NATO's central missions of collective defense and cooperative security must be as effective in cyberspace as in the other domains of air, land, sea, and space.
Topic:
Defense Policy, International Cooperation, Science and Technology, and Reform
Over the course of 2011, the United States government released a coordinated set of policies that represents the most energetic cyber statecraft in nearly a decade.
Topic:
Security, Defense Policy, and Science and Technology
Since the Internet makes us all neighbors, more nations are likely to be affected by conflicts in cyberspace than in the air, land, or sea. Nations are increasingly looking to limit potential cyber conflicts using the same devices that have limited more traditional wars: treaties, conventions, and norms.
Topic:
Defense Policy, International Cooperation, Science and Technology, and Reform
Experts have warned about a massive surprise cyber attack since at least 1991, when Winn Schwartau testified to Congress about the dangers of an "electronic Pearl Harbor." More recently, the analogy has changed to a "cyber 9/11" but the fear is generally the same: the dependence of modern economies and societies on cyberspace means a digital attack could fundamentally disrupt our way of life and be remembered for decades as the day everything changed.
Topic:
Defense Policy, Economics, Science and Technology, and Terrorism
The perfect is the enemy of the good in both military alliances and cyber security. The dream cyber warning network would detect most attacks before they occur and quickly detect and stop the rest, preferably automatically. Unfortunately, this is currently feasible only for extremely small and heterogeneous organizations willing to commit significant resources, such as financial institutions. The challenges for a military alliance of twenty-eight nations with widely varying budgets and needs are much harder to meet.
Topic:
Security, Defense Policy, NATO, and Science and Technology
The new United States defense guidance has substantial implications for transatlantic nations that must be addressed at the NATO Summit in May. Specifically, how does the longstanding transatlantic security bargain apply in this globalized world? What are the key security challenges at this strategic turning point? How should those challenges be met in a time of financial constraint? And what are the key actions the transatlantic nations should undertake?
Topic:
Foreign Policy, NATO, Science and Technology, and International Security
The most disruptive potential cyber security concern is the capacity of information technology to generate or escalate geopolitical conflicts into open or uncontained hostilities through attacks on operational networks. Undermining critical capabilities such as the military or the electric power grid would be highly destabilizing and potentially escalatory, generating a perceived need to move a confrontation toward conflict or to escalate a contained conflict into a broader arena.
Topic:
International Cooperation, International Law, Science and Technology, and International Security
The world is about to experience the emergence of a second wave of wireless technology. It will be a "disruptive technology" globally and could contribute to accelerating the socioeconomic development trajectories of the world's poorest countries, according to a presentation made by Jeffrey Reed of Virginia Tech and James Neel of Cognitive Radio Technologies during a workshop entitled "The Second Wave of Wireless Communication - A New Wave of Disruptive Technology."
Topic:
Development, Globalization, Science and Technology, and Communications
The best deterrence to cyber conflict is to aggressively pursue national and international risk mitigation at the same time that we explore a full-spectrum of cyber capabilities. Nations should strive to reduce the emerging cyber arms race by developing a basis for trust. The international community has already taken useful steps in this direction with, for example, the European Convention on Cybercrime and the UN report on cyber security which calls for a set of actions that would make information infrastructures more secure.
Topic:
Defense Policy, Science and Technology, Terrorism, War, and International Security
How much energy does it take to put a meal on a plate? Here's the best answer that I've come up with so far: it takes about the equivalent of one third pound of oil to produce, harvest, process, transport, store, package, and prepare every pound of food on the planet. This does not include solar radiation and other natural energy used by plants and animals or energy used to travel to shop for food or to dispose of food waste. The bulk of the energy used across the life cycle of food is fossil fuels, and most of it is oil.
Topic:
Economics, Energy Policy, Science and Technology, and Food