The Myth of Cyberwar Erik Gartzke Bringing War in Cyberspace Back Down to Earth
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Martha L. Minow
Martha L. Minow 1525 Massachusetts Avenue Griswold 407, Harvard Law School Cambridge, MA 02138 (617) 495-4276 [email protected] Current Academic Appointments: 300th Anniversary University Professor, Harvard University Harvard University Distinguished Service Professor Faculty, Harvard Graduate School of Education Faculty Associate, Carr Center for Human Rights, Harvard Kennedy School of Government Current Activities: Advantage Testing Foundation, Vice-Chair and Trustee American Academy of Arts and Sciences, Access to Justice Project American Bar Association Center for Innovation, Advisory Council American Law Institute, Member Berkman Klein Center for Internet and Society, Harvard University, Director Campaign Legal Center, Board of Trustees Carnegie Corporation, Board of Trustees Committee to Visit the Harvard Business School, Harvard University Board of Overseers Facing History and Ourselves, Board of Scholars Harvard Data Science Review, Associate Editor Initiative on Harvard and the Legacy of Slavery Law, Violence, and Meaning Series, Univ. of Michigan Press, Co-Editor MacArthur Foundation, Director MIT Media Lab, Advisory Council MIT Schwarzman College of Computing, Co-Chair, External Advisory Council National Academy of Sciences' Committee on Science, Technology, and Law Profiles in Courage Award Selection Committee, JFK Library, Chair Russell Sage Foundation, Trustee Skadden Fellowship Foundation, Selection Trustee Susan Crown Exchange Foundation, Trustee WGBH Board of Trustees, Trustee Education: Yale Law School, J.D. 1979 Articles and Book Review Editor, Yale Law Journal, 1978-1979 Editor, Yale Law Journal, 1977-1978 Harvard Graduate School of Education, Ed.M. 1976 University of Michigan, A.B. 1975 Phi Beta Kappa, Magna Cum Laude James B. Angell Scholar, Branstrom Prize New Trier East High School, Winnetka, Illinois, 1968-1972 Honors and Fellowships: Leo Baeck Medal, Nov. -
Thoughts on Grand Strategy and the United States in the Twenty-First Century
Journal of Military and Strategic VOLUME 13, ISSUE 1, FALL 2010 Studies Thoughts on Grand Strategy and the United States in the Twenty-first Century Williamson Murray One might begin an examination of the issues involved in grand strategy with an effort to describe what we mean by the term. Over the centuries, some governments and leaders have attempted to chart a course for their nations that has involved something more than simply reacting to the course of events. In most cases they have confronted sudden and major changes in the international environment, often resulting from the outbreak of great conflicts, but at times involving economic, strategic, or political alterations that threaten the stability or even existence of their polities. Yet, grand strategy is a matter of great states and great states alone. No small states, and few medium size states, possess the possibility of crafting a grand strategy. For the most part their circumstances condemn them to suffer what Athens negotiators suggested to their Melian counterparts in 416 BC about the nature of international relations: "The standard of justice depends on the equality of power to compel and that in fact the strong do what they have the power to do and the weak accept what they have to accept."1 1 Thucydides, History of the Peloponnesian War, trans. by Rex Warner (London, 1954), p. 402. There are two exceptions to the rule. Both the Swiss and the Finns were able to exercise a certain independence that allowed them to maintain a grand strategic frame work: the former by balancing great powers off against each other; the latter by creating the distinct impression in the minds of the Soviets that they were willing to fight to the last man and woman in defense of their independence. -
American Grand Strategy for an Emerging World Order Scott Lawless
STRATEGIC STUDIES QUARTERLY - PERSPECTIVE American Grand Strategy for an Emerging World Order SCOTT LAWLESS Abstract Since the end of the Second World War, the United States has secured its core national interests primarily through the creation and maintenance of the liberal international order. Today, this order is being challenged in ways that will define the twenty- first century context. America’s most pressing foreign policy challenge is finding strategies to counter a poten- tially illiberal global order. Neo-authoritarian states are seeking to establish spheres of influence by violating territorial norms, undermining the liberal order via coercive economic measures, and weakening democratic regimes through unconventional political warfare. The current liberal order is ill- equipped to face these challenges because of two global trends: the erosion of its legitimacy and the shifting global balance of power. In a changing environment such as this, where the ends of American grand strategy re- main fixed while its relative means are eroding, the US must revise the ways