Weaponizing Digital Trade

Weaponizing Digital Trade

Author: Robert K. Knake

Publisher: Council on Foreign Relations Press

Published: 2020-09-30

Total Pages: 34

ISBN-13: 9780876093931

DOWNLOAD EBOOK

"More and more countries are being drawn into the Chinese model of state-controlled networks that limit privacy, build in the capacity for censorship, and provide the backbone for the surveillance state," Knake explains. By forming a digital trade zone among democracies, "the United States and its allies can create a compelling alternative to the authoritarian web," he writes. The author makes a number of recommendations for the U.S. government to create a digital trade zone, including: Establish a treaty organization to coordinate cybersecurity and law enforcement efforts. "Working with Canada and Mexico, the United States could establish such an organization under the auspices of USMCA [United States-Mexico-Canada Agreement], work out its functions, and then seek to draw in other countries to participate." Create a shared tariff and sanctions policy. "Trade zone members should agree to jointly sanction nonmember states that harbor cybercriminals or participate in banned activities." Create sustained funding for collective efforts. "The agreement should require each member state to contribute annual payments to the treaty organization." Involve nongovernmental stakeholders. "For the digital trade zone to achieve its goals, individual and corporate user groups, internet service providers, content service providers, software and hardware makers, and cybersecurity companies will all need to be involved." Clean up the open web. "A crucial part of this effort should be a sustained, coordinated effort to dismantle the infrastructure used by cybercriminals." Table the hardest issues. "Certain complicated issues in internet governance are unlikely to be resolved by trade negotiators and should be tabled to prevent stalling the formation of the trade zone." "The United States has a short window to draw Europe in and create a competing vision that would attract fence-sitters such as Brazil, India, and Indonesia, which have democratic traditions and are wary of Chinese hegemony on the web," warns Knake. "By tying access to the digital trade zone to obligations for cybersecurity, privacy, and law enforcement cooperation . . . the United States and its allies can force countries to choose between access to their markets or tight control of the internet in the Chinese model." "Securing an open, interoperable, secure, and reliable internet against threats from authoritarian regimes will likely require abandoning hope that such a network can be global," concludes Knake.


The Uses and Abuses of Weaponized Interdependence

The Uses and Abuses of Weaponized Interdependence

Author: Daniel W. Drezner

Publisher: Brookings Institution Press

Published: 2021-03-02

Total Pages: 353

ISBN-13: 0815738382

DOWNLOAD EBOOK

" How globalized information networks can be used for strategic advantage Until recently, globalization was viewed, on balance, as an inherently good thing that would benefit people and societies nearly everywhere.Now there is growing concern that some countries will use their position in globalized networks to gain undue influence over other societies through their dominance of information and financial networks, a concept known as “weaponized interdependence.” In exploring the conditions under which China, Russia, and the United States might be expected to weaponize control of information and manipulate the global economy, the contributors to this volume challenge scholars and practitioners to think differently about foreign economic policy, national security, and statecraft for the twenty-first century. The book addresses such questions as: What areas of the global economy are most vulnerable to unilateral control of informationand financial networks? How sustainable is the use of weaponized interdependence? What are the possible responses from targeted actors? And how sustainable is the open global economy if weaponized interdependence becomes a default tool for managing international relations? "


The Weaponization of Trade

The Weaponization of Trade

Author: Rebecca Harding

Publisher: London Publishing Partnership

Published: 2017-10-25

Total Pages: 175

ISBN-13: 1907994734

DOWNLOAD EBOOK

Trade is being weaponized – and this is not good. As politicians on both sides of the Atlantic raise the stakes, trade is increasingly a tool of coercion to achieve strategic influence. This book looks at the risks for us all as trade becomes an instrument of foreign policy, and it shows how politicians could turn things around.


Likewar

Likewar

Author: Peter Warren Singer

Publisher: Eamon Dolan Books

Published: 2018

Total Pages: 421

ISBN-13: 1328695743

DOWNLOAD EBOOK

Social media has been weaponized, as state hackers and rogue terrorists have seized upon Twitter and Facebook to create chaos and destruction. This urgent report is required reading, from defense experts P.W. Singer and Emerson T. Brooking.


Threatcasting

Threatcasting

Author: Brian David Johnson

Publisher: Springer Nature

Published: 2022-06-01

Total Pages: 285

ISBN-13: 303102575X

DOWNLOAD EBOOK

Impending technological advances will widen an adversary’s attack plane over the next decade. Visualizing what the future will hold, and what new threat vectors could emerge, is a task that traditional planning mechanisms struggle to accomplish given the wide range of potential issues. Understanding and preparing for the future operating environment is the basis of an analytical method known as Threatcasting. It is a method that gives researchers a structured way to envision and plan for risks ten years in the future. Threatcasting uses input from social science, technical research, cultural history, economics, trends, expert interviews, and even a little science fiction to recognize future threats and design potential futures. During this human-centric process, participants brainstorm what actions can be taken to identify, track, disrupt, mitigate, and recover from the possible threats. Specifically, groups explore how to transform the future they desire into reality while avoiding an undesired future. The Threatcasting method also exposes what events could happen that indicate the progression toward an increasingly possible threat landscape. This book begins with an overview of the Threatcasting method with examples and case studies to enhance the academic foundation. Along with end-of-chapter exercises to enhance the reader’s understanding of the concepts, there is also a full project where the reader can conduct a mock Threatcasting on the topic of “the next biological public health crisis.” The second half of the book is designed as a practitioner’s handbook. It has three separate chapters (based on the general size of the Threatcasting group) that walk the reader through how to apply the knowledge from Part I to conduct an actual Threatcasting activity. This book will be useful for a wide audience (from student to practitioner) and will hopefully promote new dialogues across communities and novel developments in the area.


