Cybersecurity

Primary Sources

Organization of American States: "A Comprehensive Inter-American Cybersecurity Strategy"

On June 10, 2003, the Organization of American States (OAS) General Assembly passed a resolution to development a strategy to combat threats to cybersecurity. Built on efforts of the Inter-American Committee against Terrorism, Inter-American Telecommunication Commission, and REMJA Governmental Experts Group on Cybercrime, this strategy provides a framework for American states to collaborate in "protecting networks and information systems that constitute the Internet, and for responding to and recovering from incidents."

See more in Americas; Cybersecurity

News Release

CFR Establishes Lipman Chair to Focus on Emerging Technologies and National Security

To assist generations of U.S. policymakers to navigate the complexities of cyber and other technological threats, the Council on Foreign Relations (CFR) has launched the Ira A. Lipman Chair in Emerging Technologies and National Security, named for longtime CFR member Ira A. Lipman, the founder and chairman emeritus of Guardsmark, LLC—one of the world’s largest security services companies.

See more in United States; Cybersecurity

Article

Government's Role in Vulnerability Disclosure: Creating a Permanent and Accountable Vulnerability Equities Process

Authors: Ari Schwartz and Robert K. Knake
Belfer Center for Science and International Affairs John F. Kennedy School of Government Harvard University

In this June 2016 discussion paper, Knake and his coauthor examine the Obama administration’s Vulnerability Equities Process guidelines. They argue that the administration ought to formalize and publicize these guidelines and offer policy recommendations to improve the VEP while maintaining a bias toward public disclosure of zero day vulnerabilities.

See more in Global; Cybersecurity

Article

Can the United States and China De-conflict in Cyberspace?

Authors: Adam Segal and Tang Lan
War on the Rocks

In spite of significant differences in views, Beijing and Washington appear committed to not letting cyber issues derail the U.S.-China relationship or interfere with cooperation on other high-profile issues. Among the wide range of issues raised at their recent meeting on the sidelines of the Nuclear Security Summit, Presidents Barack Obama and Xi Jinping reiterated their commitment to last September’s breakthrough cybersecurity agreement.

See more in China; United States; Cybersecurity

Article

Reducing and Managing U.S.-China Conflict in Cyberspace

Authors: Adam Segal and Tang Lan
The National Bureau of Asian Research

While there continue to be significant differences between the perspectives of the U.S. and Chinese governments on issues in cyberspace, recent progress to overcome these challenges suggests a path forward, writes Adam Segal. Substantive cooperation on cybersecurity, cybercrime, and Internet governance can help both countries avoid a conflict over cyberspace.

See more in United States; China; Cybersecurity

Op-Ed

How to Break the Deadlock Over Data Encryption

Authors: Adam Segal and Alexandre Grigsby
Washington Post

See more in United States; Cybersecurity

Other Report

Protecting Data Privacy With User-Friendly Software

Author: Sara "Scout" Sinclair Brody

Protecting the privacy of user data from unauthorized access is essential for business executives, policymakers, and users themselves. But strong privacy protection software is often difficult for nonexperts to use. In this Cyber Brief, Sara "Scout" Sinclair Brody explains how promoting and improving open-source software can go a long way toward strengthening privacy online.

See more in Global; Cybersecurity; Privacy

News Release

U.S. Influence Over Cyberspace Is Eroding, Warns Adam Segal in New CFR Book, The Hacked World Order

“While it should continue to promote and espouse the virtues of an open, global, and secure Internet, the United States must prepare for a more likely future—a highly contested, nationally divided cyberspace,” writes Adam Segal, director of the digital and cyberspace policy program at the Council on Foreign Relations, in his new book, The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age.

See more in Global; Cybersecurity; Internet Policy