How and why do states use cyber proxies to project power? Why do some states lean closer to these proxies than others, and what does this distance reveal about how a state views them? In this article, Syed Hamza Mannan answers these questions in a review of Tim Maurer’s book, Cyber Mercenaries: The State, Hackers, and Power.
Mannan explores the demand for cyber proxies, the mechanisms states use to control them, and the implications of cyber state-proxy relationships. Perhaps Maurer’s most prevalent contribution to the research, articulated in Mannan’s review, is in constructing a framework for characterizing different relationships states maintain with cyber proxies: those of delegation, orchestration, and sanctioning. By applying the framework to contemporary examples of cyber proxy proliferation, Mannan’s review illuminates Maurer’s important work.
While an important part of US innovation and culture, bankruptcy proceedings have nonetheless become a unique avenue through which foreign adversaries are able to acquire sensitive US national security technologies and intellectual property. Through a detailed analysis of the current gaps in federal regulations governing foreign investment and bankruptcy proceedings in the US, Camille Stewart provides the reader an in-depth look into exactly how foreign companies have been able to circumvent these US foreign investment regulations.
In raising awareness to an issue that could ultimately leave the United States vulnerable to destructive cyberattacks, Stewart argues that training and equipping bankruptcy judges to identify potential national security concerns in bankruptcy cases will help mitigate the exfiltration of national security-related information and technology.
Full Court Press: Preventing Foreign Adversaries from Exfiltrating National Security Technologies Through Bankruptcy Proceedings
The risk of Weapons of Mass Destruction materials falling into the hands of criminals continues to be a major security concern following 9/11. Efforts to curb the threat culminated in 2004 with U.N. Security Council Resolution 1540. Resolution 1540 created an international institution—the 1540 regime—that was intended to prevent WMD proliferation by closing legal gaps in every U.N. member state. In addition to prohibiting states from engaging in proliferation activities, the instrument obliges states to address WMD trafficking at home through both criminal law enforcement and regulatory oversight.
Since its creation, scholars and policy makers have come to view 1540 as an important foundation of the global nonproliferation and counter-terrorism regime, in part because 179 states have submitted domestic implementation country reports, and on average, countries report more than 145 new or existing domestic measures to comply with Resolution 1540 obligations. Yet, despite the alleged success of the 1540 regime, there are still gaps in the system. Drawing on fifty-two in-depth interviews, fieldwork, and observation data, Sarah Shirazyan’s article presents a novel assessment of the 1540 regime’s development and performance.
Sarah Shirazyan’s article on “Building a Universal Counter-Proliferation Regime” proceeds in four steps. First, it provides an assessment of 1540’s origins and its past performance, based on the 1540 Committee’s own metrics of success. Second, it demonstrates the regime’s weak performance, examining its effectiveness and accomplishments thus far. Third, it explains how the creation of the 1540 regime and its early institutional choices shaped its current structure and performance. In particular, how 1540’s legitimacy-building strategies have constrained the institution’s ability to effectively manage the implementation of the resolution. Finally, the article briefly explore options on how to strengthen 1540 regime to halt non-state actor proliferation.