19 research outputs found

    Business Warfare

    Get PDF
    Businesses are under attack. State and non-state adversaries are assaulting companies using drones, mercenaries, cyberweapons, sanctions, and restrictions. Instead of military installations and government institutions, private firms are often the preferred targets in this mode of warfare. Instead of soldiers and squadrons with bullets and bombs, the weapons of choice are frequently economic hostilities and cyberattacks. This is the new war on business. This Article offers an original examination of contemporary business warfare, its growing importance to national and corporate affairs, and the need for better pragmatic approaches to understanding and addressing its rising threat to our economic stability, national security, and social welfare. It begins by providing an overview of the business theater of war, investigating the combatants, targets, and weapons. Next, this Article analyzes recent episodes of business warfare involving the United States, Russia, Iran, Saudi Arabia, and China to ground the theoretical discussion in the real world. These case studies illustrate the complex matrix of considerations posed by business warfare. The Article then contends with the fundamental legal and practical tensions of economic impact, business hostilities, cyberattacks, and non-state actors that emanate from business warfare. Finally, moving from problems to solutions, this Article proposes three workable initiatives to better protect firms and nations against the risks of business warfare. Specifically, it argues for robust business war games, smart cybersecurity guidance and incentives, as well as greater supply chain and market diversification. Ultimately, this Article aspires to provide a practical blueprint for government and corporate leaders to reflect, plan, and act with more urgency about the consequential realities of business warfare

    Governance of Dual-Use Technologies: Theory and Practice

    Get PDF
    The term dual-use characterizes technologies that can have both military and civilian applications. What is the state of current efforts to control the spread of these powerful technologies—nuclear, biological, cyber—that can simultaneously advance social and economic well-being and also be harnessed for hostile purposes? What have previous efforts to govern, for example, nuclear and biological weapons taught us about the potential for the control of these dual-use technologies? What are the implications for governance when the range of actors who could cause harm with these technologies include not just national governments but also non-state actors like terrorists? These are some of the questions addressed by Governance of Dual-Use Technologies: Theory and Practice, the new publication released today by the Global Nuclear Future Initiative of the American Academy of Arts and Sciences. The publication's editor is Elisa D. Harris, Senior Research Scholar, Center for International Security Studies, University of Maryland School of Public Affairs. Governance of Dual-Use Technologies examines the similarities and differences between the strategies used for the control of nuclear technologies and those proposed for biotechnology and information technology. The publication makes clear the challenges concomitant with dual-use governance. For example, general agreement exists internationally on the need to restrict access to technologies enabling the development of nuclear weapons. However, no similar consensus exists in the bio and information technology domains. The publication also explores the limitations of military measures like deterrence, defense, and reprisal in preventing globally available biological and information technologies from being misused. Some of the other questions explored by the publication include: What types of governance measures for these dual-use technologies have already been adopted? What objectives have those measures sought to achieve? How have the technical characteristics of the technology affected governance prospects? What have been the primary obstacles to effective governance, and what gaps exist in the current governance regime? Are further governance measures feasible? In addition to a preface from Global Nuclear Future Initiative Co-Director Robert Rosner (University of Chicago) and an introduction and conclusion from Elisa Harris, Governance of Dual-Use Technologiesincludes:On the Regulation of Dual-Use Nuclear Technology by James M. Acton (Carnegie Endowment for International Peace)Dual-Use Threats: The Case of Biotechnology by Elisa D. Harris (University of Maryland)Governance of Information Technology and Cyber Weapons by Herbert Lin (Stanford University

    The history and sociology of computer science and technology, collected vol. 4

    Get PDF
    A historiography and source material

    Managing Risk and Information Security: Protect to Enable (Second Edition)

    Get PDF
    Computer scienc

    Countering Terrorism on Tomorrow’s Battlefield: Critical Infrastructure Security and Resiliency (NATO COE-DAT Handbook 2)

    Get PDF
    Every day, malicious actors target emerging technologies and medical resilience or seek to wreak havoc in the wake of disasters brought on by climate change, energy insecurity, and supply-chain disruptions. Countering Terrorism on Tomorrow’s Battlefield is a handbook on how to strengthen critical infrastructure resilience in an era of emerging threats. The counterterrorism research produced for this volume is in alignment with NATO’s Warfighting Capstone Concept, which details how NATO Allies can transform and maintain their advantage despite new threats for the next two decades. The topics are rooted in NATO’s Seven Baseline requirements, which set the standard for enhancing resilience in every aspect of critical infrastructure and civil society. As terrorists hone their skills to operate lethal drones, use biometric data to target innocents, and take advantage of the chaos left by pandemics and natural disasters for nefarious purposes, NATO forces must be prepared to respond and prevent terrorist events before they happen. Big-data analytics provides potential for NATO states to receive early warning to prevent pandemics, cyberattacks, and kinetic attacks. NATO is perfecting drone operations through interoperability exercises, and space is being exploited by adversaries. Hypersonic weapons are actively being used on the battlefield, and satellites have been targeted to take down wind farms and control navigation. This handbook is a guide for the future, providing actionable information and recommendations to keep our democracies safe today and in the years to come.https://press.armywarcollege.edu/monographs/1953/thumbnail.jp

