This article provides highlights of the Perry Center's 2022 cyber policy course, “Cybersecurity Policy in the Americas: Challenges for Policy-Strategic Analysis,” led by Dr. Boris Saavedra.
Read more
During the COVID-19 pandemic, life as we knew it changed dramatically as activities, both licit and illicit, moved to the virtual world. We witnessed shopping, college classes, diplomatic meetings, financial transactions, and organized crime activities transition online almost overnight. The pandemic has empowered transnational criminal organizations (TCOs) to establish new virtual markets for their drug, human, arms, and contraband trafficking and money laundering with cryptocurrencies.
Read more
To commemorate the 20th anniversary of United Nations Security Council Resolution 1325, the William J. Perry Center for Hemispheric Defense Studies and US Southern Command published an edited collection of essays, Twenty Years, Twenty Stories: Women, Peace, and Security in the Western Hemisphere, that reflect the inclusion of women across mission areas including cyber, peacekeeping, and humanitarian assistance and disaster relief. This book elevates the voices of talented women and men working in defense and security across the Western Hemisphere and highlights Perry Center alumni.
Read more
To commemorate the 20th anniversary of United Nations Security Council Resolution 1325, the William J. Perry Center for Hemispheric Defense Studies and US Southern Command published an edited collection of essays, Twenty Years, Twenty Stories: Women, Peace, and Security in the Western Hemisphere, that reflect the inclusion of women across mission areas including cyber, peacekeeping, and humanitarian assistance and disaster relief. This book elevates the voices of talented women and men working in defense and security across the Western Hemisphere and highlights Perry Center alumni.
Read more
This paper studies the impacts of the military securitization of cyberspace in the international politics of the 21st century. Cyberdefense is chosen as the object of study precisely because it allows inferences to be made about the political-institutional materialization of this issue, seeking support in the theory of securitization, proposed by the Copenhagen School. In this sense, this paper seeks to: (i) identify the main existential (cyber) threats to the military sector, revealing why this process is intensifying in the 21st century; (ii) project the conditions for such securitization; and (iii) explain its effects on international politics, based on the cases of the United States, Brazil and Canada. To this end, the Spectrum of Military Securitization of Cyberspace (ESMC) is designed, a framework of analysis based on the theory of securitization with a focus on cyberdefense in a given time and space. As for the literature review, Brazilian and foreign authors in Political Science and International Relations figure mostly in the body of this work. As for the methodology, it uses the qualitative-quantitative analysis style, despite the use of interviews, case studies, discourse and document analysis. Its conclusion aims to corroborate the hypothesis that, in addition to the securitization of cyberspace by the military sector, this process is reflected in current international politics. Consequently, it is possible to situate the three cases in this ESMC.
Read more
The National Defense Strategy (NDS) was the first defense strategy made public by the Brazilian government. Approved in 2008, the document marked a milestone in the sector, determining important changes in the stated objectives and the means - political and military - to be used to achieve them and the military means to be used to achieve them. However, the feasibility of its implementation has been widely questioned especially in academic circles. This is due both to inconsistencies in the strategy per se, and uncertainty regarding the government's capacity and/or ability and/or willingness to mobilize the resources required to adopt such the measures. This article discusses the main challenges the NDS faces. This article discusses the main points of the NDS and the main advances in its implementation between 2008 and 2011, as well as the obstacles to its implementation.
Read more