Adam Segal testifies before the House Foreign Affairs Subcommittee on Oversight and Investigations about Chinese cyber espionage and China's desire to reduce its dependence on the West for advanced technologies.
"The deeper problem with the nothing-to-hide argument is that it myopically views privacy as a form of secrecy. In contrast, understanding privacy as a plurality of related issues demonstrates that the disclosure of bad things is just one among many difficulties caused by government security measures. To return to my discussion of literary metaphors, the problems are not just Orwellian but Kafkaesque. Government information-gathering programs are problematic even if no information that people want to hide is uncovered."
Richard A. Falkenrath discusses Stuxnet and the need for the United States to engage in offensive information warfare.
This New York Times article by William J. Broad, John Markoff and David E. Sanger examines the development and impact of the Stuxnet computer worm in undermining Iran's nuclear program.
Adam Segal and Cherian Samuel argue that both India and the United States have a stake in an internet that is open, global, and secure.
Increased connectivity allows for the spread of liberal, open values but also poses a number of dangers.
A favorite view of the Internet holds that the democratization of communications will bring about the democratization of the world.
William Lynn III, Deputy Secretary of Defense at the U.S. Department of Defense and the author of "Defending New Domain: The Pentagon's New Cyberstrategy" discusses cybersecurity with Nicholas Thompson, Senior Editor of The New Yorker.
The Pentagon recognizes the catastrophic threat posed by cyberwarfare, and is partnering with allied governments and private companies to prepare itself.
Cybersecurity expert Knake recommends the United States use international forums to promote mechanisms that address security concerns in cyberspace while ensuring the Internet remains open for the free exchange of ideas across national boundaries.
Robert K. Knake testifies before the House of Representatives Committee on Science and Technology on the role of attack attribution in preventing cyber attacks and how attribution technologies can affect the anonymity and the privacy of Internet users.
Google's decision to end censorship of its search content in China, and Beijing's response, appear to strike a balance between holding to principles and doing business, but U.S.-China clouds continue to gather, writes CFR's Adam Segal.
This initiative is the product of several reviews of cybersecurity strategies from multiple government departments, especially the Cyberspace Policy Review.
How well prepared are IT professionals within U.S. government agencies to respond to foreign cyber threats? Will government initiatives, such as the Comprehensive National Cybersecurity Initiative and the creation of the U.S. National Cybersecurity Coordinator role, be effective in addressing the challenges facing U.S. critical IT infrastructure? What is the impact of compliance on security within the federal IT environment?
The recently released Annual Threat Assessment warned of cyberattacks and attacks by al-Qaeda, but that doesn't mean al-Qaeda is capable of cyberterrorism, says CFR's Robert K. Knake.
Dennis Blair, Director of National Intelligence, gave this testimony on the assessment of threats to national security to the Senate Select Committee on Intelligence on February 2, 2010.
As part of the New York Times' "Cyberwar" series examining the growing use of computer power as a weapon, David E. Sanger et al. discuss the U.S. government's failing efforts cyber security.
This report argues that the lack of sustained attention to energy issues is undercutting U.S. foreign policy and national security.
Williams argues that the status quo for peace operations in untenable and that greater U.S. involvement is necessary to enhance the quality and success of peacekeeping missions.
The authors argue that the United States has responded inadequately to the rise of Chinese power and recommend placing less strategic emphasis on the goal of integrating China into the international system and more on balancing China's rise.
Campbell evaluates the implications of the Boko Haram insurgency and recommends that the United States support Nigerian efforts to address the drivers of Boko Haram, such as poverty and corruption, and to foster stronger ties with Nigerian civil society.
In The Hacked World Order, CFR Senior Fellow Adam Segal shows how governments use the web to wage war and spy on, coerce, and damage each other. More
Red Team provides an in-depth investigation into the work of red teams, revealing the best practices, most common pitfalls, and most effective applications of these modern-day devil's advocates. More
Through insightful analysis and engaging graphics, How America Stacks Up explores how the United States can keep pace with global economic competition. More
Learn more about CFR’s mission and its work over the past year in the 2015 Annual Report. The Annual Report spotlights new initiatives, high-profile events, and authoritative scholarship from CFR experts, and includes a message from CFR President Richard N. Haass.
Read and download »