America's Cyber Future Security and Prosperity in the Information

Total Page:16

File Type:pdf, Size:1020Kb

America's Cyber Future Security and Prosperity in the Information America’s Cyber Future JUNE 2011 Security and Prosperity in the Information Age VOLUME II Edited by Kristin M. Lord and Travis Sharp Contributors: Robert E. Kahn, Mike McConnell, Joseph S. Nye, Jr. and Peter Schwartz (co-chairs); Nova J. Daly, Nathaniel Fick, Martha Finnemore, Richard Fontaine, Daniel E. Geer Jr., David A. Gross, Jason Healey, James A. Lewis, Kristin M. Lord, M. Ethan Lucarelli, Thomas G. Mahnken, Gary McGraw, Roger H. Miksad, Gregory J. Rattray, Will Rogers, Christopher M. Schroeder and Travis Sharp Acknowledgments The authors would like to thank the more than 200 people who generously contributed their time and expertise to this proj- ect. We are especially indebted to our co-chairs Bob Kahn, Mike McConnell, Joe Nye and Peter Schwartz for their tremendous support and guidance over the past year. We also thank our contributing authors for producing such insightful essays. We are particularly grateful to the many people who reviewed drafts of the papers included in this volume, including Irv Lachow, James Mulvenon, Charles Dunlap, Eric Rosenbach, Jeff Lord, Tom Gjelten, Greg Rattray, David Asher, Jeff Pryce, Andrew Lewman, Daniel Calingeart, David Gross, Nova Daly and several anonymous reviewers. In addition, we wish to thank the dozens of dedicated professionals in the U.S. government, armed services and private sector who candidly shared their perspectives. We also thank Global Business Network for hosting a workshop in San Francisco in February 2011, as well as the many technologists and other experts who attended. Peter Schwartz, David Babington and Audrey Plonk deserve special recognition for making the workshop a success. We would like to recognize the valuable contributions made by our colleagues at CNAS, particularly Nate Fick, John Nagl, Tom Ricks, Richard Fontaine, Andrew Exum, Christine Parthemore, Brian Burton, Bill Uhlmeyer, Richard Weitz and Will Rogers. Nora Bensahel was a diligent and helpful editor. Liz Fontaine provided her usual high caliber of design expertise. Finally, we offer special thanks to our colleagues Abe Denmark, who played a key role in launching this project and partici- pated in many of our working group sessions, and Jessica Glover and Jackie Koo, who provided scrupulous research and fact checking for this report. Readers should note that the views expressed in each essay of Volumes I and II belong to the author(s) alone. They do not necessarily reflect the views of the editors, co-chairs or any of the other contributing authors, nor do they necessarily reflect the views of the authors’ employers or any other organization. A Note about Funding This report was made possible, in part, through the generous support of the Markle Foundation. The opinions expressed in the report are those of the authors and do not necessarily reflect the views of the Markle Foundation. Some organizations and companies that are mentioned in this report or have vested interests related to cyber security sup- port CNAS financially. CNAS retains sole editorial control over its projects and maintains a broad and diverse group of more than one hundred funders including foundations, government agencies, corporations and private individuals. A complete list of CNAS’ financial supporters can be found at http://www.cnas.org/support/our-supporters. Cover Image (ISTOCK) JUNE 2011 America’s Cyber Future Security and Prosperity in the Information Age VOLUME II Edited by Kristin M. Lord and Travis Sharp Contributors: Robert E. Kahn, Mike McConnell, Joseph S. Nye, Jr. and Peter Schwartz (co- chairs); Nova J. Daly, Nathaniel Fick, Martha Finnemore, Richard Fontaine, Daniel E. Geer Jr., David A. Gross, Jason Healey, James A. Lewis, Kristin M. Lord, M. Ethan Lucarelli, Thomas G. Mahnken, Gary McGraw, Roger H. Miksad, Gregory J. Rattray, Will Rogers, Christopher M. Schroeder and Travis Sharp America’s Cyber Future JUNE 2011 Security and