Cybersecurity

Op-Ed

Beyond Borders: Fighting Data Protectionism

Author: Karen Kornbluh
Democracy: A Journal of Ideas

The free flow of information across borders is essential for the modern economy, but a growing number of countries have erected restrictions curtailing a free and open Internet. Karen Kornbluh discusses what diplomatic and policy steps the United States can take to safeguard the free flow of information worldwide.

See more in United States; Cybersecurity

Op-Ed

Shaming Chinese Hackers Won't Work Because Cyber Espionage is Here to Stay

Author: Adam Segal
The Guardian

In preparation for President Xi Jinping and President Barack Obama's meeting in California on June 7-9, Adam Segal writes, "The presidents won't come to any agreements next week, but over the course of the two days, they should try and dispel the growing mistrust by explaining their national interests and intentions in cyberspace."

See more in United States; Cybersecurity; China

Other Report

Developing a Proportionate Response to a Cyber Incident

Author: Tobias Feakin

As offensive cyber activity becomes more prevalent, policymakers will be challenged to develop proportionate responses to disruptive or destructive attacks. Tobias Feakin outlines the variables that each state should consider in determining the appropriate response to a state-sponsored cyber incident.

See more in Global; Cybersecurity

Other Report

Countering Islamic State Exploitation of the Internet

Author: David P. Fidler

The use of social media and other Internet-enabled communications by the self-proclaimed Islamic State is pushing the United States and other democracies to react to the abuse of liberal freedoms by illiberal forces. CFR Visiting Fellow David P. Fidler outlines ways to counter the Islamic State's online onslaught through policies anchored in free speech, transparency, and accountability. 

See more in Syria; Iraq; Cybersecurity; Internet Policy