Updated December 28, 2012
How can the United States protect "cyberspace as a national asset," without restricting "the free and open nature of the Internet"? What should countries consider when developing international cybersecurity standards and protocol? What should their citizens know to protect their information and their rights? Cybersecurity Policy Research Links provide news, background information, legislation, analysis, and international efforts to protect government and the public's information.
Research Links on Cybersecurity Policy are divided into:
Blogs, news briefs, and industry updates.
"Cyber war and the latest in military technology."
Includes free newsletters for IT professionals, Government, and others interested in technology. Dark Reading is aimed at business and data security.
"We do not focus on specific technologies but instead cover broader policy developments, key players and cyber incidents, along with broad innovations in cybersecurity context."
See also Cyberwarfare: http://topics.nytimes.com/top/reference/timestopics/subjects/c/cyberwarfare/index.html
"Technology and the business of government"; latest articles about cybersecurity from government, technology, and executive sources.
Links to primary (policies, reports, events) and secondary sources (news).
(PDF, April 26, 2012) legistlation and hearings from 112th Congress, executive orders, data sources, glossaries, reports by topic, and other websites.
Working on strategic history of cyber conflict.
Oral history and digital archive of government, private sector, academic, and media initiatives and reports related to cybersecurity., as well as related websites
Real-time and historical traffic from around the world; government and copyright owners requests for content removal; government requests for user data.
1949-2008
Official documents, books, reports, websites, some free articles. Updated frequently with relevant and authoritative resources.
From National Defense University; news sources and analysis, including reports and speeches from both U.S. and international officials and scholars, primary sources on U.S. cybersecurity policy, and resources on the types and effects of cybersecurity.
(PDF, January 2012) includes survey of 250 experts from around the world about strengths and vulnerabilities for 21 countries.
2012 data; "the majority of executives...are confident in the effectiveness of their organization’s information security practices."
Survey of attitudes toward cyberwarfare and cyber-espionage, as well as other IT security developments and statistics.
(PDF, March 2012) sponsored by Symantec.
Build your own report, view charts, related white papers.
See also Must Reads on cybersecurity, CFR.org's collection of the best online analyses and inquiries on foreign policy.
Last updated September 2010
"Quarterly series of roundtable discussions...to offer solutions to major challenges facing the world." Includes interviews and solutions proposed from tech thought leaders; infographic on cybersecurity costs, related articles.
Full-text readable online.
Aggregates latest policies and articles from government, think tank, and industry sources.
"Over 1,946 original computer security white papers in 77 different categories."
See also for resources: http://www.dhs.gov/files/cybersecurity.shtm .
Disclosure obligations relating to cybersecurity risks and cyber incidents.
Links to policies and departments involved.
(June 2011)
(March 2011)
(PDF, September 2011)
Priorities, annual reports, threats and scams, cases and partnerships.
(July 2010)
(December 2011)
Database to search scientific government publications.
(PDF, December 2011)
Mission of website: "To simplify, clarify, and unify the ECPA standards, providing stronger privacy protections for communications and associated data...while preserving the legal tools necessary for government agencies to enforce the laws, respond to eme
In October 2011, Task Force presented recommendations to guide legislation regarding cybersecurity.
Congressional Bills and Statuses; search for "cyber."
(PDF, January 31, 2012) Testimony of Director of National Intelligence, James Clapper.
"Conducts its work through partnerships between government and private industry, the venture capital community, and the research community."
Subtopics include Internet Governance, IT Security and Threats, International Technology Policy.
Fact sheet, conferences, training. By January 2013, Europol will establish a European Cybercrime Centre
Dashboard for NATO news, initiatives, and publications on cyberdefense.
(2010)
(PDF, May 2011)
(July 21, 2011)
(PDF, December 15, 2010) discusses lessons learned from Scholarship for Service, a government program to fund cybersecurity education and secure an IT federal workforce.
(PDF, July 2011) how to protect "tremendous economic and social value of the Internet, without stifling innovation."
"Resource page provides information related to all aspects of cybersecurity for higher education, with an emphasis on strategies, policies, and other tools that will assist institutions of higher education to prevent, detect, respond to vulnerabilities."
After SOPA and PIPA elicited strong reactions from citizens and online organizations, OPEN was proposed, aimed to "protect creative ownership in America while securing the open, accessible Internet you deserve."
2011 report: "nearly all business records...exist primarily in digital form. Cyberspace makes it possible for foreign collectors to gather enormous quantities of information quickly and with little risk."
What effect would the fall of the Assad regime have on U.S. policy towards Syria?
Reforming U.S. Drone Strike Policies
The author analyzes the potentially serious consequences, both at home and abroad, of a lightly overseen drone program and makes recommendations for improving its governance.
The biggest threat to America's security and prosperity comes not from abroad but from within, writes CFR President Richard N. Haass in his provocative and important new book. More
Capitalism and Inequality: Why both the left and right get it wrong
General Stanley McChrystal on the U.S. war on terror
The U.S.-Pakistan alliance: Why it should end
subscribe nowPublished by the Council on Foreign Relations since 1922
The Battle of Bretton Woods
The remarkable story of how the blueprint for the postwar economic order was drawn. More
Invisible Armies
A complete global history of guerrilla uprisings through the ages. More
Tested by Zion
The full insider account of the Bush administration and the Israeli-Palestinian conflict. More
To request permission to reprint or reuse CFR material, please fill out this permissions request form (PDF), referring to the instructions on page 1.