Cyber War as Cultural War
The Cyber War we are seeing today is an extension of a deeper cultural war. The only difference is that it is being conducted with...
646-389-1382
INSTITUTE FOR CYBER ARMS CONTROL
Non-Proliferation of Cyber Weapons
The Cyber War we are seeing today is an extension of a deeper cultural war. The only difference is that it is being conducted with...
There was a large effort at arms control after the Great War (World War I). These efforts were driven by the universal revulsion at the...
The work of the UN Security Council encompasses a wide range of threats to international peace and security. In order to preserve...
The United Nations Institute for Disarmament Research (UNIDIR) held a Cyber Stability Conference on June 6, 2019 at UN headquarters in...
LIMITED RESPONSIBILITY One peculiarity of Dutch cyber policy is that the Netherlands Armed Forces are not responsible for protection of...
CYBER READINESS LEVELS Cyber war may be thought of as a low-level type of conflict. In its initial stages, it does not have an offensive...
[Originally published on cyberarmscontrolblog.com] What is the Cyber War Doctrine of the Armed Forces of the Russian Federation?...
DIFFICULTY IN CONTROLLING CYBER WEAPONS One of the chief criticisms of an international treaty for the control of cyber weapons is that...
PROSPECTS FOR “CYBER DÉTENTE” In his analysis of why détente between the United States and the Soviet Union broke down in the period of...
Note: Please refer to 18 U.S.C. §798 "Disclosure of Classified Information" which states that (a)Whoever . . . publishes . . . any...
PART I – VOCABULARY China’s national strategy for cyberspace is breathtaking in its comprehensiveness. It recognizes the importance of...
CHINESE CYBERSPACE (中国网络空间) Below are a few conclusions we can draw regarding how the Chinese government views cyberspace (网络空间 wǎngluò...
Indictment of Dmitry Dokuchaev for Conspiracy to Commit Computer Fraud and Abuse 18 U.S.C. § 1831(a)(5)
Deterrence in the Nuclear Age Deterrence is found between nation states when an aggressive action by any nation is discouraged because of...
Can we conclude that the United States of America is the world’s cyber superpower? History shows that the revolution in computing and...
In the deterrence theory of nuclear war, the “triad” is an essential concept. It refers to three different delivery platforms for...
Non-Proliferation Treaty of 1968 applied to control of cyber weapons and cyber arms race.
May 1, 2019 During the recent disturbances in Israel, the Hamas organization unleashed a cyber attack against targets in Israel. Israel...