in which it seeks to achieve its strategic objectives. The shifts in geopolitics today necessitate a revitalization of American grand strategy and the estab- lishment of a new security order—namely, a Concert of Democracies—to secure American interests, reestablish liberal legitimacy, and shape the emerging international order toward a stable future. ***** he liberal international order that emerged triumphant over fas- cism and communism during the twentieth century is a testament to the institutions, alliances, and norms US statesmen established Tto avoid the revival of great power conflict. Though these structures have granted the United States and its allies several decades of unparalleled security and prosperity, it is unclear as to what is invoked by the term lib- eral international order. -
Architecture in the Era of Terror: the Security Dilemma
Safety and Security Engineering 805 Architecture in the era of terror: the security dilemma G. Zilbershtein Department of Architecture, Texas A&M University, U.S.A. Abstract The growing public concern over the proliferation of terrorism has made protection of the physical environment of potential targets and terror interdiction a salient issue. The objective to secure the built environment against terrorism introduces a complex dilemma. At one level, the extent of investments in security in terms of cost-effectiveness is not proportional to the relatively rare threat of terrorism. Another level of the dilemma is rooted in the complex psychological implications of using security measures, that is, how to physically secure a building, while psychologically deter potential terrorists; more importantly is the question of how to accomplish those and yet not scare the users, i.e., the public. The latter part of the dilemma has been relatively ignored in the analysis of architectural measures against terrorism. And since catering to the psychological comfort of the users of the built environment has always been one of the greatest challenges of architecture, this paper focuses on that portion of the security dilemma of terrorism. Specifically, the study examines the threat characteristics and analyzes design recommendations that address the threat of terror for their contribution to the psychological comfort of the end users. Keywords: architecture, built environment, terrorism, risk assessment, security perception, security measures, design recommendations. 1 Introduction The post–cold war, as defined by John Lewis Gaddis [1], began with the collapse of one structure, the Berlin wall on November 9, 1989, and ended with the collapse of another, the World Trade Center on September 11, 2001. -
Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government. -
Operation Vengeance Still Offering Lessons After 75 Years
Operation Vengeance Still Offering Lessons after 75 Years Lt Col Scott C. Martin, USAF Disclaimer: The views and opinions expressed or implied in theAir & Space Power Journal (ASPJ) are those of the authors and should not be construed as carrying the official sanction of the Department of Defense, Air Force, Air Education and Training Command, Air University, or other agencies or departments of the US government. This article may be repro duced in whole or in part without permission. If it is reproduced, the ASPJ requests a courtesy line. he spring of 2018 marked the 75th anniversary of the execution of the first high-value individual (HVI)/target of opportunity (TOO) operation by air- power in history. On 18 April 1943, 18 Army Air Corps P-38 Lightning fight Ters took off from an airfield on Henderson Island in the south Pacific Ocean, slated to target Adm Isoroku Yamamoto, the commander of the Japanese Imperial Navy. Based on the successful intercept of the admiral’s itinerary via the codebreakers working at Station HYPO (also known as Fleet Radio Unit Pacific) in Hawaii, the US knew of Yamamoto’s plans to visit the Japanese base at Bougainville Island in Papua, New Guinea. The US fighters, maintaining radio silence and flying low over the ocean to evade Japanese radar, successfully ambushed the two Japanese bomb ers and six escort fighters, shooting down both bombers, one of which held the ad miral. With the loss of only one plane, the US managed to eliminate one of the top military commanders in the Japanese military and score a huge propaganda vic tory. -
The Russian Integration of Cyber Power Into Grand Strategy by James J
