Jeffrey Cooper | Leidos Inc (original) (raw)
Address: McLean, Virginia, United States
less
Uploads
Papers by Jeffrey Cooper
Information has always been a key element of national power and influence. However, now enabled b... more Information has always been a key element of national power and influence. However, now enabled by modern digital technologies, worldwide communications and information networks have fundamentally reshaped patterns of international trade, finance, and global intercourse, affecting not only economic but also political and social relationships as well. Under these circumstances, few countries, even those with authoritarian systems, can or choose to retain the closed autarchic economies as they did in the past because of economic and financial interdependencies. Moreover, new actors, many of them entities other than states, now play important roles in the international system and interact in novel ways. As a consequence, these forces have helped to refashion international relations after the collapse of the bipolar structure and in the wake of the Cold War. Because they possess particular strengths and weaknesses, we now clearly recognize that modern digital information systems (what are commonly called "cyber systems") are powerful tools and weapons on the one hand as well as sources of great potential vulnerability on the other, affecting not only our economic and social patterns, but also our national security. Digital information-and the cyber infrastructure that processes and carries it-has its own special characteristics; and these qualities are sufficiently different than those of analogue information that many consider "cyber" to be a distinct medium or domain. Considering both the benefits and vulnerabilities of our cyber dependency, together these factors have created a powerful interest in better securing our information and the cyber infrastructures through which it is processed and transmitted. As part of an overall strategy to protect our information resources and cyber capabilities, applying the lessons and tools of deterrence to the cyber domain merits attention as one important component of a comprehensive security strategy.
Science, Computers, and the Information Onslaught, 1984
Comparative Strategy, 1984
Information has always been a key element of national power and influence. However, now enabled b... more Information has always been a key element of national power and influence. However, now enabled by modern digital technologies, worldwide communications and information networks have fundamentally reshaped patterns of international trade, finance, and global intercourse, affecting not only economic but also political and social relationships as well. Under these circumstances, few countries, even those with authoritarian systems, can or choose to retain the closed autarchic economies as they did in the past because of economic and financial interdependencies. Moreover, new actors, many of them entities other than states, now play important roles in the international system and interact in novel ways. As a consequence, these forces have helped to refashion international relations after the collapse of the bipolar structure and in the wake of the Cold War. Because they possess particular strengths and weaknesses, we now clearly recognize that modern digital information systems (what are commonly called "cyber systems") are powerful tools and weapons on the one hand as well as sources of great potential vulnerability on the other, affecting not only our economic and social patterns, but also our national security. Digital information-and the cyber infrastructure that processes and carries it-has its own special characteristics; and these qualities are sufficiently different than those of analogue information that many consider "cyber" to be a distinct medium or domain. Considering both the benefits and vulnerabilities of our cyber dependency, together these factors have created a powerful interest in better securing our information and the cyber infrastructures through which it is processed and transmitted. As part of an overall strategy to protect our information resources and cyber capabilities, applying the lessons and tools of deterrence to the cyber domain merits attention as one important component of a comprehensive security strategy.
Science, Computers, and the Information Onslaught, 1984
Comparative Strategy, 1984