Prosperity in the Information Age About the Contributors (in order of appearance) Kristin M. Lord is Vice President and Director of Studies at the Center for a New American Security. Travis Sharp is the Bacevich Fellow at the Center for a New American Security. Joseph S. Nye, Jr. is University Distinguished Service Professor at the Kennedy School of Government at Harvard University. Mike McConnell is Executive Vice President of Booz Allen Hamilton and former Director of National Intelligence and Director of the National Security Agency. Gary McGraw is Chief Technology Officer of Cigital, Inc., a software security consultancy, and author of eight books on software security. Nathaniel Fick is Chief Executive Officer of the Center for a New American Security. Thomas G. Mahnken is Jerome E. Levy Chair of Economic Geography and National Security at the U.S. Naval War College and a Visiting Scholar at the Johns Hopkins School of Advanced International Studies. Gregory J. Rattray is a Partner at Delta Risk LLC and Senior Vice President for Security at BITS, the technology policy division of The Financial Services Roundtable. Jason Healey is Director of the Cyber Statecraft Initiative at the Atlantic Council and Executive Director of the Cyber Conflict Studies Association. Martha Finnemore is Professor of Political Science and International Affairs at The George Washington University. David A. Gross is a Partner at Wiley Rein LLP and a former Ambassador and Coordinator for International Communications and Information Policy at the State Department. Nova J. Daly is a Public Policy Consultant at Wiley Rein LLP and former Deputy Assistant Secretary for Investment Security in the Office of International Affairs at the Treasury Department. M. Ethan Lucarelli is an Associate at Wiley Rein LLP. Roger H. Miksad is an Associate at Wiley Rein LLP. James A. Lewis is a Senior Fellow and Director of the Technology and Public Policy Program at the Center for Strategic and International Studies. Richard Fontaine is a Senior Fellow at the Center for a New American Security. Will Rogers is a Research Associate at the Center for a New American Security. Christopher M. Schroeder is an Internet entrepreneur, Chief Executive Officer of HealthCentral. com and a member of the Center for a New American Security’s board of advisors. Daniel E. Geer, Jr. is Chief Information Security Officer of In-Q-Tel, the independent investment firm that identifies innovative technologies in support of the missions of the U.S. intelligence community. Robert E. Kahn is President and Chief Executive Officer of the Corporation for National Research Initiatives and co-inventor of the TCP/IP protocol that is the foundation of the modern Internet. Peter Schwartz is Co-Founder and Chairman of Global Business Network and a member of the 2 | Center for a New American Security’s board of directors. Table of Contents VOLUME I America’s Cyber Future: Security and Prosperity in the Information Age By Kristin M. Lord and Travis Sharp I. Executive Summary 7 II. Introduction 11 III. U.S. National Interests in Cyberspace 12 IV. The Nature of Cyber Threats 20 V. Current U.S. Government Efforts to Promote Cyber Security 31 VI. Policy Recommendations 37 VII. Conclusion 51 VOLUME II Chapter I: Power and National Security in Cyberspace 5 By Joseph S. Nye, Jr. Chapter II: Cyber Insecurities: The 21st Century Threatscape 25 By Mike McConnell Chapter III: Separating Threat from the Hype: 41 What Washington Needs to Know about Cyber Security By Gary McGraw and Nathaniel Fick Chapter IV: Cyberwar and Cyber Warfare 55 By Thomas G. Mahnken Chapter V: Non-State Actors and Cyber Conflict 65 By Gregory J. Rattray and Jason Healey Chapter VI: Cultivating International Cyber Norms 87 By Martha Finnemore Chapter VII: Cyber Security Governance: Existing Structures, 103 International Approaches and the Private Sector By David A. Gross, Nova J. Daly, M. Ethan Lucarelli and Roger H. Miksad Chapter VIII: Why Privacy and Cyber Security Clash 123 By James A. Lewis Chapter IX: Internet Freedom and Its Discontents: 