In a recent Lawfare essay, Jim Miller and Neal Pollard offer an important and positive assessment of the strategy of persistent engagement, a strategic approach designed to thwart adversary cyberspace campaigns by continuously anticipating and exploiting vulner
Latest in deterrence
The next National Defense Authorization Act (the NDAA FY’18) is nearing the finish line. A Conference Report is now available, and so the time has come for a closer look at some of the key provisions of interest to Lawfare readers. My colleague Scott Anderson is going to post a broad overview shortly. For my part, I’d like to walk you through the “Cyberspace-Related Matters” section (sections 1631-1649C).
Other than war, the only ways to address the major threats from North Korea are deterrence and negotiations. The U.S. should certainly continue and sensibly expand deterrence strategies. But negotiations with North Korea would provide the best path forward. Most people agree that the best route to effective negotiations is working cooperatively with China, but those efforts haven’t yet paid off.
Although the issue has been simmering for many years, the recent American election-related hacks by Russia have raised interest in deterrence of cyber-attacks—including whether and how they can be deterred.
Below is a condensed version of the statement I have prepared for my testimony tomorrow before the Senate Armed Services Committee on the international law dimensions of U.S. cyber strategy and policy (link to the hearing is here). The full version, which also includes some extra detail and sourcing in the footnotes, is available here.
Nearly half a year after the DNC hack, the United States finally took action. Citing the role of the Russian government in cyber operations apparently intended to affect the U.S. presidential election, as well as harassment of U.S.
Following the joint statement from DHS and ODNI accusing Russia of a recent spate of hacks aimed at influencing the US election, the obvious question is what exactly the US government plans to do about it.
Two weeks ago the newspapers were filled with leaked threats that the U.S. government was “developing a package of unprecedented economic sanctions against Chinese companies and individuals who have benefited from their government’s cyber theft of valuable U.S.