This article examines the theory and practice of two partially contrasting policy approaches to US national security and global stability: deterrence, which has long been regarded as virtually the “Holy Grail” of post-World War II US strategy, and arms control, which offers alternative goals, procedures, and structures.
In the realm of nuclear weapons, both approaches have been regularly employed: the United States has developed and deployed a diverse array of weapons, devoting time and treasure to assembling the tools of deterrence, but it has also simultaneously pursued successive generations of SALT, START, and other diplomatic initiatives to limit and reduce those inventories. In contrast, when it comes to outer space—where there is currently a widely-shared perception of starkly rising security threats from Russia, China, and elsewhere—it is deterrence, and deterrence alone, that has been marshaled. Arms control, even relatively modest, preliminary, and non-legally binding variants, has consistently been categorically ruled off the table, by Republican and Democratic leadership alike.
David A. Koplow posits that this exclusive American reliance upon deterrence for ameliorating the security problems of space is misguided. This is because deterrence in all its assorted forms and variations is systematically less applicable to the special circumstances of exoatmospheric competition, and arms control in outer space would be particularly valuable and successful in that milieu. Koplow therefore concludes that US national policy should be promptly re-aligned, to draw strategically upon both concepts for resisting the further degradation of the security and sustainability of critical space operations.
The US government has always been keen on its ability to protect sensitive and classified information from its enemies, yet the majority of resources have focused on military and national security information, which has left other categories of information exposed.
Capt. Christopher Dearing focuses the reader on the national security implications of personal information and the detrimental impact it possesses. This article provides an analysis of current privacy law and the information landscape, while highlighting areas where the US government has failed to keep pace to protect personal information, providing a valuable target for adversaries.
In an expansive call for action, Capt. Dearing recommends eight concrete steps that the government can take to better protect and manage personal information while developing stronger procedures to identify threats and respond to them.
How and why do states use cyber proxies to project power? Why do some states lean closer to these proxies than others, and what does this distance reveal about how a state views them? In this article, Syed Hamza Mannan answers these questions in a review of Tim Maurer’s book, Cyber Mercenaries: The State, Hackers, and Power.
Mannan explores the demand for cyber proxies, the mechanisms states use to control them, and the implications of cyber state-proxy relationships. Perhaps Maurer’s most prevalent contribution to the research, articulated in Mannan’s review, is in constructing a framework for characterizing different relationships states maintain with cyber proxies: those of delegation, orchestration, and sanctioning. By applying the framework to contemporary examples of cyber proxy proliferation, Mannan’s review illuminates Maurer’s important work.