Tools and Weapons

Tools and Weapons

Author: Brad Smith

Publisher: Penguin

Published: 2019-09-10

Total Pages: 370

ISBN-13: 1984877712

DOWNLOAD EBOOK

The instant New York Times bestseller. From Microsoft's president and one of the tech industry's broadest thinkers, a frank and thoughtful reckoning with how to balance enormous promise and existential risk as the digitization of everything accelerates. “A colorful and insightful insiders’ view of how technology is both empowering and threatening us. From privacy to cyberattacks, this timely book is a useful guide for how to navigate the digital future.” —Walter Isaacson Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world, you bear a responsibility to help address the world you have helped create. This might seem uncontroversial, but it flies in the face of a tech sector long obsessed with rapid growth and sometimes on disruption as an end in itself. While sweeping digital transformation holds great promise, we have reached an inflection point. The world has turned information technology into both a powerful tool and a formidable weapon, and new approaches are needed to manage an era defined by even more powerful inventions like artificial intelligence. Companies that create technology must accept greater responsibility for the future, and governments will need to regulate technology by moving faster and catching up with the pace of innovation. In Tools and Weapons, Brad Smith and Carol Ann Browne bring us a captivating narrative from the cockpit of one of the world's largest and most powerful tech companies as it finds itself in the middle of some of the thorniest emerging issues of our time. These are challenges that come with no preexisting playbook, including privacy, cybercrime and cyberwar, social media, the moral conundrums of artificial intelligence, big tech's relationship to inequality, and the challenges for democracy, far and near. While in no way a self-glorifying "Microsoft memoir," the book pulls back the curtain remarkably wide onto some of the company's most crucial recent decision points as it strives to protect the hopes technology offers against the very real threats it also presents. There are huge ramifications for communities and countries, and Brad Smith provides a thoughtful and urgent contribution to that effort.


Research Handbook on Digital Trade

Research Handbook on Digital Trade

Author: David Collins

Publisher: Edward Elgar Publishing

Published: 2023-10-06

Total Pages: 509

ISBN-13: 1800884958

DOWNLOAD EBOOK

This comprehensive Research Handbook analyzes the impact of the rapid growth of digital trade on businesses, consumers, and regulators. Leading experts provide theoretical and practical insight into how to manage the legal and policy challenges of the global digital economy.


The Silk Road: A Very Short Introduction

The Silk Road: A Very Short Introduction

Author: James A. Millward

Publisher: Oxford University Press

Published: 2013-04-26

Total Pages: 169

ISBN-13: 0199782865

DOWNLOAD EBOOK

The Silk Road: A Very Short Introduction is a new look at an ancient subject: the silk road that linked China, India, Persia and the Mediterranean across the expanses of Central Asia. James A. Millward highlights unusual but important biological, technological and cultural exchanges over the silk roads that stimulated development across Eurasia and underpin civilization in our modern, globalized world.


China’s Digital Economy: Opportunities and Risks

China’s Digital Economy: Opportunities and Risks

Author: Ms.Longmei Zhang

Publisher: International Monetary Fund

Published: 2019-01-17

Total Pages: 24

ISBN-13: 1484389700

DOWNLOAD EBOOK

China’s digital economy has expanded rapidly in recent years. While average digitalization of the economy remains lower than in advanced economies, digitalization is already high in certain regions and sectors, in particular e-commerce and fintech, and costal regions. Such transformation has boosted productivity growth, with varying impact on employment across sectors. Going forward, digitalization will continue to reshape the Chinese economy by improving efficiency, softening though not reversing, the downward trend of potential growth as the economy matures. The government should play a vital role in maximizing the benefits of digitalization while minimizing related risks, such as potential labor disruption, privacy infringement, emerging oligopolies, and financial risks.


Cyberspace and National Security

Cyberspace and National Security

Author: Derek S. Reveron

Publisher: Georgetown University Press

Published: 2012-09-11

Total Pages: 258

ISBN-13: 1589019199

DOWNLOAD EBOOK

In a very short time, individuals and companies have harnessed cyberspace to create new industries, a vibrant social space, and a new economic sphere that are intertwined with our everyday lives. At the same time, individuals, subnational groups, and governments are using cyberspace to advance interests through malicious activity. Terrorists recruit, train, and target through the Internet, hackers steal data, and intelligence services conduct espionage. Still, the vast majority of cyberspace is civilian space used by individuals, businesses, and governments for legitimate purposes. Cyberspace and National Security brings together scholars, policy analysts, and information technology executives to examine current and future threats to cyberspace. They discuss various approaches to advance and defend national interests, contrast the US approach with European, Russian, and Chinese approaches, and offer new ways and means to defend interests in cyberspace and develop offensive capabilities to compete there. Policymakers and strategists will find this book to be an invaluable resource in their efforts to ensure national security and answer concerns about future cyberwarfare.