Ronald Deibert: Tracking the emerging arms race in cyberspace

@article{Deibert2011RonaldDT,
  title={Ronald Deibert: Tracking the emerging arms race in cyberspace},
  author={Ronald J. Deibert},
  journal={Bulletin of the Atomic Scientists},
  year={2011},
  volume={67},
  pages={1 - 8}
}
The director of the University of Toronto’s Citizen Lab—an interdisciplinary R&D group that works on issues related to digital media, global security, and human rights—describes the new militarization of cyberspace. Deibert’s recent work reveals evidence of sophisticated cyber-espionage aimed at corporations, governments, and human rights groups. In this interview, he explains the implications of these developments on international relations, describes how surging cybersecurity budgets are… Expand
Is Cyberpeace Possible
TLDR
Christen and Bangerter question the attempts of defining cyberwar in terms of certain types of attacks and suggest focusing on the transgressive nature of both digitalization and war, namely that they tend to infect all spheres of human life. Expand
Cyberweapons: power and the governance of the invisible
This article explores the non-emergence of a global governance regime for cyberweapons. Cyberweapons are malicious software entities deployed to cause harm to adversaries’ computer networks andExpand
Cybersecurity in central eastern Europe: from identifying risks to countering threats
Abstract Today, ensuring security in cyberspace is a top priority of national security policy for most states. States’ approaches to cybersecurity can be divided into two categories: those thatExpand
Is NATO Ready for a Cyberwar
Abstract : This thesis analyzes the sufficiency and effectiveness of the North Atlantic Treaty Organizations (NATO) cyber policies against cyber threats, considering the recent cyber cases andExpand
Cyber insecurity as a national threat: overreaction from Germany, France and the UK?
Abstract The US billion dollars investments in cyber security are creating a securitisation of cyberspace. What has happened meanwhile in Europe? The argument is threefold. First, cyber threats wereExpand
Contested Cyberspace and Rising Powers
Abstract The USA developed and has therefore historically played a lead role in cyberspace. Yet rising powers, including brics , have been increasingly challenging the established regime. China andExpand
Transnational governance of cybersecurity: policy challenges and global inequalities in cyber capacity building
Abstract Connectivity infrastructure is constantly expanding, increasing internet access across countries, regions and socio-political contexts. Given the fast-changing geography of the internet,Expand
Chapter 8 Cybersecurity of Critical Infrastructure
This chapter provides a political and philosophical analysis of the values at stake in ensuring cybersecurity for critical infrastructures. It presents a review of the boundaries of cybersecurity inExpand
Offense-defense Theory Analysis of Russian Cyber Capability
Abstract : The Russian Federation is a key state actor in cyberspace; cyber events associated with Russian state and non - state actors have threatened Russia's neighbors , shaped international cyberExpand
Norms, Epistemic Communities and the Global Cyber Security Assemblage
Even as norms begin to pervade national and international discourse on cybersecurity, they remain poorly understood. States and multilateral institutions are seeking to mitigate the problems derivingExpand
...
1
2
...

References

SHOWING 1-7 OF 7 REFERENCES
Risking Security: Policies and Paradoxes of Cyberspace Security
Conceptualizations of cyberspace security can be divided into two related dimensions, articulated as “risks”: risks to the physical realm of computer and communication technologies (risks toExpand
Liberation vs. Control: The Future of Cyberspace
Among theorists of new information and communication technologies, there is a persistent tension between those who see them as technologies of liberation, and those who see them as technologies ofExpand
Access Controlled - The Shaping of Power, Rights, and Rule in Cyberspace
TLDR
Access Controlled offers six substantial chapters that analyze Internet control in both Western and Eastern Europe and a section of shorter regional reports and country profiles drawn from material gathered by the ONI around the world through a combination of technical interrogation and field research methods. Expand
Access Controlled: The Shaping
  • 2010
Risking security: The policies and paradoxes of cyberspace
  • security. International Political Sociology
  • 2010
Arms control in cyberspace
  • 2009