Cyber War and Strategic Culture: The Russian Integration of Cyber Power into Grand Strategy by James J. Wirtz Chapter 3 in Kenneth Geers (Ed.), Cyber War in Perspective: Russian Aggression against Ukraine, NATO CCD COE Publications, Tallinn 2015 In Chapter 3, James J. Wirtz, Dean of the Naval Postgraduate School in California, describes the global context surrounding these events. Today, nation-states are integrating cyber tactics into their political and military strategies. Professor Wirtz posits that when it comes to the use of cyber, ‘national styles’ might be emerging as states attempt to use cyber capabilities to achieve strategic objectives. He suggests that it is wrong to treat cyber attacks as a silver bullet, and that it is better to consider how a sort of combined arms approach will prevail. On a positive note, the need for legal and bureaucratic integration of policies and programmes should produce national idiosyncrasies on the cyber battlefield that can help with the vexing challenge of attribution. Disclaimer This publication is a product of the NATO Cooperative Cyber Defence Centre of Ex- cellence (the Centre). It does not necessarily reflect the policy or the opinion of the Centre or NATO. The Centre may not be held responsible for any loss or harm arising from the use of information contained in this publication and is not responsible for the content of the external sources, including external websites referenced in this publica- tion. Digital or hard copies of this publication may be produced for internal use within NATO and for personal or educational use when for non-profit and non-commercial purpose, provided that copies bear a full citation. -
MEDIA ADVISORY: Thursday, August 11, 2011**
**MEDIA ADVISORY: Thursday, August 11, 2011** WWE SummerSlam Cranks Up the Heat at Participating Cineplex Entertainment Theatres Live, in High-Definition on Sunday, August 14, 2011 WHAT: Three championship titles are up for grabs, one will unify the prestigious WWE Championship this Sunday. Cineplex Entertainment, via our Front Row Centre Events, is pleased to announce WWE SummerSlam will be broadcast live at participating Cineplex theatres across Canada on Sunday, August 14, 2011 at 8:00 p.m. EDT, 7:00 p.m. CDT, 6:00 p.m. MDT and 5:00 p.m. PDT live from the Staples Center in Los Angeles, CA. Matches WWE Champion John Cena vs. WWE Champion CM Punk in an Undisputed WWE Championship Match World Heavyweight Champion Christian vs. Randy Orton in a No Holds Barred Match WWE Divas Champion Kelly Kelly vs. Beth Phoenix WHEN: Sunday, August 14, 2011 at 8:00 p.m. EDT, 7:00 p.m. CDT, 6:00 p.m. MDT and 5:00 p.m. PDT WHERE: Advance tickets are now available at participating theatre box offices, through the Cineplex Mobile Apps and online at www.cineplex.com/events or our mobile site m.cineplex.com. A special rate is available for larger groups of 20 or more. Please contact Cineplex corporate sales at 1-800-313-4461 or via email at [email protected]. The following 2011 WWE events will be shown live at select Cineplex Entertainment theatres: WWE Night of Champions September 18, 2011 WWE Hell in the Cell October 2, 2011 WWE Vengeance (formerly Bragging Rights) October 23, 2011 WWE Survivor Series November 20, 2011 WWE TLC: Tables, Ladders & Chairs December 18, 2011 -30- For more information, photos or interviews, please contact: Pat Marshall, Vice President, Communications and Investor Relations, Cineplex Entertainment, 416-323- 6648, [email protected] Kyle Moffatt, Director, Communications, Cineplex Entertainment, 416-323-6728, [email protected] . -
Coping with the Security Dilemma: a Fundamental Ambiguity of State Behaviour Andras Szalai Central European University
Volume 2 (2), 2009 AMBIGUITIES Coping with the Security Dilemma: A Fundamental Ambiguity of State Behaviour Andras Szalai Central European University Abstract he wording of international treaties, the language and actions of statesmen are often T ambiguous, even controversial. But there is a different, more fundamental ambiguity underlying international relations; one that is independent of human nature or the cognitive limitations of decision makers but instead results from the correct adjustment of state behaviour to the uncertainties of an anarchical international system. Due to the anarchical nature of the international system — the lack of a sovereign — states can only rely on their own strength for self-defence. But self-protection often threatens other states. If a state purchases armaments, even if it claims not to have aggressive intents, there is no sovereign to enforce these commitments and there is no way of being certain that the purchasing state is telling the truth, or that it will not develop such intents in the future. The so- called security dilemma has a number of effects on state behaviour. First, states often worry about implausible threats (see e.g. British defence plans against a possible French invasion in the 1930s) and/or get caught in arms races. Second, states develop an inherent mistrust in the language of the other, requiring commitments to be firm and unambiguous in order to be credible, since ambiguity invites conflicts and renders cooperation more difficult. Still, on the one hand, instead of a world of constant mistrust, we register instances of institutionalized inter-state cooperation. On the other hand, states often choose to make commitments that are deliberately ambiguous and outperform more transparent commitments. -
The Pillars of American Grand Strategy in World War II by Tami Davis Biddle
