Cybersecurity

Foreign Affairs Article

Is Cyberwar Real?

Authors: Jarno Limnell and Thomas Rid

Thomas Rid ("Cyberwar and Peace," November/December 2013) describes cyberattacks as somehow separate from conventional warfare because they fail to meet all three of Clausewitz's definitions of war as violent, instrumental, and attributable to one side as an action taken for a political goal.

See more in United States; Cybersecurity

Foreign Affairs Article

Cyberwar and Peace

Author: Thomas Rid

Cyberwar Is Coming!" declared the title of a seminal 1993 article by the RAND Corporation analysts John Arquilla and David Ronfeldt, who argued that the nascent Internet would fundamentally transform warfare.

See more in United States; Cybersecurity

Foreign Affairs Article

Chinese Computer Games

Author: Adam Segal

In March 2011, the U.S. computer security company RSA announced that hackers had gained access to security tokens it produces that let millions of government and private-sector employees, including those of defense contractors such as Lockheed Martin, connect remotely to their office computers.

See more in China; Cybersecurity

Analysis Brief

Securing U.S. Cyberspace

Author: Jonathan Masters

Most critical information systems in the United States are operated by the private sector and remain vulnerable to cyber attacks. Newly proposed legislation would require businesses to meet minimum standards of protection, but has raised concerns about regulatory overreach.

See more in Cybersecurity; United States

Article

Self-Defensive Force Against Cyber Attacks: Legal, Strategic and Political Dimensions

Author: Matthew C. Waxman
International Law Studies

When does a cyber-attack (or threat of cyber-attack) give rise to a right of self-defense – including armed self-defense – and when should it? This essay examines these questions through three lenses: (1) a legal perspective, to examine the range of reasonable interpretations of self-defense rights as applied to cyber-attacks, and the relative merits of interpretations within that range; (2) a strategic perspective, to link a purported right of armed self-defense to long-term policy interests including security and stability; and (3) a political perspective, to consider the situational context in which government decision-makers will face these issues and predictive judgments about the reactions to cyber-crises of influential actors in the international system.

See more in Global; Cybersecurity

Article

The People's Republic of Hacking

Author: Adam Segal
Foreign Policy

Adam Segal says the recent Chinese cyberattacks on Bloomberg and the New York Times highlights both the willingness of Beijing to shape the narrative about China, as well as the vulnerability the top leadership feels about how they are portrayed.

See more in Cybersecurity; China

Ask CFR Experts

Is the threat of a "cyber Pearl Harbor" as potent as some have suggested?

Asked by James Bingham, from King's College, London

The phrase "cyber Pearl Harbor" received attention when it by former defense secretary Leon E. Panetta in a speech about U.S. vulnerability to cyberwarfare threats. It is best understood as an effort to shape the domestic political debate and as a description of a potential future scenario, rather than as an accurate description of the cybersecurity threat.

Read full answer

See more in Cybersecurity

Audio

Defending an Open, Global, Secure, and Resilient Internet

Speakers: John D. Negroponte, Samuel J. Palmisano, and Adam Segal
Introductory Speaker: Anya Schmemann
Presider: Thomas Gjelten

The CFR-sponsored Independent Task Force report, Defending an Open, Global, Secure, and Resilient Internet, finds that as more people and services become interconnected and dependent on the Internet, societies are becoming increasingly vulnerable to cyberattacks.

See more in Global; Cybersecurity

Audio

Defending an Open, Global, Secure, and Resilient Internet

Speakers: John D. Negroponte, Samuel J. Palmisano, and Adam Segal
Introductory Speaker: Anya Schmemann
Presider: Jacob Weisberg

The CFR-sponsored Independent Task Force report, Defending an Open, Global, Secure, and Resilient Internet, finds that as more people and services become interconnected and dependent on the Internet, societies are becoming increasingly vulnerable to cyberattacks.

See more in United States; Cybersecurity; Internet Policy

Audio

Cyber Governance and Instability (Audio)

Speaker: Paul Twomey
Presider: Stewart A. Baker

Paul Twomey, chief executive officer of Argo Pacific, discusses the challenges posed by the present state of global cyber instability for governance at both the corporate and international levels.

This event is made possible in partnership with the Atlantic Council and the Cyber Conflict Studies Association.

See more in Global Governance; United States; Cybersecurity