Berlin Security Beat   /     Episode 08: “Cyber (In-)Security”

Description

Tarah Wheeler, a Cyber Project Fellow at the Belfer Center for Science and International Affairs at Harvard University’s Kennedy School of Government, and an expert on information security and international conflict, joins Dr. Katharina Emschermann, Deputy Director at the Centre for International Security, to talk about cyber security. They discuss: • the difference between cyber espionage and cyber war, • whether deterrence can work in cyberspace, • what the cyber future of warfare will look like, • and what that entails for military planning and procurement.

Subtitle
Duration
1335
Publishing date
2021-06-29 06:00
Link
https://berlinsecuritybeat.podigee.io/8-cyber-in-security
Contributors
  Katharina Emschermann, Centre for International Security at the Hertie School
author  
Enclosures
https://cdn.podigee.com/media/podcast_33775_berlin_security_beat_episode_481457_epsd_08_cyber_in_security.mp3?v=1625753106&source=feed
audio/mpeg

Shownotes

Tarah Wheeler, a Cyber Project Fellow at the Belfer Center for Science and International Affairs at Harvard University’s Kennedy School of Government, and an expert on information security and international conflict, joins Dr. Katharina Emschermann, Deputy Director at the Centre for International Security, to talk about cyber security. They discuss: • the difference between cyber espionage and cyber war, • whether deterrence can work in cyberspace, • what the cyber future of warfare will look like, • and what that entails for military planning and procurement.

Bibliography Egloff, Florian J./ Smeets, Max (2021): Publicly attributing cyber attacks: a framework, in: Journal of Strategic Studies, https://www.tandfonline.com/doi/full/10.1080/01402390.2021.1895117
Healey, Jason/ Jervis, Robert (2020): The Escalation Inversion and Other Oddities of Situational Cyber Stability, https://repositories.lib.utexas.edu/handle/2152/83969 NATO (2021): Brussels Summit Communiqué, (06/14/2021), https://www.nato.int/cps/en/natohq/news_185000.htm Rushe, Dominic/ Borger, Julian (2021): Age of the cyber-attack: US struggles to curb rise of digital destabilization, (06/14/2021), https://www.theguardian.com/technology/2021/jun/14/age-of-the-cyber-attack-us-digital-destabilization Schneider, Jacquelyn (2020): A Strategic Cyber No-First-Use Policy? Addressing the US Cyber Strategy Problem, in: The Washington Quarterly, 43:2, 159-175, https://www.tandfonline.com/doi/abs/10.1080/0163660X.2020.1770970?journalCode=rwaq20 Schneier, Bruce/ Wheeler, Tarah (2021): Hacked drones and busted logistics are the cyber future of warfare, https://www.brookings.edu/techstream/hacked-drones-and-busted-logistics-are-the-cyber-future-of-warfare/ Smeets, Max (2020): U.S. cyber strategy of persistent engagement & defend forward: implications for the alliance and intelligence collection, in: Intelligence and National Security, 35:3, 444-453, https://www.tandfonline.com/doi/abs/10.1080/02684527.2020.1729316?journalCode=fint20 Wheeler, Tarah (2018): In cyber war there are no rules: Why the world desperately needs digital Geneva Conventions, in: Foreign Policy, (09/12/2018), https://foreignpolicy.com/2018/09/12/in-cyberwar-there-are-no-rules-cybersecurity-war-defense/ Wheeler, Tarah (2021): The danger in calling the SolarWinds breach an ‘act of war’, (03/04/2021), https://www.brookings.edu/techstream/the-danger-in-calling-the-solarwinds-breach-an-act-of-war/ Wilner, Alex S. (2020): US cyber deterrence: Practice guiding theory, in: Journal of Strategic Studies, 43:2, 245-280, https://www.tandfonline.com/doi/full/10.1080/01402390.2018.1563779?casa_token=ihL6qyupj80AAAAA%3AHI_eHOLtOo3rLJzle1O0gC8gjkPKesKlWFbJtMtoxopC5rIUVpV47jD9WD0R5E3dK8mDfSZ4zT-m

Tarah Wheeler’s Choice for Best Cyber “Beach Read” Citron, Danielle K./ Solove, Daniel J. (2021): Privacy Harms, GWU Legal Studies Research Paper No. 2021-11, (02/09/2021), https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3782222