The Meaning of the Cyber Revolution the Meaning of the Lucas Kello Cyber Revolution Perils to Theory and Statecraft
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Erosion of Strategic Stability and the Future of Arms Control in Europe
Études de l’Ifri Proliferation Papers 60 THE EROSION OF STRATEGIC STABILITY AND THE FUTURE OF ARMS COntrOL IN EUROPE Corentin BRUSTLEIN November 2018 Security Studies Center The Institut français des relations internationales (Ifri) is a research center and a forum for debate on major international political and economic issues. Headed by Thierry de Montbrial since its founding in 1979, Ifri is a non- governmental, non-profit organization. As an independent think tank, Ifri sets its own research agenda, publishing its findings regularly for a global audience. Taking an interdisciplinary approach, Ifri brings together political and economic decision-makers, researchers and internationally renowned experts to animate its debate and research activities. The opinions expressed in this text are the responsibility of the author alone. ISBN: 978-2-36567-932-9 © All rights reserved, Ifri, 2018 How to quote this document: Corentin Brustlein, “The Erosion of Strategic Stability and the Future of Arms Control in Europe”, Proliferation Papers, No. 60, November 2018. Ifri 27 rue de la Procession 75740 Paris Cedex 15 – FRANCE Tel.: +33 (0)1 40 61 60 00 – Fax: +33 (0)1 40 61 60 60 Email: [email protected] Website: Ifri.org Author Dr. Corentin Brustlein is the Director of the Security Studies Center at the French Institute of International Relations. His work focuses on nuclear and conventional deterrence, arms control, military balances, and U.S. and French defense policies. Before assuming his current position, he had been a research fellow at Ifri since 2008 and the head of Ifri’s Deterrence and Proliferation Program since 2010. -
Does It Promote Pakistan's Strategic Interests?
07 “Strategic Depth”: Does It Promote Pakistan’s Strategic Interests? : Raheem ul Haque fied Pakistan's insecurity syndrome leading to an illusive In assessing Pakistan's response to the ongoing 'global search for Strategic Depth , third, although it shook the war on terrorism' in Afghanistan, this paper presents two foundations of "Two Nation Theory", Pakistan still began sets of arguments; first, I argue that Pakistan's strategic to drift towards Islamization through invoked fears of interests constituting secure and peaceful borders along 'Hindu India'. All this obliterated Jinnah's vision of liberal, with internal strength, development and prosperity, are secular and democratic Pakistan. Although the process annulled rather than furthered by the Strategic Depth had begun with the adoption of Objectives Resolution in policy framework, adopted and pursued for the last three 1949, anti-Ahemdia riots in 1953, Pakistan's joining of decades. Although this framework has allowed Pakistan anti- Communist block, SEATO and CENTO pacts, how to maintain a semblance of regional military power bal ever, it accelerated through State sanction in post 1971 ance with India, yet it has led to a rise of extremism and Pakistan with the passage of bill (1974) declaring Ahmedis militancy within Pakistani society and to a loss of internal as 'non-Muslim', the religious parties led PNA movement sovereignty. Today, this flawed policy has created condi against the PPP government in March-April 1977 and tions that have made Pakistan a sanctuary for ideologi General Zia- ul Haq's military coup in July—who was quick cal non-state actors. Second, with an in-depth analysis to announce that Pakistan was an 'Ideological State'2, and scrutiny of factors and actors in the three decades thus Jinnah's vision of Pakistan was deconstructed3. -
A F L D U U R E E Fearful Symmetry: How to Achieve Coherence Among
ASPJ–Africa and Francophonie Fall Fall 2010 Volume I, No. 3 John Hursh John En marche vers la démocratie au Maroc ? Maroc au démocratie la vers marche En Africa: A Light at the End of the Tunnel? Dustin Dehéz Dustin Herman J. Cohen en Afrique subsaharienne : Saisir toute l’histoire toute Saisir : subsaharienne Afrique en Réforme du secteur de la sécurité et services de renseignements renseignements de services et sécurité la de secteur du Réforme Cracks in the Jihad Thomas Rid, PhD 2010 Rumu Sarkat, PhD PhD Sarkat, Rumu une même volonté pour tous les acteurs ? acteurs les tous pour volonté même une Peacekeeping by Regional Organisations Une symétrie de la peur : Comment peut-on atteindre peut-on Comment : peur la de symétrie Une Lt Gen Vijay Kumar Jetley, PVSM, UYSM, Retired Colonel (ER) Jiyul Kim, USA Kim, Jiyul (ER) Colonel Cultural Dimensions of Strategy and Policy Dimension culturelle de la stratégie et de la politique la de et stratégie la de culturelle Dimension Col Jiyul Kim, USA, Retired Général de corps d’armée indienne (2s) Vijay Kumar Jetley, PVSM, UYSM PVSM, Jetley, Kumar Vijay (2s) indienne d’armée corps de Général Fearful Symmetry: How to Achieve Coherence among Le maintien de la paix par des organisations régionales organisations des par paix la de maintien Le All the Players Rumu Sarkar, PhD Thomas Rid, PhD Rid, Thomas Fissures dans le Jihad le dans Fissures Intelligence Services in Sub-Saharan Africa: Making Security Sector Reform Work tomne 2010 Herman J. Cohen J. Herman Dustin Dehéz Afrique : le bout du tunnel est-il en vue ? vue en est-il tunnel du bout le : Afrique Moving toward Democracy in Morocco? John Hursh Volume 1, No. -
