Knowledge

James Andrew Lewis

Source 📝

31: 83:
His diplomatic experience included negotiations on military basing in Asia, the Cambodia peace process, and the Five-power talks on arms transfer restraint. Lewis led the U.S. delegation to the Wassenaar Arrangement Experts Group for advanced civil and military technologies. He was also assigned to
100:
and the U.S. Central American Task Force. At Commerce, he was responsible for policy and regulation affecting, satellites, high-performance computers, and encryption. He was the department lead for the Select Committee on U.S. National Security and Military/Commercial Concerns with the People's
198:
Building an Information Technology Industry in China, National Strategy, Global Markets: A Report of the Technology and Public Policy Program Center for Strategic and International Studies
372: 119: 50: 72:, where he worked on regional security, military intervention and insurgency, conventional arms negotiations, technology transfer (including global arms sales), 318: 348: 333: 97: 441: 249: 226: 206: 186: 166: 146: 101:
Republic of China. Lewis served as Rapporteur for the 2010, 2013, and 2015 UN Group of Government Experts on Information Security.
85: 89: 299: 388: 107: 280: 315: 114:, on cybersecurity, innovation, military space, and identity management. He was the Project Director for CSIS's 69: 36: 436: 352: 123: 115: 431: 65: 158:
Globalization and National Security: Maintaining U.S. Technological Leadership and Economic Strength
49:
is a Senior Vice President and the Director of the Technology and Public Policy Program at the
245: 222: 202: 182: 162: 142: 237: 54: 322: 303: 284: 111: 122:(CICIR) He has testified numerous times before Congress. Lewis earned a Ph.D. from the 77: 218:
Intellectual Property Protection: Promoting Innovation in a Global Information Economy
425: 295:
Declaration of James A. Lewis, U.S. District Court for the District of Columbia,
216: 196: 176: 156: 136: 73: 316:
https://www.pbs.org/wgbh/pages/frontline/shows/cyberwar/interviews/lewis.html
296: 384: 104:
Lewis has authored more than two hundred publications since coming to CSIS,
30: 242:
Old Tools, New Century: Deterrence, Containment and Collective Cyberdefense
412: 138:
Cyber Security: Turning National Solutions Into International Cooperation
105: 93: 277: 416: 118:
and led a long-running Track 1.5 Dialogue on cybersecurity with the
236:
Jeffrey W. Knopf; Steven Metz; James Andrew Lewis (11 June 2013).
178:
Waiting for Sputnik: Basic Research and Strategic Competition
80:, high-tech trade with China, sanctions and Internet policy. 373:
China Institutes of Contemporary International Relations
120:
China Institute of Contemporary International Relations
116:
Commission on Cybersecurity for the 44th Presidency
21: 51:Center for Strategic and International Studies 8: 64:Before joining CSIS, he was a member of the 297:http://www.toad.com/dnssec/lewis-decl.html 29: 18: 244:. World Politics Review. pp. 23–29. 