143 Navigating the Tensions with Cyber Security By Richard Fontaine and Will Rogers Chapter X: The Unprecedented Economic Risks of Network Insecurity 165 By Christopher M. Schroeder Chapter XI: How Government Can Access Innovative Technology 183 By Daniel E. Geer, Jr. Chapter XII: The Role of Architecture in Internet Defense 203 By Robert E. Kahn Chapter XIII: Scenarios for the Future of Cyber Security 217 By Peter Schwartz | 3 America’s Cyber Future JUNE 2011 Security and Prosperity in the Information Age quote. — Author CHAPTER I: Power and National securitY in CYberspace By Joseph S. Nye, Jr. America’s Cyber Future JUNE 2011 Security and Prosperity in the Information Age quote. — Author POWER AND National SECURITY The cyber domain is a new and a volatile man- IN CYberspace made environment.* The characteristics of cyberspace often reduce power differentials among actors, and thus provide a good example of the diffusion of power that typifies global politics in this century. The largest powers are unlikely to be able to dominate cyberspace as much as they have dominated other domains like sea or air. While powerful nations have greater resources, they also have greater vulnerabilities. So, at this stage in the development of the technology, offense dominates defense in cyberspace. That in turn leads to new and complex dimensions in national security policy. The community of national security analysts is only beginning to grapple with the implications of the new technologies and what they mean for attack, deterrence, defense, negotiation, coop- eration and non-state actors. In the words of the JASON advisory panel of defense scientists (an independent group of scientists that advises the By Joseph S. Nye, Jr. government on technological and scientific issues), “People built all the pieces,” but “the cyberuniverse is complex well beyond anyone’s understanding and exhibits behavior that no one predicted, and sometimes can’t even be explained well.” The com- plexity goes beyond that of natural systems because it also involves human strategic interactions.
Recommended publications
  • Jason Healey Robert Jervis the Escalation Inversion and Other Oddities of Situational Cyber Stability
    The Scholar Texas National Security Review: Volume 3, Issue 4 (Fall 2020) Print: ISSN 2576-1021 Online: ISSN 2576-1153 The Escalation Inversion and Other Oddities of Situational Cyber Stability Jason Healey Robert Jervis The Escalation Inversion and Other Oddities of Situational Cyber Stability As the United States shifts to a new military strategy of defending forward against adversaries in cyberspace, research into the role of cyber capabilities in crisis stability is especially relevant. This paper introduces the concept of situational cyber stability, suggesting the key question is not “whether” cyber capabilities are escalatory but rather how they are escalatory under certain geopolitical conditions. We identify four key mechanisms: Pressure Release, Spark, Pull Out the Big Guns, and the Escalation Inversion. Optimists (believing that “No, cyber conflict is not escalatory”) and pessimists (“Oh, yes it is”) have each touched on parts of these mechanisms. This paper integrates research from both views to better understand crisis stability in cyberspace across the range of geopolitical contexts, from relative peace to impending war. We examine the role of surprise in cyber conflict and introduce policy recommendations to reduce the chances of crises escalating. t is one of the most important and debat- companies (Iran’s attacks on U.S. banks or the ed questions for policymakers and schol- North Korean dismembering of Sony)2; disrupted ars of cyber conflict: Are cyber capabilities national healthcare systems (North Korea’s Wan- escalatory? naCry, which disrupted the U.K. National Health IThe pessimists, in whose camp we normally re- Service),3 electrical grids in wintertime (Russia’s side, observe a two-decade trend of increasing cy- takedown of the Ukrainian grid),4 and national elec- ber aggression acting like a ratchet, not a pendulum.
