Iran has several reasons to develop its cyber capabilities, but the broader overall motivation remains the same: Iran has accumulated enemies, which in turn has impelled it to develop techniques to keep them at bay.
Dec 16, 2015 The Cipher Brief
Late last month, Fiat Chrysler recalled 1.4 million cars to fix a defect that allowed hackers to imperil drivers from afar. In essence, what was considered a huge threat was converted into a solved or at least solvable problem.
Aug 4, 2015 The RAND Blog
The United States needs to consider both the risk of further attacks like the Sony breach and also further ill-considered reactions that may arise if the problem of insecurity in cyberspace is shoved into the counterterrorism paradigm.
Feb 9, 2015 Newsweek
When ISIS hackers hijacked the Twitter account of U.S. Central Command on Jan. 12, they falsely claimed that they had hacked into U.S. military computers. While the incident was embarrassing, it was not concerning in operational military terms. It was, however, damaging to the counterinsurgency against ISIS.
Feb 3, 2015 The Mark News
Although the risk of a debilitating cyberattack is real, the perception of that risk is far greater than it actually is, writes Martin Libicki. In fact, a major cyberattack of the kind intelligence officials fear has not taken place in the 21 years since the Internet became accessible to the public.
Aug 16, 2013 Foreign Affairs
Perhaps making war can persuade the attacker to stop. Yet, war also risks further disruption, great cost, as well as possible destruction and death—especially if matters escalate beyond cyberspace, writes Martin Libicki.
Mar 4, 2013 NYTimes.com
The United States can manage a cybercrisis by taking steps to reduce the incentives for other states to step into crisis, by controlling the narrative, understanding the stability parameters of the crises, and trying to manage escalation if conflicts arise.
Jan 9, 2013
Understanding when the United States should engage in cyberwar and who should approve cyberattacks requires understanding that cyberwar has multiple personalities: operational, strategic, and that great gray area in-between., writes Martin Libicki.
Jan 9, 2013 Federation of American Scientists
The U.S. military, with its high-tech systems, must protect itself from cyber threats with much the same careful management that protects it against vulnerabilities associated with, say, explosives. But there can be no choice between boots on the ground and fingers on a keyboard, writes Martin Libicki.
Dec 19, 2012 The International Economy
Restricting cyberweapon development could be harmful inasmuch as its core activity is the discovery of vulnerabilities in software--the very activity also required to bulletproof software against attacks from criminal hackers, writes Martin Libicki.
Jun 11, 2012 U.S. News & World Report, Debate Club
We cannot wish away serious ecological issues, such as the steady increase in greenhouse gases or the steady decrease in critical resources (e.g., phosphates). But population growth per se need not portend ecological catastrophe, writes Martin Libicki.
Nov 4, 2011 CNN
Military might against Al Qaeda and other terrorist groups isn't working – and no wonder. After studying the record of 648 terrorist groups between 1968 and 2006, we've found that military force has rarely been effective in defeating this enemy, write Seth Jones and Martin C. Libicki.
Aug 6, 2008 Christian Science Monitor