272:"Multilateral Arms Transfer Restraint, 265: 337:, The Cox Report on Chinese Espionage 278:http://www.armscontrol.org/print/1930 7: 14: 391:from the original on 2009-09-03 84:the U.S. Southern Command for 1: 442:University of Chicago alumni 238:"Thresholds in Uncertainty" 76:, internet security, space 458: 98:National Security Council 28: 70:Senior Executive Service 37:Stockholm Internet Forum 124:University of Chicago 385:"James Andrew Lewis" 90:U.S. Central Command 66:U.S. Foreign Service 321:2016-11-07 at the 302:2010-03-01 at the 283:2009-10-12 at the 274:Arms Control Today 110:2011-08-06 at the 47:James Andrew Lewis 23:James Andrew Lewis 251:978-1-939907-12-7 228:978-0-89206-512-7 208:978-0-89206-489-2 188:978-0-89206-481-6 168:978-0-89206-455-7 148:978-0-89206-426-7 44: 43: 16:American diplomat 449: 400: 399: 397: 396: 381: 375: 370: 364: 363: 361: 360: 351:. Archived from 345: 339: 331: 325: 312: 306: 293: 287: 270: 255: 232: 212: 192: 172: 152: 55:Washington, D.C. 33: 19: 457: 456: 452: 451: 450: 448: 447: 446: 422: 421: 409: 404: 403: 394: 392: 383: 382: 378: 371: 367: 358: 356: 347: 346: 342: 332: 328: 323:Wayback Machine 313: 309: 304:Wayback Machine 294: 290: 285:Wayback Machine 271: 267: 262: 252: 235: 229: 215: 209: 195: 189: 175: 169: 155: 149: 135: 132: 112:Wayback Machine 62: 40: 35:James Lewis at 24: 17: 12: 11: 5: 455: 453: 445: 444: 439: 434: 424: 423: 420: 419: 408: 407:External links 405: 402: 401: 376: 365: 340: 326: 307: 288: 264: 263: 261: 258: 257: 256: 250: 233: 227: 221:. CSIS. 2008. 213: 207: 201:. CSIS. 2007. 193: 187: 181:. CSIS. 2006. 173: 167: 161:. CSIS. 2004. 153: 147: 141:. CSIS. 2003. 131: 128: 78:remote sensing 61: 58: 42: 41: 34: 26: 25: 22: 15: 13: 10: 9: 6: 4: 3: 2: 454: 443: 440: 438: 437:Living people 435: 433: 430: 429: 427: 418: 414: 411: 410: 406: 390: 386: 380: 377: 374: 369: 366: 355:on 2011-04-22 354: 350: 349:"cbsnews.com" 344: 341: 338: 336: 330: 327: 324: 320: 317: 311: 308: 305: 301: 298: 292: 289: 286: 282: 279: 275: 269: 266: 259: 253: 247: 243: 239: 234: 230: 224: 220: 219: 214: 210: 204: 200: 199: 194: 190: 184: 180: 179: 174: 170: 164: 160: 159: 154: 150: 144: 140: 139: 134: 133: 129: 127: 125: 121: 117: 113: 109: 106: 102: 99: 95: 94:Desert Shield 91: 87: 81: 79: 75: 71: 67: 59: 57: 56: 52: 48: 38: 32: 27: 20: 393:. Retrieved 379: 368: 357:. Retrieved 353:the original 343: 334: 329: 310: 291: 273: 268: 241: 217: 197: 177: 157: 137: 103: 82: 63: 46: 45: 432:1953 births 413:Appearances 426:Categories 395:2009-10-10 359:2011-04-20 314:Frontline 260:References 86:Just Cause 74:encryption 53:(CSIS) in 96:, to the 389:Archived 319:Archived 300:Archived 281:Archived 108:Archived 417:C-SPAN 248:  225:  205:  185:  165:  145:  88:, the 130:Works 335:Time 246:ISBN 223:ISBN 203:ISBN 183:ISBN 163:ISBN 143:ISBN 92:for 68:and 60:Life 39:2014 415:on 428:: 387:. 276:, 240:. 126:. 398:. 362:. 254:. 231:. 211:. 191:. 171:. 151:.

Index


Stockholm Internet Forum
Center for Strategic and International Studies
Washington, D.C.
U.S. Foreign Service
Senior Executive Service
encryption
remote sensing
Just Cause
U.S. Central Command
Desert Shield
National Security Council

Archived
Wayback Machine
Commission on Cybersecurity for the 44th Presidency
China Institute of Contemporary International Relations
University of Chicago
Cyber Security: Turning National Solutions Into International Cooperation
ISBN
978-0-89206-426-7
Globalization and National Security: Maintaining U.S. Technological Leadership and Economic Strength
ISBN
978-0-89206-455-7
Waiting for Sputnik: Basic Research and Strategic Competition
ISBN
978-0-89206-481-6
Building an Information Technology Industry in China, National Strategy, Global Markets: A Report of the Technology and Public Policy Program Center for Strategic and International Studies
ISBN
978-0-89206-489-2

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.