While wargames offer the possibility of exploring the potential outcomes of a U.S.-China war, they have several shortcomings that must be considered in order to more incisively explore key issues such as deterrence and escalation management.
Latest in deterrence
This challenge will be a tournament and it will ask participants to issue predictions on a range of cybersecurity topics.
Can we apply the techniques of crowd-forecasting for better cybersecurity?
Outdated Ethics Rules May Be Stymieing the Federal Trade Commission’s Efforts to Keep Up with Big Tech
Do the FTC’s longstanding conflict-of-interest rules unnecessarily impede the agency’s ability to attract, retain and deploy technical expertise that it badly needs?
Artificial intelligence is already reshaping the ways that policymakers approach deterrence, and how adversaries respond.
Strategic messages that incorporate credible threats under jus ad bellum are often the best option to enhance deterrence signaling.
When the secretary of state says "deterrence," it seems like he means something else.
In a recent Lawfare essay, Jim Miller and Neal Pollard offer an important and positive assessment of the strategy of persistent engagement, a strategic approach designed to thwart adversary cyberspace campaigns by continuously anticipating and exploiting vulner
The next National Defense Authorization Act (the NDAA FY’18) is nearing the finish line. A Conference Report is now available, and so the time has come for a closer look at some of the key provisions of interest to Lawfare readers. My colleague Scott Anderson is going to post a broad overview shortly. For my part, I’d like to walk you through the “Cyberspace-Related Matters” section (sections 1631-1649C).