    [Show full text]
  • The Vulnerabilities of Developed States to Economic Cyber Warfare
    Working Paper The Vulnerabilities of Developed States to Economic Cyber Warfare Paul Cornish Head, International Security Programme and Carrington Professor of International Security, Chatham House June 2011 The views expressed in this document are the sole responsibility of the author(s) and do not necessarily reflect the view of Chatham House, its staff, associates or Council. Chatham House is independent and owes no allegiance to any government or to any political body. It does not take institutional positions on policy issues. This document is issued on the understanding that if any extract is used, the author and Chatham House should be credited, preferably with the date of the publication. Working Paper: The Vulnerabilities of Developed States to Economic Cyber Warfare INTRODUCTION The central features of the ‘cybered’ world of the early 21st century are the interconnectedness of global communications, information and economic infrastructures and the dependence upon those infrastructures in order to govern, to do business or simply to live. There are a number of observations to be made of this world. First, it is still evolving. Economically developed societies are becoming ever more closely connected within themselves and with other, technologically advanced societies, and all are becoming increasingly dependent upon the rapid and reliable transmission of ideas, information and data. Second, where interconnectedness and dependency are not managed and mitigated by some form of security procedure, reversionary mode or redundancy system, then the result can only be a complex and vitally important communications system which is nevertheless vulnerable to information theft, financial electronic crime, malicious attack or infrastructure breakdown.
    [Show full text]
  • Pirates of the Isps: Tactics for Turning Online Crooks Into International Pariahs
    21st CENTURY DEFENSE INITIATIVE CyBER SECuRITy #1 July 2011 Pirates of the ISPs: Tactics for Turning Online Crooks Into International Pariahs Noah Shachtman 1775 Massachusetts Ave., NW Washington, D.C. 20036 brookings.edu Pirates of the ISPs: Tactics for Turning Online Crooks Into International Pariahs Noah Shachtman CyberSeCurity #1 July 2011 21st CENTURY DEFENSE INITIATIVE Acknowledgements every research paper is a group effort, no mat- My Wired.com colleagues—ryan Singel, kevin ter what it says on the byline. this project relied Poulsen, kim Zetter and David kravets—cover more on outside assistance than most. brookings the cybersecurity beat better than anyone. this Senior fellows Peter Singer and ken lieberthal paper would have been impossible without them, were the ones who convinced me to explore the and without brian krebs, master investigator of broad topic of cybersecurity. the panel they as- the online underworld. sembled gave me new insight with every meeting; my colleague allan friedman was an especially bill Woodcock, rick Wesson, Jeff Cooper, tyler invaluable tutor and remarkably generous with Moore, audrey Plonk, Jim lewis, Dmitri alpero- his time. heather Messera and robert o’brien vitch, Paul Nicholas, Jessica herrera-flannigan, provided important research and logistical sup- Jart armin, richard bejtlich, Steve Schleien, Jona- port. My research assistant, adam rawnsley, was than Zittrain and many, many others steered me tireless in his exploration of the minutiae of ev- away from my worst ideas and towards those few erything from tort law to pirate havens. not-so-bad ones. for that, i am deeply in their debt. brookings recognizes that the value it provides to any supporter is in its absolute commitment to quality, independence and impact.
    [Show full text]
  • Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism
    Journal of Strategic Security Volume 6 Number 5 Volume 6, No. 3, Fall 2013 Supplement: Ninth Annual IAFIE Article 3 Conference: Expanding the Frontiers of Intelligence Education Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism Gary Adkins The University of Texas at El Paso Follow this and additional works at: https://scholarcommons.usf.edu/jss pp. 1-9 Recommended Citation Adkins, Gary. "Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism." Journal of Strategic Security 6, no. 3 Suppl. (2013): 1-9. This Papers is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism This papers is available in Journal of Strategic Security: https://scholarcommons.usf.edu/jss/vol6/iss5/ 3 Adkins: Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism Red Teaming the Red Team: Utilizing Cyber Espionage to Combat Terrorism Gary Adkins Introduction The world has effectively exited the Industrial Age and is firmly planted in the Information Age. Global communication at the speed of light has become a great asset to both businesses and private citizens. However, there is a dark side to the age we live in as it allows terrorist groups to communicate, plan, fund, recruit, and spread their message to the world. Given the relative anonymity the Internet provides, many law enforcement and security agencies investigations are hindered in not only locating would be terrorists but also in disrupting their operations.
