It is tempting to view the Obama administration’s new cyber strategy as the creation of yet another “conflict domain” to worry about in U.S. national security. Thus, in our enduring habit of piling new fears on top of old ones — nuclear proliferation, terror, rising powers and failed states, among others — we imagine yet another vulnerability/threat/enemy to address with buckets of money. In truth, the strategy document is just our government finally acknowledging that, as usual, any fruitful international dialogue on this subject awaits the first move by the system’s most advanced military power. The same stalemate exists in […]
Technology Archive
Free Newsletter
Last week’s announcement by Pentagon officials that cyberattacks could be classified as acts of war caused concern among those who worry that the United States might act outside international law if it retaliates to such attacks with military force. Others assert the move amounts to little more than a money grab by budget-savvy advocates looking to foment fear and exploit public ignorance. But many cybersecurity experts say the policy statement is merely the latest step in a strategy that President Barack Obama began developing two years ago. And, they say, it might act as a deterrent to would-be U.S. enemies. […]
The West Africa Cable System recently landed in Ghana, extending the reach of the new undersea telecommunications cable that will eventually run from South Africa to Western Europe. In an email interview, Patricia K. McCormick, an expert in developing-country telecommunications policy at Wayne State University, discussed Africa’s telecommunications infrastructure. WPR: What is the current state of Africa’s telecommunications infrastructure? Patricia K. McCormick: If the wealth and socio-economic health of a region is defined by its ability to participate in the networked economy, Africa is indeed impoverished. In an era of accelerated technological change, Africa’s technological dependency and underdevelopment impairs its […]
According to a coordinated series of leaks to the media last week, the Pentagon is in the process of finalizing its first formal cybersecurity strategy. Several unnamed Defense Department officials have confirmed that the 30-page classified document will be completed later this month, with the Pentagon expected to release a declassified 12-page version as well. The leaking, which was deliberate, may be a trial balloon to gauge domestic and international response to the strategy’s tenets. That way the text could subsequently be revised, especially when it undergoes further White House review to ensure it harmonizes with the administration’s overall cybersecurity […]