Cybersecurity

Other Report

Protecting Data Privacy With User-Friendly Software

Author: Sara "Scout" Sinclair Brody

Protecting the privacy of user data from unauthorized access is essential for business executives, policymakers, and users themselves. But strong privacy protection software is often difficult for nonexperts to use. In this Cyber Brief, Sara "Scout" Sinclair Brody explains how promoting and improving open-source software can go a long way toward strengthening privacy online.

See more in Global; Cybersecurity; Privacy

News Release

U.S. Influence Over Cyberspace Is Eroding, Warns Adam Segal in New CFR Book, The Hacked World Order

“While it should continue to promote and espouse the virtues of an open, global, and secure Internet, the United States must prepare for a more likely future—a highly contested, nationally divided cyberspace,” writes Adam Segal, director of the digital and cyberspace policy program at the Council on Foreign Relations, in his new book, The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age.

See more in Global; Cybersecurity; Internet Policy

Research Links

Cybersecurity Policy

How can the United States protect cyberspace, the "control system of our country," without restricting the open "flow of information on the Internet"? What should countries consider when developing international cybersecurity standards and protocol? What should their citizens know to protect their information and their rights? Cybersecurity Policy Research Links provide news, background information, legislation, analysis, and international efforts to protect government and the public's information.

See more in United States; Cybersecurity; Internet Policy

Foreign Affairs Article

Digital Counterinsurgency: How to Marginalize the Islamic State Online

Author: Jared Cohen

The Islamic State, or ISIS, is the first terrorist group to hold both physical and digital territory: in addition to the swaths of land it controls in Iraq and Syria, it dominates pockets of the Internet with relative impunity. But it will hardly be the last. Although there are still some fringe terrorist groups in the western Sahel or other rural areas that do not supplement their violence digitally, it is only a matter of time before they also go online.

See more in Syria; Global; Cybersecurity; Counterterrorism

Article

How Does Israel Regulate Encryption?

Authors: Matthew C. Waxman and Doron Hindin
Lawfare

Recent terrorist attacks and resulting questions about the limits of surveillance have rekindled debate about how governments should deal with the challenges of powerful, commercially available encryption. With active debate in the United States and Western Europe surrounding this issue, it is instructive to note that Israel has been regulating encryption for decades.

See more in Israel; Cybersecurity

Book

The Hacked World Order

Author: Adam Segal

Beginning with the Stuxnet virus launched by the United States at an Iranian nuclear facility in 2010 and continuing through to the most recent Sony hacking scandal, A Hacked World Order exposes how the Internet has ushered in a new era of geopolitical maneuvering and reveals the tremendous and terrifying implications for our economic livelihood, security, and personal identity.

See more in Global; Cybersecurity; Technology and Foreign Policy