Pakistan's Future Policy Towards Afghanistan. a Look At
DIIS REPORT 2011:08 DIIS REPORT PAKISTAN’S FUTURE POLICY TOWARDS AFGHANISTAN A LOOK AT STRATEGIC DEPTH, MILITANT MOVEMENTS AND THE ROLE OF INDIA AND THE US Qandeel Siddique DIIS REPORT 2011:08 DIIS REPORT DIIS . DANISH INSTITUTE FOR INTERNATIONAL STUDIES 1 DIIS REPORT 2011:08 © Copenhagen 2011, Qandeel Siddique and DIIS Danish Institute for International Studies, DIIS Strandgade 56, DK-1401 Copenhagen, Denmark Ph: +45 32 69 87 87 Fax: +45 32 69 87 00 E-mail: [email protected] Web: www.diis.dk Cover photo: The Khyber Pass linking Pakistan and Afghanistan. © Luca Tettoni/Robert Harding World Imagery/Corbis Layout: Allan Lind Jørgensen Printed in Denmark by Vesterkopi AS ISBN 978-87-7605-455-7 Price: DKK 50.00 (VAT included) DIIS publications can be downloaded free of charge from www.diis.dk Hardcopies can be ordered at www.diis.dk This publication is part of DIIS’s Defence and Security Studies project which is funded by a grant from the Danish Ministry of Defence. Qandeel Siddique, MSc, Research Assistant, DIIS [email protected] 2 DIIS REPORT 2011:08 Contents Abstract 6 1. Introduction 7 2. Pakistan–Afghanistan relations 12 3. Strategic depth and the ISI 18 4. Shift of jihad theatre from Kashmir to Afghanistan 22 5. The role of India 41 6. The role of the United States 52 7. Conclusion 58 Defence and Security Studies at DIIS 70 3 DIIS REPORT 2011:08 Acronyms AJK Azad Jammu and Kashmir ANP Awani National Party FATA Federally Administered Tribal Areas FDI Foreign Direct Investment FI Fidayeen Islam GHQ General Headquarters GoP Government -
Won't You Be My Neighbor
Won’t You Be My Neighbor: Syria, Iraq and the Changing Strategic Context in the Middle East S TEVEN SIMON Council on Foreign Relations March 2009 www.usip.org Date www.usip.org UNITED STATES INSTITUTE OF PEACE – WORKING PAPER Won’t You Be My Neighbor UNITED STATES INSTITUTE OF PEACE 1200 17th Street NW, Suite 200 Washington, DC 20036-3011 © 2009 by the United States Institute of Peace. The views expressed in this report do not necessarily reflect the views of the United States Institute of Peace, which does not advocate specific policy positions. This is a working draft. Comments, questions, and permission to cite should be directed to the author ([email protected]) or [email protected]. This is a working draft. Comments, questions, and permission to cite should be directed to the author ([email protected]) or [email protected]. UNITED STATES INSTITUTE OF PEACE – WORKING PAPER Won’t You Be My Neighbor About this Report Iraq's neighbors are playing a major role—both positive and negative—in the stabilization and reconstruction of post-Saddam Iraq. In an effort to prevent conflict across Iraq's borders and in order to promote positive international and regional engagement, USIP has initiated high-level, non-official dialogue between foreign policy and national security figures from Iraq, its neighbors and the United States. The Institute’s "Iraq and its Neighbors" project has also convened a group of leading specialists on the geopolitics of the region to assess the interests and influence of the countries surrounding Iraq and to explain the impact of these transformed relationships on U.S. -
Active Measures: the Secret History of Disinformation & Political
Active Measures: The Secret History of Disinformation & Political Warfare | Thomas Rid Philosophers have only interpreted the world. The point, May 25th, 2020 however, is to change it. — Karl Marx INTRODUCTION Thomas Rid is Professor of Strategic Studies at Johns Hopkins University’s School of Advanced International Studies. Rid’s latest book, Active Measures, a startling history of disinformation, was published in late April 2020 with Farrar, Straus and Giroux (also in Russian, Japanese, Polish). His most recent book, Rise of the Machines (2016), tells the sweeping story of how cybernetics, a late- 1940s theory of machines, came to incite anarchy and war (also in Chinese, Russian, German, Japanese, Turkish). His 2015 article “Attributing Cyber Attacks” was designed to explain, guide, and improve the identification of network breaches (Journal of Strategic Studies 2015). In 2013 he published the widely-read book Cyber War Will Not Take Place. Rid’s Ph.D. thesis, “War and Media Operations: The US Military and the Press from Vietnam to Iraq,” was the first academic analysis of the role of embedded media in the 2003 Iraq War, providing a concise history of US military public affairs management since Vietnam. Rid testified on information security in front of the U.S. Senate Select Committee on Intelligence as well as in the German Bundestag and the UK Parliament. From 2011 to 2016, Rid was a professor in the Department of War Studies at King’s College London. Between 2003 and 2010, he worked at major think tanks in Berlin, Paris, Jerusalem, and Washington, DC. Rid holds a PhD from Humboldt University in Berlin. -
