Belfer Center Home > Experts > Michael Sechrist

« Back to Michael Sechrist

Michael Sechrist

Michael Sechrist

Former Associate, Explorations in Cyber International Relations (ECIR), Jan.-Jun. 2012; Former Project Manager, ECIR , Oct.-Dec. 2011; Former Research Fellow, ECIR, Jul. 2010-Sep. 2011, Former Associate, Explorations in Cyber International Relations (ECIR), Jan–Jun 2012; Former Project Manager, ECIR, Oct–Dec 2011; Former Research Fellow, ECIR, Jul 2010–Sept 2011

 

 

By Topic

 

February 2012

"New Threats, Old Technology: Vulnerabilities in Undersea Communication Cable Network Management Systems"

Discussion Paper

By Michael Sechrist, Former Associate, Explorations in Cyber International Relations (ECIR), Jan.-Jun. 2012; Former Project Manager, ECIR , Oct.-Dec. 2011; Former Research Fellow, ECIR, Jul. 2010-Sep. 2011, Former Associate, Explorations in Cyber International Relations (ECIR), Jan–Jun 2012; Former Project Manager, ECIR, Oct–Dec 2011; Former Research Fellow, ECIR, Jul 2010–Sept 2011

This paper explores the vulnerabilities to cyber attacks of infrastructure that today carries nearly all the world's data and voice traffic: undersea communications cables. Long-standing physical vulnerabilities in cable infrastructure have been compounded by new risk found in the network management systems that monitor and control cable operations. Unlike an attack on a water treatment plant's control systems, however, an attack on the cables' control systems could devastate the world's economies — presenting a different kind of Internet "kill switch" altogether — shutting down world commerce, and doing it all with the click of a mouse.

 

 

September 2010

"Protecting Cyberspace and the US National Interest"

Discussion Paper

By Aki J. Peritz and Michael Sechrist, Former Associate, Explorations in Cyber International Relations (ECIR), Jan.-Jun. 2012; Former Project Manager, ECIR , Oct.-Dec. 2011; Former Research Fellow, ECIR, Jul. 2010-Sep. 2011, Former Associate, Explorations in Cyber International Relations (ECIR), Jan–Jun 2012; Former Project Manager, ECIR, Oct–Dec 2011; Former Research Fellow, ECIR, Jul 2010–Sept 2011

Recognizing cyberspace's role as a medium for security, communication and commerce, the authors detail five ways that the US can better protect cyberspace.

 

February 2012

"New Threats, Old Technology: Vulnerabilities in Undersea Communication Cable Network Management Systems"

Discussion Paper

By Michael Sechrist, Former Associate, Explorations in Cyber International Relations (ECIR), Jan.-Jun. 2012; Former Project Manager, ECIR , Oct.-Dec. 2011; Former Research Fellow, ECIR, Jul. 2010-Sep. 2011, Former Associate, Explorations in Cyber International Relations (ECIR), Jan–Jun 2012; Former Project Manager, ECIR, Oct–Dec 2011; Former Research Fellow, ECIR, Jul 2010–Sept 2011

This paper explores the vulnerabilities to cyber attacks of infrastructure that today carries nearly all the world's data and voice traffic: undersea communications cables. Long-standing physical vulnerabilities in cable infrastructure have been compounded by new risk found in the network management systems that monitor and control cable operations. Unlike an attack on a water treatment plant's control systems, however, an attack on the cables' control systems could devastate the world's economies — presenting a different kind of Internet "kill switch" altogether — shutting down world commerce, and doing it all with the click of a mouse.

 

February 2012

"New Threats, Old Technology: Vulnerabilities in Undersea Communication Cable Network Management Systems"

Discussion Paper

By Michael Sechrist, Former Associate, Explorations in Cyber International Relations (ECIR), Jan.-Jun. 2012; Former Project Manager, ECIR , Oct.-Dec. 2011; Former Research Fellow, ECIR, Jul. 2010-Sep. 2011, Former Associate, Explorations in Cyber International Relations (ECIR), Jan–Jun 2012; Former Project Manager, ECIR, Oct–Dec 2011; Former Research Fellow, ECIR, Jul 2010–Sept 2011

This paper explores the vulnerabilities to cyber attacks of infrastructure that today carries nearly all the world's data and voice traffic: undersea communications cables. Long-standing physical vulnerabilities in cable infrastructure have been compounded by new risk found in the network management systems that monitor and control cable operations. Unlike an attack on a water treatment plant's control systems, however, an attack on the cables' control systems could devastate the world's economies — presenting a different kind of Internet "kill switch" altogether — shutting down world commerce, and doing it all with the click of a mouse.

