Advanced search Help
Searching for terms: EXACT: "Harrington, Anne I." in: author
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Cyber Operations in DOD Policy and Plans: Issues for Congress [January 5, 2015]
"This report presents an overview of the threat landscape in cyberspace, including the types of offensive weapons available, the targets they are designed to attack, and the types of actors carrying out the attacks. It presents a picture of what kinds of offensive and defensive tools exist and a brief overview of recent attacks. The report then describes the current status of U.S. capabilities, and the national and international authorities under which the U.S. Department of Defense carries out cyber operations. Of particular interest for policy makers are questions raised by the tension between legal authorities codified at 10 U.S.C. [US Code], which authorizes U.S. Cyber Command to initiate computer network attacks, and those stated at 50 U.S.C., which enables the National Security Agency to manipulate and extrapolate intelligence data--a tension that Presidential Policy Directive 20 on U.S. Cyber Operations Policy manages by clarifying the Pentagon's rules of engagement for cyberspace. With the task of defending the nation from cyberattack, the lines of command, jurisdiction, and authorities may be blurred as they apply to offensive and defensive cyberspace operations. A closely related issue is whether U.S. Cyber Command should remain a sub-unified command under U.S. Strategic Command that shares assets and its commander with the NSA [National Security Agency]. Additionally, the unique nature of cyberspace raises new jurisdictional issues as U.S. Cyber Command organizes, trains, and equips its forces to protect the networks that undergird critical infrastructure. International law governing cyberspace operations is evolving, and may have gaps for determining the rules of cyberwarfare, what constitutes an 'armed attack' or 'use of force' in cyberspace, and what treaty obligations may be invoked."
Library of Congress. Congressional Research Service
Theohary, Catherine A.; Harrington, Anne I.
2015-01-05
-
Real-World Nuclear Decision Making: Using Behavioral Economics Insights to Adjust Nonproliferation and Deterrence Policies to Predictable Deviations from Rationality
"Even today, seventy years after the first atomic weapons test, the effort to find effective policies and strategies for dealing with nuclear weapons remains a daunting challenge. From early in the nuclear age, attention focused on deterrence as a strategy to prevent nuclear war. By the 1960s, key states were also seeking to limit the growth of nuclear arsenals and spread of nuclear arms through tools such as arms control and nonproliferation. More recently, global efforts have also encompassed nuclear security, or measures to keep bomb-making materials out of the hands of non-state actors such as terrorist groups. […] Given this background, the research for this project had three goals. First, it sought to update the earlier 'psychology and deterrence' literature. Since the mid-1980s, there have been significant developments in psychology, neuroscience, and related fields, many of which have informed the field of behavioral economics. This study aimed to take note of some of the key developments and explore how they might affect our understanding of deterrence and coercion. Second, this study sought to extend the reach of behavioral insights into the analysis of other policy tools, particularly as those tools are used to promote nuclear nonproliferation. Do the factors that affect deterrence outcomes also affect the operation of economic sanctions or the process of diplomatic negotiations? Third, at the same time that it sought to highlight the potential benefits of applying behavioral economics to strategic questions, this project also sought to assess the limits and potential pitfalls of this approach. Behavioral economics holds out the promise of being able to predict deviations from rational behavior." This document has been added to the Homeland Security Digital Library in agreement with the Project on Advanced Systems and Concepts for Countering WMD (PASCC) as part of the PASCC collection. Permission to download and/or retrieve this resource has been obtained through PASCC.
James Martin Center for Nonproliferation Studies
Knopf, Jeffrey W.; Harrington, Anne I.; Pomper, Miles A.
2016-01
1