05/20/the-%e2%80%98great-debates%e2%80%99-in-international-relations-theory/ IJ BENNEYWORTH, MAY 20 2011 International relations in the most basic sense have existed since neighbouring tribes started throwing rocks at, or trading with, each other. From the Peloponnesian War, through European poleis to ultimately nation states, Realist trends can be observed before the term existed. Likewise the evolution of Liberalist thinking, from the Enlightenment onwards, expressed itself in calls for a better, more cooperative world before finding practical application – if little success – after The Great War. It was following this conflict that the discipline of International Relations (IR) emerged in 1919. Like any science, theory was IR’s foundation in how it defined itself and viewed the world it attempted to explain, and when contradictory theories emerged clashes inevitably followed. These disputes throughout IR’s short history have come to be known as ‘The Great Debates’, and though disputed it is generally felt there have been four, namely ‘Realism/Liberalism’, ‘Traditionalism/Behaviouralism’, ‘Neorealism/Neoliberalism’ and the most recent ‘Rationalism/Reflectivism’. All have had an effect on IR theory, some greater than others, but each merit analysis of their respective impacts. First we shall briefly explore the historical development of IR theory then critically assess each Debate before concluding. -
Civilians in Cyberwarfare: Conscripts
Civilians in Cyberwarfare: Conscripts Susan W. Brenner* with Leo L. Clarke** ABSTRACT Civilian-owned and -operated entities will almost certainly be a target in cyberwarfare because cyberattackers are likely to be more focused on undermining the viability of the targeted state than on invading its territory. Cyberattackers will probably target military computer systems, at least to some extent, but in a departure from traditional warfare, they will also target companies that operate aspects of the victim nation’s infrastructure. Cyberwarfare, in other words, will penetrate the territorial borders of the attacked state and target high-value civilian businesses. Nation-states will therefore need to integrate the civilian employees of these (and perhaps other) companies into their cyberwarfare response structures if a state is to be able to respond effectively to cyberattacks. While many companies may voluntarily elect to participate in such an effort, others may decline to do so, which creates a need, in effect, to conscript companies for this purpose. This Article explores how the U.S. government can go about compelling civilian cooperation in cyberwarfare without violating constitutional guarantees and limitations on the power of the Legislature and the Executive. * NCR Distinguished Professor of Law and Technology, University of Dayton School of Law. ** Associate, Drew, Cooper & Anding, P.C., Grand Rapids, Michigan. 1011 1012 Vanderbilt Journal of Transnational Law [Vol. 43:1011 TABLE OF CONTENTS I. INTRODUCTION ............................................................. -
The Ethics of Cyberwarfare Randall R
This article was downloaded by: [University of Pennsylvania] On: 28 February 2013, At: 08:22 Publisher: Routledge Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK Journal of Military Ethics Publication details, including instructions for authors and subscription information: http://www.tandfonline.com/loi/smil20 The Ethics of Cyberwarfare Randall R. Dipert a a SUNY (State University of New York) at Buffalo, NY, USA Version of record first published: 16 Dec 2010. To cite this article: Randall R. Dipert (2010): The Ethics of Cyberwarfare, Journal of Military Ethics, 9:4, 384-410 To link to this article: http://dx.doi.org/10.1080/15027570.2010.536404 PLEASE SCROLL DOWN FOR ARTICLE Full terms and conditions of use: http://www.tandfonline.com/page/terms-and- conditions This article may be used for research, teaching, and private study purposes. Any substantial or systematic reproduction, redistribution, reselling, loan, sub-licensing, systematic supply, or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to date. The accuracy of any instructions, formulae, and drug doses should be independently verified with primary sources. The publisher shall not be liable for any loss, actions, claims, proceedings, demand, or costs or damages whatsoever or howsoever caused arising directly or indirectly in connection with or arising out of the use of this material. Journal of Military Ethics, Vol. 9, No. 4, 384Á410, 2010 The Ethics of Cyberwarfare RANDALL R. -
Smart Power’ and Its Impact on the Transatlantic Security Partnership
The US Shift Towards ‘Smart Power’ and its Impact on the Transatlantic Security Partnership EU Diplomacy Papers 2 / 2010 Sophie Lecoutre Department of EU International Relations and Diplomacy Studies www.coleurope.eu Department of EU International Relations and Diplomacy Studies EU Diplomacy Papers 2/2010 The US Shift towards ‘Smart Power’ and its Impact on the Transatlantic Security Partnership Sophie Lecoutre © Sophie Lecoutre 2010 Dijver 11 | BE-8000 Bruges, Belgium | Tel. +32 (0)50 477 251 | Fax +32 (0)50 477 250 | E-mail [email protected] | www.coleurope.eu/ird Sophie Lecoutre About the Author Sophie Lecoutre holds a Master’s degree in European Studies (2008) from the Institute of Political Science of Lille, France, which included an exchange year at the University of Virginia’s College of Arts and Sciences, United States (2007). In 2009, she completed the MA in EU International Relations and Diplomacy Studies (Marcus Aurelius promotion) at the College of Europe in Bruges, Belgium. She is currently carrying out an internship at the French Permanent Representation to NATO in Brussels. This paper is a shortened and updated version of her Master’s thesis submitted at the College of Europe. Editorial Team: Benjamin Barton, André Ghione, Sieglinde Gstöhl, Dieter Mahncke, Jing Men, Anne- Claire Marangoni, Hugo Palma, Shannon Petry Dijver 11 | BE-8000 Bruges, Belgium | Tel. +32 (0)50 477 251 | Fax +32 (0)50 477 250 | E-mail [email protected] | www.coleurope.eu/ird Views expressed in the EU Diplomacy Papers are those of the authors only and do not necessarily reflect positions of either the series editors or the College of Europe. -
Department of Political Science Semester-IV (General Course)
Department of Political Science By: Dr. Prafulla Kumar Das Semester-IV (General Course) DSC-1D (CC-4): Introduction to International Relations Credit 06 DSC1DT: Introduction to International Relations Course Content: 1. Approaches to International Relations b) Neo-Liberalism: Complex Interdependence (Robert O. Keohane and Joseph Nye) ( : Liberalism)) ও উপ উপ উ ও ও প , , প , , , উ উপ উ Liberalism উ liberalis উ । উ উ - ।উ ও প । উ ও উ । উ প , ও ও প । প ১৭৭৬ " "। ও , ও প , প । প , ও । উ ও উৎ ও প ও প উ উ প , প প ও প প ও উ ও , , ও ও ও , উ , ও , , ও । উ প , ও উ - ৎ , উ প , ও ও । Complex interdependence Complex interdependence in international relations is the idea put forth by Robert Keohane and Joseph Nye. The term "complex interdependence" was claimed by Raymond Leslie Buell in 1925 to describe the new ordering among economies, cultures and races. The very concept was popularized through the work of Richard N. Cooper (1968). With the analytical construct of complex interdependence in their critique of political realism, "Robert Keohane and Joseph Nye go a step further and analyze how international politics is transformed by interdependence" . The theorists recognized that the various and complex transnational connections and interdependencies between states and societies were increasing, while the use of military force and power balancing are decreasing but remain important. In making use of the concept of interdependence, Keohane and Nye also importantly differentiated between interdependence and dependence in analyzing the role of power in politics and the relations between international actors.