Leveraging Strength: The Pillars of American Grand Strategy in World War II by Tami Davis Biddle Tami Davis Biddle is the Hoyt S. Vandenberg Chair of Aerospace Studies at the U.S. Army War College in Carlisle, PA. She is the author of Rhetoric and Reality in Air Warfare: The Evolution of British and American Thinking about Strategic Bombing, 1914–1945, and is at work on a new book titled, Taking Command: The United States at War, 1944–1945. This article is based on a lecture she delivered in March 2010 in The Hertog Program on Grand Strategy, jointly sponsored by Temple University’s Center for Force and Diplomacy, and FPRI. Abstract: This article argues that U.S. leaders navigated their way through World War II challenges in several important ways. These included: sustaining a functional civil-military relationship; mobilizing inside a democratic, capitalist paradigm; leveraging the moral high ground ceded to them by their enemies; cultivating their ongoing relationship with the British, and embra- cing a kind of adaptability and resiliency that facilitated their ability to learn from mistakes and take advantage of their enemies’ mistakes. ooking back on their World War II experience from the vantage point of the twenty-first century, Americans are struck, first of all, by the speed L with which everything was accomplished: armies were raised, fleets of planes and ships were built, setbacks were overcome, and great victories were won—all in a mere 45 months. Between December 1941 and August 1945, Americans faced extraordinary challenges and accepted responsibilities they had previously eschewed. -
5.6 Herbicides in Warfare: the Case of Indochina A
Ecotoxicology and Climate Edited by P. Bourdeau, J. A. Haines, W. Klein and C. R. Krishna Murti @ 1989 SCOPE. Published by John Wiley & Sons Ltd 5.6 Herbicides in Warfare: The Case of Indochina A. H. WESTING 5.6.1 INTRODUCTION The Second Indochina War (or Vietnam Conflict) of 1961-1975 is noted for the widespread and severe environmental damage inflicted upon its theatre of operations, especially in the former South Vietnam (Westing, 1976, 1980, 1982a, 1984b). The US strategy in South Vietnam, inter alia, involved massive rural area bombing, extensive chemical and mechanical forest destruction, large-scale chemical and mechanical crop destruction, wide-ranging chemical anti-personnel harassment and area denial, and enormous forced population displacements. In short, this US strategy represented the intentional disruption of both the natural and human ecologies of the region. Moreover, this war was the first in military history in which massive quantities of anti-plant chemical warfare agents (herbicides) were employed (Buckingham, 1982;Cecil, 1986; Lang et al., 1974; Westing, 1976, 1984b). The Second Indochina War was innovative in that a great power attempted to subdue a peasant army through the profligate use of technologically advanced weapons and methods. One can readily understand that the outcome of more than a decade of such war in South Vietnam and elsewhere in the region resulted not only in heavy direct casualties, but also in long-term medical sequelae. By any measure, however, its main effects were a widespread, long-lasting, and severe disruption of forestlands, of perennial croplands, and of farmlands- that is to say, of millions of hectares of the natural resource base essential to an agrarian society. -
Correspondence Ronan Tse-Min Fu David James Gill Eric Hundman
Correspondence: Looking for Asia’s Security Dilemma Correspondence Ronan Tse-min Fu David James Gill Looking for Asia’s Security Dilemma Eric Hundman Adam P. Liff and G. John Ikenberry To the Editors (Ronan Tse-min Fu writes): In “Racing toward Tragedy? China’s Rise, Military Competition in the Asia Paciªc, and the Security Dilemma,” Adam Liff and John Ikenberry claim that “a number of recent developments suggest that the region is ripe for, or may already be experiencing, severe security dilemma–driven dynamics, even arms races.”1 They portray China’s rise as the main cause of this dilemma and assert that states must adopt measures to reduce mili- tary competition in the region while they still can. I applaud Liff and Ikenberry for the policy relevance of their research, but their fun- damental claim about the prevalence of severe military competition in the Asia Paciªc region does not match the empirical reality. The real puzzle is why over the last thirty years Asian countries have shown a surprising lack of interest in boosting their military expenditures in response to China’s massive increases, whether these expenditures are measured in absolute or proportional terms, and whether they are measured over the past generation or the last few years. is there “severe military competition” in the asia paciªc? Liff and Ikenberry ground their analysis in the empirical observation that Asia might already be engaged in severe military competition, but they never deªne what they mean by “military competition” (pp. 65–82). They imply that such competition exists when parties seek to enhance their military capabilities in response to an external threat (p.