    [Show full text]
  • Robert and Renée Belfer Center for Science and International Affairs Annual Report 2020
    Robert and Renée Belfer Center for Science and International Affairs Annual Report 2020 ANNUAL REPORT 2020 A The Robert and Renée Belfer CONTENTS Center for Science and International Affairs CORE From the Director ..........................................................................1 Annual Report Center-Wide Activities .................................................................8 2020 Publications & Communications ...........................................12 DIRECTOR PROJECT UPDATES Ash Carter [email protected] Arctic Initiative .............................................................................18 CO-DIRECTOR Avoiding Great Power War .....................................................19 Eric Rosenbach [email protected] Cyber Project ................................................................................20 Defending Digital Democracy................................................21 EXECUTIVE DIRECTOR Aditi Kumar Defense Project ...........................................................................22 [email protected] Economic Diplomacy Initiative ..............................................23 DIRECTOR OF GLOBAL COMMUNICATIONS AND STRATEGY Environment and Natural Resources ..................................24 Josh Burek [email protected] Europe and the Transatlantic Relationship .......................25 Future of Diplomacy ..................................................................26 Geopolitics of Energy ................................................................27
    [Show full text]
  • Cyber Law and Espionage Law As Communicating Vessels
    Maurer School of Law: Indiana University Digital Repository @ Maurer Law Books & Book Chapters by Maurer Faculty Faculty Scholarship 2018 Cyber Law and Espionage Law as Communicating Vessels Asaf Lubin Maurer School of Law - Indiana University, [email protected] Follow this and additional works at: https://www.repository.law.indiana.edu/facbooks Part of the Information Security Commons, International Law Commons, Internet Law Commons, and the Science and Technology Law Commons Recommended Citation Lubin, Asaf, "Cyber Law and Espionage Law as Communicating Vessels" (2018). Books & Book Chapters by Maurer Faculty. 220. https://www.repository.law.indiana.edu/facbooks/220 This Book is brought to you for free and open access by the Faculty Scholarship at Digital Repository @ Maurer Law. It has been accepted for inclusion in Books & Book Chapters by Maurer Faculty by an authorized administrator of Digital Repository @ Maurer Law. For more information, please contact [email protected]. 2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström (Eds.) 30 May - 01 June 2018, Tallinn, Estonia 2018 10TH INTERNATIONAL CONFERENCE ON CYBER CONFLicT CYCON X: MAXIMISING EFFECTS Copyright © 2018 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1826N-PRT ISBN (print): 978-9949-9904-2-9 ISBN (pdf): 978-9949-9904-3-6 COPYRigHT AND REPRINT PERmissiONS No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]).
    [Show full text]
  • What Killed Australian Cinema & Why Is the Bloody Corpse Still Moving?
    What Killed Australian Cinema & Why is the Bloody Corpse Still Moving? A Thesis Submitted By Jacob Zvi for the Degree of Doctor of Philosophy at the Faculty of Health, Arts & Design, Swinburne University of Technology, Melbourne © Jacob Zvi 2019 Swinburne University of Technology All rights reserved. This thesis may not be reproduced in whole or in part, by photocopy or other means, without the permission of the author. II Abstract In 2004, annual Australian viewership of Australian cinema, regularly averaging below 5%, reached an all-time low of 1.3%. Considering Australia ranks among the top nations in both screens and cinema attendance per capita, and that Australians’ biggest cultural consumption is screen products and multi-media equipment, suggests that Australians love cinema, but refrain from watching their own. Why? During its golden period, 1970-1988, Australian cinema was operating under combined private and government investment, and responsible for critical and commercial successes. However, over the past thirty years, 1988-2018, due to the detrimental role of government film agencies played in binding Australian cinema to government funding, Australian films are perceived as under-developed, low budget, and depressing. Out of hundreds of films produced, and investment of billions of dollars, only a dozen managed to recoup their budget. The thesis demonstrates how ‘Australian national cinema’ discourse helped funding bodies consolidate their power. Australian filmmaking is defined by three ongoing and unresolved frictions: one external and two internal. Friction I debates Australian cinema vs. Australian audience, rejecting Australian cinema’s output, resulting in Frictions II and III, which respectively debate two industry questions: what content is produced? arthouse vs.
