deterrence

Latest in deterrence

Cybersecurity and Deterrence

A Response on Persistent Engagement and Agreed Competition

In a recent Lawfare essay, Jim Miller and Neal Pollard offer an important and positive assessment of the strategy of persistent engagement, a strategic approach designed to thwart adversary cyberspace campaigns by continuously anticipating and exploiting vulner

Cybersecurity

The NDAA FY'18's Cyber Provisions: What Emerged from Conference?

The next National Defense Authorization Act (the NDAA FY’18) is nearing the finish line. A Conference Report is now available, and so the time has come for a closer look at some of the key provisions of interest to Lawfare readers. My colleague Scott Anderson is going to post a broad overview shortly. For my part, I’d like to walk you through the “Cyberspace-Related Matters” section (sections 1631-1649C).

North Korea

Getting More Cooperation From China on North Korea

Other than war, the only ways to address the major threats from North Korea are deterrence and negotiations. The U.S. should certainly continue and sensibly expand deterrence strategies. But negotiations with North Korea would provide the best path forward. Most people agree that the best route to effective negotiations is working cooperatively with China, but those efforts haven’t yet paid off.

Cyber & Technology

Cyber Strategy & Policy: International Law Dimensions

Below is a condensed version of the statement I have prepared for my testimony tomorrow before the Senate Armed Services Committee on the international law dimensions of U.S. cyber strategy and policy (link to the hearing is here). The full version, which also includes some extra detail and sourcing in the footnotes, is available here.

***

Subscribe to Lawfare

EmailRSSKindle