Since the Snowden disclosures in 2013, the relationship between the U.S. government and the tech community has been strained. This Council Special Report offers recommendations for repairing the relationship and moving forward on issues such as encryption, data localization, and cybersecurity.
After Russia’s hacking to influence November’s election, Rob Knake argues that we should expect to see Russia use its cyber exploitation capabilities against the U.S. for even darker and more frightening purposes in the year ahead.
Last week’s rollout of new sanctions against Russia by the Obama administration answered many questions about Moscow’s alleged hacking activities. But it didn’t address one crucial question, writes Stephen Sestanovich.
As reports increasingly indicate that Russia interfered with the U.S. presidential election to benefit Donald Trump, the president-elect has forcefully pushed back on the intelligence community. Admitting that Moscow played a role in the election, Trump believes, would delegitimize his victory, so he has doubled down on his position that Russia was not involved in the hacks on Democratic Party officials, writes Robert Knake.
Rob Knake argues that the DoD must coordinate its role with the civilian agencies responsible for domestic security, not replace them. Its job is to conduct operations in cyberspace to blunt threats to the United States when network defenses are overwhelmed, not to operate those defenses. To do so would take our military service across the Digital Rubicon.
This symposium will convene policymakers, business executives, and other opinion leaders for a candid analysis of online privacy, with a particular focus on the United States, the U.S.-European Union relationship, and big data.
When transition planning gets underway in earnest this fall, one of the hardest memos to write will be the outbrief from the current National Security Council (NSC) team on what to do about China’s ongoing campaign of cyber espionage targeting the intellectual property of U.S. companies. While long a focus of both the president’s cyber and China teams, there is little chance that in the coming months the issue is going to be brought to any type of resolution. Instead, the next president will inherit a partially implemented plan that has produced positive results in the short term, but its long-term sustainability remains uncertain. He or she would be wise to follow the playbook left by the Obama administration, with a redoubled focus on the investigation and prosecution of cybercrime.
Our democracy is under attack by Russia, but almost no one is treating the situation with the gravity it deserves. President Obama is loathe to retaliate. Would-be president Donald Trump denies that any attack is happening. And the media are acting as enablers for the attackers.
On June 10, 2003, the Organization of American States (OAS) General Assembly passed a resolution to development a strategy to combat threats to cybersecurity. Built on efforts of the Inter-American Committee against Terrorism, Inter-American Telecommunication Commission, and REMJA Governmental Experts Group on Cybercrime, this strategy provides a framework for American states to collaborate in "protecting networks and information systems that constitute the Internet, and for responding to and recovering from incidents."
Learn more about CFR’s mission and its work over the past year in the 2016 Annual Report. The Annual Report spotlights new initiatives, high-profile events, and authoritative scholarship from CFR experts, and includes a message from CFR President Richard N. Haass. Read and download »