Cybersecurity

Book

The Hacked World Order

Author: Adam Segal

Beginning with the Stuxnet virus launched by the United States at an Iranian nuclear facility in 2010 and continuing through to the most recent Sony hacking scandal, A Hacked World Order exposes how the Internet has ushered in a new era of geopolitical maneuvering and reveals the tremendous and terrifying implications for our economic livelihood, security, and personal identity.

See more in Global; Cybersecurity; Technology and Foreign Policy

Contingency Planning Memorandum No. 24

Strategic Risks of Ambiguity in Cyberspace

Author: Benjamin Brake

Ambiguity in cyberspace—in terms of who is responsible for and the intent of a cyberattack—poses a growing risk of unnecessary military escalation in and outside the cyber domain. Benjamin Brake details how the Obama administration can strengthen its ability to correctly and efficiently attribute an ambiguous attack, reduce the likelihood of its escalation, and mitigate the consequences.

See more in Global; Cybersecurity

Event

Defending an Open, Global, Secure, and Resilient Internet: Report of the CFR-Sponsored Independent Task Force on U.S. Policy in the Digital Age

Speaker: John D. Negroponte
Speaker: Samuel J. Palmisano
Speaker: Adam Segal
Presider: Vivian Schiller

The CFR-sponsored Independent Task Force report, Defending an Open, Global, Secure, and Resilient Internet, finds that as more people and services become interconnected and dependent on the Internet, societies are becoming increasingly vulnerable to cyberattacks. To support security, innovation, growth, and the free flow of information, the Task Force recommends that the United States and its partners work to build a cyber alliance, make the free flow of information a part of all future trade agreements, and articulate an inclusive and robust vision of Internet governance.

Independent Task Force reports are consensus documents that offer analysis and policy prescriptions for major U.S. foreign policy issues facing the United States, developed through private and nonpartisan deliberations among a group of high-level experts.

See more in United States; Cybersecurity; Internet Policy