    [Show full text]
  • Game Hacking 101
    6627ch02.qxd_lb 6/22/07 7:31 AM Page 19 2 Game Hacking 101 oftware piracy has long been a problem in the computer games busi- Sness—ever since games moved from stand-alone machines in the 1970s to PCs in the 1980s. Game makers, justifiably, have gone to great lengths to thwart piracy. In the past, game makers added various countermeasures to their software to make games harder to crack. The main purpose was to prevent rampant copying so that people who wanted to play the game had to buy it. In the end, these games were always cracked—but in some cases, the countermeasures delayed the release of a cracked version by days or even weeks. This delay earned real revenue for the game companies because delaying a crack for even a week translated into hundreds of thousands of dollars. Antipiracy countermeasures made some economic sense in the over-the- counter paradigm, in which a gamer purchased a copy of the game from a retailer and installed the copy locally on his or her PC. But things have changed. Many modern games have moved online, and with the advent of game consoles connected to the Internet, this trend is likely to accelerate.1 That means companies now have two revenue sources to protect: the 1. The hugely popular Nintendo Wii, which debuted in late 2006, will certainly accelerate this trend. 19 6627ch02.qxd_lb 6/22/07 7:31 AM Page 20 20 Chapter 2 Game Hacking 101 original game price in the retail channel, and a monthly subscription revenue stream for online access.
    [Show full text]
  • Arm's Way: a Look Into the Culture of the Defense and Security Industry
    ISSN 1653-2244 INSTITUTIONEN FÖR KULTURANTROPOLOGI OCH ETNOLOGI DEPARTMENT OF CULTURAL ANTHROPOLOGY AND ETHNOLOGY In (H)Arm’s way: A look into the Culture of the defense and security industry By Stephenie G. Tesoro Supervisor: Susann Baez Ullberg 2019 MASTERUPPSATSER I KULTURANTROPOLOGI Nr 96 Table of Contents Notes on the Text ........................................................................................................................................ 1 Introduction .................................................................................................................................................. 2 Theoretical Framework and Research To-Date .................................................................................... 5 Methodology ................................................................................................................................................ 9 Polymorphous Engagement ................................................................................................................................. 9 Trade Shows: How Empty Halls Fuel Industries .......................................................................................... 10 Struggles in the Field .......................................................................................................................................... 12 The Context of the Global Arms Industry in the Twenty-First Century ...................................... 14 The Language of the Defense & Security Industry .........................................................................
    [Show full text]
  • Malware to Crimeware
    I have surveyed over a decade of advances in delivery of malware. Over this daVid dittRich period, attackers have shifted to using complex, multi-phase attacks based on malware to crimeware: subtle social engineering tactics, advanced how far have they cryptographic techniques to defeat takeover gone, and how do and analysis, and highly targeted attacks we catch up? that are intended to fly below the radar of current technical defenses. I will show how Dave Dittrich is an affiliate information malicious technology combined with social security researcher in the University of manipulation is used against us and con- Washington’s Applied Physics Laboratory. He focuses on advanced malware threats and clude that this understanding might even the ethical and legal framework for respond- ing to computer network attacks. help us design our own combination of [email protected] technical and social mechanisms to better protect us. And ye shall know the truth, and the truth shall make you free. The late 1990s saw the advent of distributed and John 8:32 coordinated computer network attack tools, which were primarily used for the electronic equivalent of fist fighting in the streets. It only took a few years for criminal activity—extortion, click fraud, denial of service for competitive advantage—to appear, followed by mass theft of personal and financial data through quieter, yet still widespread and auto- mated, keystroke logging. Despite what law-abid- ing citizens would desire, crime does pay, and pay well. Today, the financial gain from criminal enter- prise allows investment of large sums of money in developing tools and operational capabilities that are increasingly sophisticated and highly targeted.