Cyber Terrorism and Public Support for Retaliation – a Multi-Country Survey Experiment
British Journal of Political Science (2021), page 1 of 19 doi:10.1017/S0007123420000812 ARTICLE Cyber Terrorism and Public Support for Retaliation – A Multi-Country Survey Experiment Ryan Shandler1* , Michael L. Gross1 , Sophia Backhaus2 and Daphna Canetti1 1School of Political Sciences, University of Haifa, Haifa, Israel and 2Department of Psychology, University of Konstanz, Konstanz, Germany *Corresponding author. E-mail: [email protected] (Received 14 May 2020; revised 15 September 2020; accepted 19 November 2020) Abstract Does exposure to cyber terrorism prompt calls for retaliatory military strikes? By what psychological mechanism does it do so? Through a series of controlled, randomized experiments, this study exposed respondents (n = 2,028) to television news reports depicting cyber and conventional terror attacks against critical infrastructures in the United States, United Kingdom and Israel. The findings indicate that only lethal cyber terrorism triggers strong support for retaliation. Findings also confirm that anger bridges exposure to cyber terrorism and retaliation, rather than psychological mechanisms such as threat percep- tion or anxiety as other studies propose. These findings extend to the cyber realm a recent trend that views anger as a primary mechanism linking exposure to terrorism with militant preferences. With cyber ter- rorism a mounting international concern, this study demonstrates how exposure to this threat can gener- ate strong public support for retaliatory policies, depending on the lethality of the attack. Keywords: cyber terrorism; terrorism; retaliatory strikes; foreign policy preferences; critical infrastructure; anger Security officials have long warned of the foreboding threat posed by cyber terrorism. In recent years, following a spate of reports about next-generation cyber attacks causing real-world physical destruction, this threat has come of age. -
Deterrence and First-Strike Stability in Space
THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY research organization providing POPULATION AND AGING PUBLIC SAFETY objective analysis and effective SCIENCE AND TECHNOLOGY solutions that address the challenges SUBSTANCE ABUSE facing the public and private sectors TERRORISM AND HOMELAND SECURITY around the world. TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore RAND Project AIR FORCE View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity. Deterrence and First-Strike Stability in Space A Preliminary Assessment Forrest E. -
Glenn Snyder's Deterrence Theory and NATO's Deterrence Strategy
Glenn Snyder’s Deterrence Theory and NATO’s Deterrence Strategy during the Cold War (YAMASHITA Aihito) Glenn Snyder’s Deterrence Theory and NATO’s Deterrence Strategy during the Cold War Col. YAMASHITA Aihito Director, Center for Air and Space Power Strategic Studies Introduction The main strategic issues on NATO that the U.S. and Europe faced during the Cold War, when they are marshaled from the perspective of deterrence particularly for Europe, should be summarized as the questions of how to deter invasion by the Soviet Union, how to secure extended deterrence by the U.S., and in particular, how to enhance the credibility of the U.S. deterrence by punishment.1 NATO’s conventional military forces dominated by NATO’s ground troops were extremely vulnerable to those of the Soviet Union, which meant a significant disparity.2 Therefore, extended deterrence by the U.S. was thought to be essential for NATO in order to produce deterrent effect on the Soviet Union in the circumstances of the significant disparity in the conventional military forces dominated by ground troops. However, after the Soviet Union acquired the ability to attack the U.S. mainland with its nuclear weapons (typically represented by the situation of mutual assured destruction), Europe began to doubt the effectiveness of extended deterrence by the U.S. In this context, various theories including “stability-instability paradox” and “entrapment-abandonment” were discussed. 69 Air Power Studies (vol. 6) The concern Europe felt was connected with the controversy over the positioning theory of nuclear weapons in the U.S., that is, how the nature of nuclear weapons should be defined. -