 

 

September 2010

"Protecting Cyberspace and the US National Interest"

Discussion Paper

By Aki J. Peritz and Michael Sechrist, Former Associate, Explorations in Cyber International Relations (ECIR), Jan.-Jun. 2012; Former Project Manager, ECIR , Oct.-Dec. 2011; Former Research Fellow, ECIR, Jul. 2010-Sep. 2011, Former Associate, Explorations in Cyber International Relations (ECIR), Jan–Jun 2012; Former Project Manager, ECIR, Oct–Dec 2011; Former Research Fellow, ECIR, Jul 2010–Sept 2011

Recognizing cyberspace's role as a medium for security, communication and commerce, the authors detail five ways that the US can better protect cyberspace.

 

February 2012

"New Threats, Old Technology: Vulnerabilities in Undersea Communication Cable Network Management Systems"

Discussion Paper

By Michael Sechrist, Former Associate, Explorations in Cyber International Relations (ECIR), Jan.-Jun. 2012; Former Project Manager, ECIR , Oct.-Dec. 2011; Former Research Fellow, ECIR, Jul. 2010-Sep. 2011, Former Associate, Explorations in Cyber International Relations (ECIR), Jan–Jun 2012; Former Project Manager, ECIR, Oct–Dec 2011; Former Research Fellow, ECIR, Jul 2010–Sept 2011

This paper explores the vulnerabilities to cyber attacks of infrastructure that today carries nearly all the world's data and voice traffic: undersea communications cables. Long-standing physical vulnerabilities in cable infrastructure have been compounded by new risk found in the network management systems that monitor and control cable operations. Unlike an attack on a water treatment plant's control systems, however, an attack on the cables' control systems could devastate the world's economies — presenting a different kind of Internet "kill switch" altogether — shutting down world commerce, and doing it all with the click of a mouse.

 

 

Spring 2011

"MICHAEL SECHRIST Researches Vulnerabilities of Information Networks"

Newsletter Article, Belfer Center Newsletter

By Joseph Leahy and Michael Sechrist, Former Associate, Explorations in Cyber International Relations (ECIR), Jan.-Jun. 2012; Former Project Manager, ECIR , Oct.-Dec. 2011; Former Research Fellow, ECIR, Jul. 2010-Sep. 2011, Former Associate, Explorations in Cyber International Relations (ECIR), Jan–Jun 2012; Former Project Manager, ECIR, Oct–Dec 2011; Former Research Fellow, ECIR, Jul 2010–Sept 2011

Michael Sechrist, joint Information and Communications Technology/Science, Technology, and Public Policy fellow at the Belfer Center, says Egypt’s wireless and Internet blackout early this month raises serious questions concerning the new measures at the disposal of authoritarian regimes in suppressing political dissent.

 

 

September 2010

"Protecting Cyberspace and the US National Interest"

Discussion Paper

By Aki J. Peritz and Michael Sechrist, Former Associate, Explorations in Cyber International Relations (ECIR), Jan.-Jun. 2012; Former Project Manager, ECIR , Oct.-Dec. 2011; Former Research Fellow, ECIR, Jul. 2010-Sep. 2011, Former Associate, Explorations in Cyber International Relations (ECIR), Jan–Jun 2012; Former Project Manager, ECIR, Oct–Dec 2011; Former Research Fellow, ECIR, Jul 2010–Sept 2011

Recognizing cyberspace's role as a medium for security, communication and commerce, the authors detail five ways that the US can better protect cyberspace.

 

February 2012

"New Threats, Old Technology: Vulnerabilities in Undersea Communication Cable Network Management Systems"

Discussion Paper

By Michael Sechrist, Former Associate, Explorations in Cyber International Relations (ECIR), Jan.-Jun. 2012; Former Project Manager, ECIR , Oct.-Dec. 2011; Former Research Fellow, ECIR, Jul. 2010-Sep. 2011, Former Associate, Explorations in Cyber International Relations (ECIR), Jan–Jun 2012; Former Project Manager, ECIR, Oct–Dec 2011; Former Research Fellow, ECIR, Jul 2010–Sept 2011

This paper explores the vulnerabilities to cyber attacks of infrastructure that today carries nearly all the world's data and voice traffic: undersea communications cables. Long-standing physical vulnerabilities in cable infrastructure have been compounded by new risk found in the network management systems that monitor and control cable operations. Unlike an attack on a water treatment plant's control systems, however, an attack on the cables' control systems could devastate the world's economies — presenting a different kind of Internet "kill switch" altogether — shutting down world commerce, and doing it all with the click of a mouse.

 

SUBSCRIBE

Receive email updates on the most pressing topics in science and int'l affairs.

Events Calendar

We host a busy schedule of events throughout the fall, winter and spring. Past guests include: UN Secretary-General Ban Ki-moon, former Vice President Al Gore, and former Russian President Mikhail Gorbachev.