This paper addresses some of the policy issues affecting cybersecurity in the Caribbean and how best to respond to those challenges. International organizations such as the International Telecommunications Union and the Organization of American States called for all states in the region to develop national cybersecurity strategies to protect their critical infrastructure, business interests, and private citizens. The Caribbean states have lagged in establishing national cybersecurity strategies. The challenge for Caribbean states and other developing nations remains how best to protect their security and economic interests in a connected environment. Which strategic paradigm fits the culture and the capabilities of such nations? This paper examines the threat and the various alternative frameworks to respond to the growing cyber threat including national security, economic, and public health approaches to cybersecurity.
Read more
This paper examines the Honduran Coup of 2009 as a case study of the application of the Organization of American States Inter-American Democratic Charter. The Charter, unanimously approved by the Organization in September 2001, consolidated and built upon earlier OAS efforts to support and defend democracy in the hemisphere. The study highlights the steps taken by the OAS and its member states and examines the difficulties multilateral organizations have in trying to effect democratic changes inside of a state. While the OAS took the severest actions permitted by the accord, the coup was not reversed. The sanctions remained in place nearly two years afterwards.
Read more
This paper examines the threat of cyber espionage to the national security of the United States. Cyber espionage in this paper focuses on the theft of information via the Internet, networks, or individual computers. It is just one facet of the larger cyber threat landscape to be considered by national security professionals. The threat exists to government and commercial interests. This paper uses the Risk Analysis Methodology of the Department of Homeland Security as discussed in the Congressional Research Service Report to Congress (Masse, O'Neill, & Rollins, 2007). This approach to risk considers the factors of threat, vulnerability, and consequences. The formulation is then considered in light of recent incidents such as GhostNet and Google. Finally, the paper proposes possible technical and policy options for leaders to implement to mitigate the risk to national security from cyber espionage.
Read more