The Monkey Cage: Cybersecurity


Posted at 10:25 AM ET, 03/12/2014

The political science of cybersecurity IV: How Edward Snowden helps U.S. deterrence

The likely reason is that Edward Snowden can talk more credibly than U.S. officials about the extent of U.S. cyber-power.

By Henry Farrell  |  10:25 AM ET, 03/12/2014 |  Permalink  |  Comments ( 0)
Tags:  Cybersecurity

Posted at 12:09 PM ET, 02/24/2014

Snowden-type leaks will force the U.S. to be more transparent

The Snowden leaks are forcing the US intelligence community to be more transparent. They may push foreign policy decision makers into being more transparent too.

By Henry Farrell  |  12:09 PM ET, 02/24/2014 |  Permalink  |  Comments ( 0)
Tags:  cybersecurity, Surveillance

Posted at 04:09 PM ET, 02/20/2014

The political science of cybersecurity III -- How international relations theory shapes U.S. cybersecurity doctrine

Basic political science ideas about offense, defense and deterrence shaped the politics of the Cold War. They also shape the politics of cybersecurity today.

By Henry Farrell  |  04:09 PM ET, 02/20/2014 |  Permalink  |  Comments ( 0)
Tags:  cybersecurity

Posted at 09:35 AM ET, 02/14/2014

Why a Bitcoin vulnerability has undermined the Silk Road

For a while, the Silk Road online drug market allowed criminals to trust each other. Now it appears to be crashing.

By Henry Farrell  |  09:35 AM ET, 02/14/2014 |  Permalink  |  Comments ( 0)
Tags:  cybersecurity, sociology

Posted at 11:44 AM ET, 02/12/2014

The political science of cybersecurity II: Why cryptography is so important

Battles over cryptography will help determine the future of the Internet

By Henry Farrell  |  11:44 AM ET, 02/12/2014 |  Permalink  |  Comments ( 0)
Tags:  cybersecurity, Surveillance

Posted at 10:03 AM ET, 01/23/2014

The political science of cybersecurity I -- why people fight so hard over cybersecurity

Different understandings of security drive much of the disagreement over cybersecurity and the NSA.

By Henry Farrell  |  10:03 AM ET, 01/23/2014 |  Permalink  |  Comments ( 0)
Tags:  cybersecurity

Posted at 11:05 AM ET, 01/14/2014

Cybersecurity and Cyberwar: A Q&A with Peter Singer

Peter Singer answers questions about cyber security and cyber warfare

By Erik Voeten  |  11:05 AM ET, 01/14/2014 |  Permalink  |  Comments ( 0)
Tags:  cybersecurity

Posted at 11:59 AM ET, 11/11/2013

Cyber-Pearl Harbor is a myth

Don’t expect to see any Pearl Harbor style cyber attacks, unless you’re watching a bad Bruce Willis movie.

By Henry Farrell  |  11:59 AM ET, 11/11/2013 |  Permalink  |  Comments ( 0)
Tags:  cybersecurity, international security