As the U.S. reexamines its trade policy, commentators following U.S.-China affairs have noted an important area that has not received as much attention as the bilateral trade in goods but may one day rival it: the digital economy. Although U.S. exports of information and communication technology-related services to China totaled $12.8 billion in 2015, e-commerce sales in China were estimated to be $672 billion in 2014 (double that of the United States).
Latest in cyber
On March 18, 2017, the G20 finance ministers and central bank governors issued a communiqué highlighting that:
Although the issue has been simmering for many years, the recent American election-related hacks by Russia have raised interest in deterrence of cyber-attacks—including whether and how they can be deterred.
While transnational cybercrime has played a part in the U.S-China relationship for some time, the issue assumed a high profile during the September 2015 U.S.-China summit discussions that led to the U.S.-China High-Level Joint Dialogue on Cybercrime and Related Issues.
Below is a condensed version of the statement I have prepared for my testimony tomorrow before the Senate Armed Services Committee on the international law dimensions of U.S. cyber strategy and policy (link to the hearing is here). The full version, which also includes some extra detail and sourcing in the footnotes, is available here.
On Wednesday, the Deputy Secretary of Defense issued a memo that clarifies how the Department of Defense (DoD) will implement President Trump’s executive order to freeze all civilian hiring across all departments and agencies.
Thanks to the at-times br
Amidst the whirlwind of executive orders and presidential memoranda that have been in the news, it was easy to miss a purported draft of President Trump’s first executive order (EO) covering cybersecurity issues, leaked to the Washington Post and released on Friday, January 27. The order, titled “Strengthening U.S. Cyber Security and Capabilities,” calls for several 60- and 100-day assessments of the state of U.S.
In the world of kinetic military operations, collateral damage is typically straightforward to assess because of well-established definitions, well-understood weapon characteristics, and reasonably well-defined legal and policy frameworks. In traditional warfare, collateral damage occurs when a hostile action causes unintended physical damage to civilian persons or objects.
This is a plug for a new cyber policy book out this month: Cyber Insecurity: Navigating the Perils of the Next Information Age, edited by Richard Harrison, Director of Operations and Defense Technology Programs at the American Foreign Policy Council, and Trey Herr, Fellow with the Belfer Center's Cyber Security Project at the Harvard Kennedy School.