« Previous |
61 - 66 of 66
|
Next »
Number of results to display per page
Search Results
62. Federated Defense in Asia
- Author:
- Michael J. Green, Kathleen H. Hicks, and Zack Cooper
- Publication Date:
- 12-2014
- Content Type:
- Working Paper
- Institution:
- Center for Strategic and International Studies
- Abstract:
- The United States has long emphasized the desirability of working with allies and partners to meet pressing security challenges. Indeed, many of our most vexing security concerns—from terrorism to cyber attacks—are best met with concerted multilateral responses. At a time when the United States and many of its allies and partners are reluctant to increase defense and security spending, working together is paramount. This is perhaps most evident in Asia, where present and potential future threats to security and prosperity are high and shared interests are substantial.
- Topic:
- Security, Defense Policy, Diplomacy, Disaster Relief, Humanitarian Aid, and Intelligence
- Political Geography:
- United States and Asia
63. Talking Technology Best Practices in Communicating
- Author:
- Maren Leed, Kathryn Easop, Alvaro Genie, and Jaimie Hoskins
- Publication Date:
- 12-2014
- Content Type:
- Working Paper
- Institution:
- Center for Strategic and International Studies
- Abstract:
- In recent months, Department of Defense leaders have raised increasing concerns about the potential for the United States to lose its comparative advantage in multiple technology areas. To help address this trend, Secretary of Defense Chuck Hagel recently directed a “Defense Innovation Initiative” aimed at fostering the development of breakthrough technologies. Success in this effort will require a series of actions, but all rest on one critical factor: a shared understanding across the research and policy communities of the scientific potential and its importance to our national security going forward. Without that common view, scientists in both the public and private sector will be unable to sustain sufficient support to deliver meaningful advances.
- Topic:
- Defense Policy, Science and Technology, and Infrastructure
- Political Geography:
- United States
64. Leveraging Global Value Chains for a Federated Approach to Defense
- Author:
- David J. Berteau, Scott Miller, Ryan Crotty, and Paul Nadeau
- Publication Date:
- 12-2014
- Content Type:
- Working Paper
- Institution:
- Center for Strategic and International Studies
- Abstract:
- CSIS launched the Federated Defense Project to assess and recommend concrete ways for the United States and its partners to integrate their defense capabilities in support of shared interests. Rather than creating interdependencies that would hinder autonomous action or bind partners to commitments to which they only share a tangential interest, the federated defense strategy builds on the natural interests of allies and partners to develop closer working ties to the United States and one another in order to manage the challenges posed by constrained resources and a daunting geostrategic environment. Buttressing any form of federated defense must be a set of bottom-up, organic interactions within the private sector to develop the capabilities that will underpin these security architectures. The expansion of business-to-business relationships among providers of platforms, supplies, and services to the network of trusted partners and allies is a key building block in ensuring adequate capabilities development, integration, and interoperability. To date, this interaction has occurred despite the many barriers that exist to their success. A federated approach will seek to enable this cooperation and lower these barriers, leading to greater cooperation, collaboration, and integration through global value chains (GVCs). Addressing the findings below is essential to the successful execution of a federated approach to defense.
- Topic:
- Defense Policy, Privatization, and Military Strategy
- Political Geography:
- United States
65. Cybersecurity and Tailored Deterrence
- Author:
- Franklin D. Kramer and Melanie J. Teplinsky
- Publication Date:
- 01-2014
- Content Type:
- Policy Brief
- Institution:
- Atlantic Council
- Abstract:
- Cyber has become the new conflict arena. It ranks as one of the greatest national security challenges facing the United States for three reasons. First, as the revelations about the National Security Agency's (NSA's) activities suggest, cyber offense has far outpaced cyber defense. Second, cyber capabilities are prevalent worldwide and increasingly are being used to achieve the strategic goals of nations and actors adverse to the United States. Third, it is highly unlikely that cyber espionage and other cyber intrusions will soon cease. While the NSA disclosures focus on the United States and the United Kingdom, there is little doubt that China, Russia, Iran, North Korea and others are engaged in significant cyber activities. The fundamental question is whether the cyber realm can, consistent with the national interest, be made more stable and secure.
- Topic:
- Defense Policy, Science and Technology, and Military Strategy
- Political Geography:
- Russia, United States, China, United Kingdom, Iran, and North Korea
66. Global Cybercrime: The Interplay of Politics and Law
- Author:
- Aaron Shull
- Publication Date:
- 06-2014
- Content Type:
- Working Paper
- Institution:
- Centre for International Governance Innovation
- Abstract:
- Examining global cybercrime as solely a legal issue misses an important facet of the problem. Understanding the applicable legal rules, both domestically and internationally, is important. However, major state actors are using concerted efforts to engage in nefarious cyber activities with the intention of advancing their economic and geostrategic interests. This attempt to advance a narrow set of economic interests through cybercrime and economic cyber espionage holds to the potential to erode the trust in the digital economy that has been a necessary condition for the success of the Internet as an economic engine for innovation and growth. By pursuing these efforts, states are prioritizing short-term interests over long-term stability and a responsibly governed, safe and secure Internet platform. This paper explores the recent unsealing of a 31-count indictment against five Chinese government officials and a significant cyber breach, perpetrated by Chinese actors against Western oil, energy and petrochemical companies. The paper concludes by noting that increased cooperation among governments is necessary, but unlikely to occur as long as the discourse surrounding cybercrime remains so heavily politicized and securitized. If governments coalesced around the notion of trying to prevent the long-term degradation of trust in the online economy, they may profitably advance the dialogue away from mutual suspicion and toward mutual cooperation.
- Topic:
- Defense Policy, Crime, International Trade and Finance, Terrorism, and Bilateral Relations
- Political Geography:
- United States, China, and Asia