This challenge will be a tournament and it will ask participants to issue predictions on a range of cybersecurity topics.
Latest in deterrence
Can we apply the techniques of crowd-forecasting for better cybersecurity?
Outdated Ethics Rules May Be Stymieing the Federal Trade Commission’s Efforts to Keep Up with Big Tech
Do the FTC’s longstanding conflict-of-interest rules unnecessarily impede the agency’s ability to attract, retain and deploy technical expertise that it badly needs?
Artificial intelligence is already reshaping the ways that policymakers approach deterrence, and how adversaries respond.
Strategic messages that incorporate credible threats under jus ad bellum are often the best option to enhance deterrence signaling.
When the secretary of state says "deterrence," it seems like he means something else.
In a recent Lawfare essay, Jim Miller and Neal Pollard offer an important and positive assessment of the strategy of persistent engagement, a strategic approach designed to thwart adversary cyberspace campaigns by continuously anticipating and exploiting vulner
The next National Defense Authorization Act (the NDAA FY’18) is nearing the finish line. A Conference Report is now available, and so the time has come for a closer look at some of the key provisions of interest to Lawfare readers. My colleague Scott Anderson is going to post a broad overview shortly. For my part, I’d like to walk you through the “Cyberspace-Related Matters” section (sections 1631-1649C).
Other than war, the only ways to address the major threats from North Korea are deterrence and negotiations. The U.S. should certainly continue and sensibly expand deterrence strategies. But negotiations with North Korea would provide the best path forward. Most people agree that the best route to effective negotiations is working cooperatively with China, but those efforts haven’t yet paid off.