    Artificial Intelligence and International Conflict in Cyberspace

    Get PDF
    This edited volume explores how artificial intelligence (AI) is transforming international conflict in cyberspace. Over the past three decades, cyberspace developed into a crucial frontier and issue of international conflict. However, scholarly work on the relationship between AI and conflict in cyberspace has been produced along somewhat rigid disciplinary boundaries and an even more rigid sociotechnical divide – wherein technical and social scholarship are seldomly brought into a conversation. This is the first volume to address these themes through a comprehensive and cross-disciplinary approach. With the intent of exploring the question ‘what is at stake with the use of automation in international conflict in cyberspace through AI?’, the chapters in the volume focus on three broad themes, namely: (1) technical and operational, (2) strategic and geopolitical and (3) normative and legal. These also constitute the three parts in which the chapters of this volume are organised, although these thematic sections should not be considered as an analytical or a disciplinary demarcation

    Cyber Law and Espionage Law as Communicating Vessels

    Get PDF
    Professor Lubin\u27s contribution is Cyber Law and Espionage Law as Communicating Vessels, pp. 203-225. Existing legal literature would have us assume that espionage operations and “below-the-threshold” cyber operations are doctrinally distinct. Whereas one is subject to the scant, amorphous, and under-developed legal framework of espionage law, the other is subject to an emerging, ever-evolving body of legal rules, known cumulatively as cyber law. This dichotomy, however, is erroneous and misleading. In practice, espionage and cyber law function as communicating vessels, and so are better conceived as two elements of a complex system, Information Warfare (IW). This paper therefore first draws attention to the similarities between the practices – the fact that the actors, technologies, and targets are interchangeable, as are the knee-jerk legal reactions of the international community. In light of the convergence between peacetime Low-Intensity Cyber Operations (LICOs) and peacetime Espionage Operations (EOs) the two should be subjected to a single regulatory framework, one which recognizes the role intelligence plays in our public world order and which adopts a contextual and consequential method of inquiry. The paper proceeds in the following order: Part 2 provides a descriptive account of the unique symbiotic relationship between espionage and cyber law, and further explains the reasons for this dynamic. Part 3 places the discussion surrounding this relationship within the broader discourse on IW, making the claim that the convergence between EOs and LICOs, as described in Part 2, could further be explained by an even larger convergence across all the various elements of the informational environment. Parts 2 and 3 then serve as the backdrop for Part 4, which details the attempt of the drafters of the Tallinn Manual 2.0 to compartmentalize espionage law and cyber law, and the deficits of their approach. The paper concludes by proposing an alternative holistic understanding of espionage law, grounded in general principles of law, which is more practically transferable to the cyber realmhttps://www.repository.law.indiana.edu/facbooks/1220/thumbnail.jp

    From abuse to trust and back again

    Get PDF
    oai:westminsterresearch.westminster.ac.uk:w7qv

    Intelligence Oversight In Times of Transnational Impunity: Who Will Watch the Watchers?

    Get PDF
    This book adopts a critical lens to look at the workings of Western intelligence and intelligence oversight over time and space. Largely confined to the sub-field of intelligence studies, scholarly engagements with intelligence oversight have typically downplayed the violence carried out by secretive agencies. These studies have often served to justify weak oversight structures and promoted only marginal adaptations of policy frameworks in the wake of intelligence scandals. The essays gathered in this volume challenge the prevailing doxa in the academic field, adopting a critical lens to look at the workings of intelligence oversight in Europe and North America. Through chapters spanning across multiple disciplines–political sociology, history, and law–the book aims to recast intelligence oversight as acting in symbiosis with the legitimisation of the state’s secret violence and the enactment of impunity, showing how intelligence actors practically navigate the legal and political constraints created by oversight frameworks and practices, for instance by developing transnational networks of interdependence. The book also explores inventive legal steps and human rights mechanisms aimed at bridging some of the most serious gaps in existing frameworks, drawing inspiration from recent policy developments in the international struggle against torture. This book will be of much interest to students of intelligence studies, sociology, security studies, and international relations

    War in the 21st Century and Collected Works

    Get PDF
    corecore