by Catherine Lotrionte and Tim Maurer In a diverse cyberspace, building and maintaining trust amongst the public and private entities that operate within the domain becomes increasingly necessary. Without proper institutions to safeguard this understanding, a myriad of moving pieces will render the system increasingly volatile. (continue reading...) 
CONTENT Multilateral Approaches for Improving Global Security in Cyberspace by Bob Butler and Irving Lachow Nation-states must take the lead in promoting greater cyber security by being appropriately orga- nized, employing best technical capabilities, and partnering with the private sector.  (continue reading...) Use of Force & Cyber Operations by Catherine Lotrionte
The post-Charter digital era presents complex and unique challenges to the manner in which the traditional protocol of warfare interacts with international legal norms. The rubric of inter-state cyber policy needs to be augmented in order to account for hostile engagement in this new domain. (continue reading...)
Confidence-building measures can serve as international rules of law governing state actors’ use of “information weapons” and thereby produce the mutual understanding needed for a peaceful infor- mation domain. (continue reading...)
Despite taking the threat of cyber warfare seriously, the Chinese government has actually struggled to create a bureaucratic mechanism to handle emergencies. China’s reluctance to engage in inter- national cyber security cooperation stems more from its diplomatic discourse and national interests than from any desire to engage in cyber warfare. (continue reading...) The Implications of Mandates in International Cyber Affairs by Eneken Tikk-Ringas
Hazy notions of cyber security and the inconsistency of mandates of international organizations result in oftentimes trivial and non-actionable output from these organizations’ discussions of strategic cyber issues. Venue-shopping for friendly entities by nations compounds the problem of ineffective international cyber-security governance. Better defining the issues and expected remedies as well as a reasonable choice of venue would add consistency and credibility to international cyber deliberations. (continue reading...) A Balkanized Internet? The Uncertain Future of Global Internet Standards by Jonah Force Hill
The Internet as it exists today faces the threat of the potential collapse of the Internet standards- development process, as many nations feel the current process unfairly benefits Western and developed countries. Were the Internet standards development process to collapse, the Internet would likely “balkanize” with individual nations or groups of nations using different underlying technologies for the Internet. (continue reading...) Congressional Oversight of Hostilities in the Fifth Domain: Cyber Conflict and the War Powers Resolution by Jason Healey and A.J. Wilson
The War Powers Resolution should apply to cyber operations in the same way that it applies to physical conflicts because the waging of cyber warfare should not be left to the Executive alone. This article analyzes the critical provisions of the WPR, discusses its narrow interpretation by the current administration, and introduces the concept of ‘logical presence.’ (continue reading...) Leadership and Responsibility for Cybersecurity by Melissa Hathaway
Leaders in government and private industry must work proactively to study, adapt, and enact cyber security measures and integrate them into core infrastructures to meet the continuously evolving nature of cyber threats. When this fails to occur, leaders must be held accountable.  (continue reading...) Why Cybersecurity is Hard by Robert Ghanea-Hercock
Cyber security remains an unresolved problem because it is a complex adaptive system that is complicated by multiple technical, policy, and social dimensions. Unfortunately, the wider cyber security community has yet to recognize the real nature of the threat and persists in utiliz- ing rigid strategies. Ghanea-Hercock outlines a number of defenses that must be implemented to address this problem. (continue reading...) Perspective: Not all Vendors and Products are Created Equal by John N. Stewart
In an electronic world, digital security threats have myriad ways of infiltrating infrastructure systems and supply chains. Preventing this requires a renewed focus on verifiable, quantifiable trust at every step of the business process. (continue reading...) The Key Terrain of Cyber by John R. Mills
Traditional, Clausewitzean concepts of key terrain apply to the realm of cybersecurity. This critical cyber terrain must be controlled, or at least decisively influenced, to maintain relevancy and construct the future path of cyber. (continue reading...) Global Fight Against Cybercrime: Undoing the Paralysis by Zahid Jamil
The Budapest Convention on Cybercrime represents the only international instrument and the best hope for countries to establish common minimum standards of relevant offenses, prevent criminals operating from jurisdictions with lower standards, and enable speedy and twenty- four-seven international cooperation between law enforcement. However, the Convention faces determined and organized opposition from several corners, which have traditionally promoted a greater role in the regulation of the Internet for UN bodies.  (continue reading...) Achieving International Cyber Stability by Franklin D. Kramer
Stabilization of the cyber domain is key to the security interests of both the United States and the international community. Building up relevant institutions and norms to ensure a measure of order will rely upon a tri-pronged platform of resilience, cooperation, and transparency.  (continue reading...)

Free transcripts of all 4 expert panels featured at the Institute for Law, Science, and Global Security's "International Engagement in Cyberspace 2012" conference

Introductory Remarks Moderator: Catherine Lotrionte | Keynote Speakers: William J. Lynn III, Jane Holl Lute, Howard A. Schmidt Panel 1: National Security and Diplomatic Efforts Panel Chair: Christopher M. Painter | Panelists: Gerben Klein Baltink, Steven Schleien, Rear Admiral Samuel J. Cox, Dr. Anatoly Streltsov Panel 2: Law Enforcement Efforts Across National Borders Panel Chair: Shawn Henry | Panelists: Adrian Ciprian Miron, Zahid Jamil, Judge Stein Schjolberg, Noboru Nakatani Panel 3: Commercial Perspectives on Cyber Security Panel Chair: Eddie Schwartz | Panelists: Robert Dix, Dr. Robert Ghanea-Hercock, Rick Howard, Rear Admiral Jamie Barnett (Ret.), Scott Borg Panel 4: International Collaborative Responses to Cyber Incidences Panel Chair: Gen. Michael Hayden (Ret.) | Panelists: Andrea Rigoni, Dr. Gregory J. Rattray, Rt. Hon. Lord Reid of Cardowan, Peiran Wang, Gavin Reid, Jaan Priisalu