Skip to main content

Currently Skimming:

3 International Relationsand National Security
Pages 20-28

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 20...
... Moreover, just as information tech nologies can be used to conduct crimes, they can be used as weapons to instigate or escalate conflicts and crises. Threats exist in such areas as cyber security attacks, electronic warfare, information operations, and psychological operations, with malevolent actors ranging from criminals and terrorists to entire nations.
From page 21...
... Though rarely used in the past, these provisions are now used frequently. Government funds national intelligence agencies to protect national security, including the protection of armed forces operating overseas, countering proliferation, and uncover ing state-sponsored cyberattacks.
From page 22...
... and in government have traditionally been quite different. Applying lessons learned about network effects in the IT industry to international security and surveillance could prove fruitful and might illuminate strategic policy questions about surveillance, information sharing, and international affairs.
From page 23...
... Two main statutes affect the disclosure of information in the United States. The first is the Stored Communications Act, which prohibits communications companies from sharing or disclosing data except in certain situations.
From page 24...
... They also will not necessarily advance the eco nomic and social interests of those countries, since they erect what is essentially a tariff barrier, making it more expensive to offer digital services in that country while facilitating censorship and social control. Companies will continue to struggle with the competing demands from differ ent nation-states, but network effects will press against the desire to establish separate, closed Internets.
From page 25...
... •  yberpreemption and damage limitation – reducing the capability of the forces C that an adversary might use. •  yber arms control – can entail workable agreements with potential adversaries C to reduce the likelihood of hostile cyber operations and reducing damage should hostile operations occur.
From page 26...
... And com municating during crises, differentiating espionage from attack, cooperating against third party provocateurs, or declaring cyber ceasefires could prevent inadvertent escalation. Making Progress on International Issues The international dimensions of cybersecurity will have a profound impact on the future of IT.
From page 27...
... The main objective of the Budapest Convention on Cybercrime is to create a common policy for protecting society against cybercrime, especially by adopting appropriate legislation and fostering international cooperation. This first international treaty addressing Internet and computer crime had been ratified by 46 states as of June 2015.
From page 28...
... As pointed out in Chapter 1, the potential of technology to protect bad actors remains a point of contention, as systems that offer extremely strong protection become increasingly available. Yet the use of unusually strong protections also could heighten the surveillance of the people who chose to use them.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.