    [Show full text]
  • From Voodoo to Viruses: the Evolution of the Zombie in Twentieth Century Popular Culture
    From Voodoo to Viruses: The Evolution of the Zombie in Twentieth Century Popular Culture By Margaret Twohy Adviser: Dr. Bernice Murphy A thesis submitted in partial fulfilment of the Degree of Master’s of Philosophy in Popular Literature Trinity College Dublin Dublin, Ireland October 2008 2 Abstract The purpose of this thesis is to explore the evolutionary path the zombie has followed in 20th Century popular culture. Additionally, this thesis will examine the defining characteristics of the zombie as they have changed through its history. Over the course of the last century and edging into the 21st Century, the zombie has grown in popularity in film, videogames, and more recently in novels. The zombie genre has become a self-inspiring force in pop culture media today. Films inspired a number of videogames, which in turn, supplied the film industry with a resurgence of inspirations and ideas. Combined, these media have brought the zombie to a position of greater prominence in popular literature. Additionally, within the growing zombie culture today there is an over-arcing viral theme associated with the zombie. In many films, games, and novels there is a viral cause for a zombie outbreak. Meanwhile, the growing popularity of zombies and its widening reach throughout popular culture makes the genre somewhat viral-like as well. Filmmakers, authors and game designers are all gathering ideas from one another causing the some amount of self- cannibalisation within the genre. 3 Table of Contents Introduction 4 Chapter One 7 Evolution of the Dead Chapter Two 21 Contaminants, Viruses, and Possessions—Oh my! Chapter Three 34 Dawn of the (Digital) Dead Chapter Four 45 Rise of the Literary Zombie Conclusion 58 Bibliography 61 4 Introduction There are perhaps few, if any fictional monsters that can rival the versatility of the humble zombie (or zombi)1.
    [Show full text]
  • Nuclear Security Culture: the Case of Russia
    NUCLEAR SECURITY CULTURE: THE CASE OF RUSSIA Center for International Trade and Security The University of Georgia NUCLEAR SECURITY CULTURE: THE CASE OF RUSSIA © Center for International Trade and Security University of Georgia December 2004 nuclear security culture: the case of russia ABOUT THE CENTER FOR INTERNATIONAL TRADE AND SECURITY he Center for International Trade and Security (CITS) works to address the dangers posed by transfers of weapons of mass destruction (WMD) and WMD-related technology and materials. CITS seeks to Taccomplish its mission by: • Engaging and informing policymakers, industry representatives, educators, and the public, both in the United States and abroad, about dangers stemming from the trade in and theft of weapons and weapons components. CITS communicates these concepts through policy research, public forums, editorials, briefings, Internet publications, and the publication of a journal, The Monitor: International Perspectives on Nonproliferation • Facilitating international dialogue through exchanges of officials and experts that will promote greater cooperation in preventing the spread of dangerous weapons and technology • Establishing training programs for government officials and others in “best practices” for controlling, monitoring, and preventing the trade in WMD and related items • Preparing future leaders for careers in international security and nonproliferation The CITS Security Policy Program is focused on: • Improving understanding and awareness of the importance of training and motivating personnel responsible for protecting nuclear and other WMD-related materials • Promoting U.S.-Russian dialogue on nonproliferation and threat reduction • Facilitating U.S. assistance to Russia and the other former Soviet states through analysis of their nuclear and military-industrial complexes • Analyzing and strengthening security at WMD-related facilities internationally Center for International Trade and Security 120 Holmes/Hunter Academic Building University of Georgia Athens, GA 30602 Dr.
    [Show full text]