November 23, 2016
Posted by: Jessica Beyer
Russian backed cyberattacks on the Democratic National Committee, hacking Hillary Clinton’s campaign, on critical infrastructure and even on the roots of the Internet itself have captured the headlines in the
November 16, 2016
Posted by: Jessica Beyer
The electricity sector in India is starting to deploy smart grid technologies with the hope that they will play a central role in strengthening this sector so it can provide
October 3, 2016
Posted by: Jessica Beyer
Extremist use of information and communications technology (ICT) has proliferated, creating a unique security predicament for the companies who provide ICT products and services internationally. As the role of ICT
September 1, 2016
Posted by: Monique Thormann
In this Reuters commentary on “Who is hacking U.S. election databases and why are they so difficult to identify” UW Jackson School of International Studies and International Policy Institute Lecturer
August 8, 2016
Posted by: Jessica Beyer
Extremist use of information and communication technology (ICT) has resulted in tension between the government, industry actors, and ICT users. In their response to extremist use of ICT, industry actors have faced a serious dilemma over how to respond to bad actors in a way that promotes security but does not infringe upon users’ rights to privacy and freedom of speech.
June 28, 2016
Posted by: Jessica Beyer
North Korea has focused on an asymmetric military strategy because of its lack of conventional power and resources. However, its traditional asymmetric weapons and strength have been monitored by Western countries, therefore, heavily sanctioned. For North Korea, developing and exerting its cyber capabilities is the best way to avoid sanctions while achieving its strategic goals. Cyber tactics are effective because of the characteristics of cyberspace or cyber warfare–the low cost of entry, anonymity, and plausible deniability.
June 21, 2016
Posted by: Jessica Beyer
The closeness of China and Russia’s cybersecurity relationship is not dependent on their ties with each other, but is defined in relation to the US. Instead of augmenting the trust or preventing cyber-espionage between the two countries, Sino-Russian cybersecurity cooperation is a strategic move to challenge US dominance over the Internet.
June 20, 2016
Posted by: Monique Thormann
Eight Jackson School undergraduates spent the morning of June 7 in a different kind of classroom: presenting their research on “Extremist Use of Information and Communications Technology – Transcending the
January 12, 2016
Posted by: Jessica Beyer
Since the end of the Cold War, there has been an ideological confrontation in the Korean Peninsula between communist North Korea and democratic South Korea. As South Korea has embraced