Pakistani Nuclear Doctrine and the Dangers of Strategic Myopia
PAKISTANI NUCLEAR DOCTRINE AND THE DANGERS OF STRATEGIC MYOPIA Timothy D. Hoyt The formal introduction of nuclear weapons into South Asian regional security raises important questions about the stability of the region. As two traditionally hostile states induct nuclear weapons and so- phisticated delivery systems into their militaries, what will keep them from utilizing these new weapons for coercion or warfare? Proliferation “opti- mists” argue that states will be deterred from destabilizing actions by the inherent mismatch in costs and benefits or risks and potential gains from challenging a nuclear-armed adversary.1 Proliferation “pessimists” point to the dangers of the spread of nuclear weapons; the myriad of things that can go wrong once nuclear weapons are introduced into an already heated con- flict situation; and the lack of careful thought and planning that might go into the development, deployment, and use of nuclear forces.2 Timothy D. Hoyt is Visiting Assistant Professor for the Security Stud- ies Program, Georgetown University, Washington, D.C., and Professor of Strategy in the College of Continuing Education, a nonresident program of the U.S. Naval War College, Newport, Rhode Island. The conclusions expressed here are the author’s own and do not reflect the opin- ions of the Naval War College or any other official organization. Asian Survey, 41:6, pp. 956–977. ISSN: 0004–4687 Ó 2001 by The Regents of the University of California. All rights reserved. Send Requests for Permission to Reprint to: Rights and Permissions, University of California Press, Journals Division, 2000 Center St., Ste. 303, Berkeley, CA 94704–1223. -
Understanding Strategic Interaction in the Second Nuclear Age
UNDERSTANDING STRATEGIC INTERACTION IN THE SECOND NUCLEAR AGE THOMAS G. MAHNKEN GILLIAN EVANS TOSHI YOSHIHARA ERIC S. EDELMAN JACK BIANCHI UNDERSTANDING STRATEGIC INTERACTION IN THE SECOND NUCLEAR AGE THOMAS G. MAHNKEN GILLIAN EVANS TOSHI YOSHIHARA ERIC EDELMAN JACK BIANCHI 2019 ABOUT THE CENTER FOR STRATEGIC AND BUDGETARY ASSESSMENTS (CSBA) The Center for Strategic and Budgetary Assessments is an independent, nonpartisan policy research institute established to promote innovative thinking and debate about national security strategy and investment options. CSBA’s analysis focuses on key questions related to existing and emerging threats to U.S. national security, and its goal is to enable policymakers to make informed decisions on matters of strategy, security policy, and resource allocation. ©2019 Center for Strategic and Budgetary Assessments. All rights reserved. ABOUT THE AUTHORS Thomas G. Mahnken is President and Chief Executive Officer of the Center for Strategic and Budgetary Assessments. He is a Senior Research Professor at the Philip Merrill Center for Strategic Studies at The Johns Hopkins University’s Paul H. Nitze School of Advanced International Studies (SAIS) and has served for over 20 years as an officer in the U.S. Navy Reserve, to include tours in Iraq and Kosovo. He currently serves as a member of the Congressionally-mandated National Defense Strategy Commission and as a member of the Board of Visitors of Marine Corps University. His previous government career includes service as Deputy Assistant Secretary of Defense for Policy Planning from 2006–2009, where he helped craft the 2006 Quadrennial Defense Review and 2008 National Defense Strategy. He served on the staff of the 2014 National Defense Panel, 2010 Quadrennial Defense Review Independent Panel, and the Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction. -
Attributing Cyber Attacks Thomas Rida & Ben Buchanana a Department of War Studies, King’S College London, UK Published Online: 23 Dec 2014
This article was downloaded by: [Columbia University] On: 08 June 2015, At: 08:43 Publisher: Routledge Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK Journal of Strategic Studies Publication details, including instructions for authors and subscription information: http://www.tandfonline.com/loi/fjss20 Attributing Cyber Attacks Thomas Rida & Ben Buchanana a Department of War Studies, King’s College London, UK Published online: 23 Dec 2014. Click for updates To cite this article: Thomas Rid & Ben Buchanan (2015) Attributing Cyber Attacks, Journal of Strategic Studies, 38:1-2, 4-37, DOI: 10.1080/01402390.2014.977382 To link to this article: http://dx.doi.org/10.1080/01402390.2014.977382 PLEASE SCROLL DOWN FOR ARTICLE Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and are not the views of or endorsed by Taylor & Francis. The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information. Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use of the Content.