See more in Cybersecurity
This initiative is the product of several reviews of cybersecurity strategies from multiple government departments, especially the Cyberspace Policy Review.
Dennis Blair, Director of National Intelligence, gave this testimony on the assessment of threats to national security to the Senate Select Committee on Intelligence on February 2, 2010.
This report was prepared by the Northrop Grumman Corporation for the U.S. government's U.S.-China Economic and Security Review Commission.
The International Telecommunication Union's Global Cybersecurity Agenda (GCA) produced this report. The GCA "is a framework for international cooperation aimed at enhancing confidence and security in the information society. The GCA is designed for cooperation and efficiency, encouraging collaboration with and between all relevant partners and building on existing initiatives to avoid duplicating efforts."
President Obama gave these remarks on May 29, 2009, on the day the 60-Day Cyber Space Policy Review was released.
The White House released this policy review in May 2009, to investigate the sufficiency of U.S. strategy and secruty in cyberspace. This review prompted the U.S. State Department, Commerce Department, Department of Homeland Security, and Department of Defense to release new strategy documents, and Congress began reviewing more cybersecurity legislation.
The U.S. Government describes this policy, released in February 2003, as an attempt to "engage and empower Americans to secure the portions of cyberspace that they own, operate, control, or with which they interact."
The Council of Europe Convention on Cybercrime was opened for signature on November 23, 2001. The Additional Protocol to the Council of Europe's Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through computer systems, was adopted in Strasbourg, France on January 28, 2003.
How can the United States protect cyberspace, the "control system of our country," without restricting the open "flow of information on the Internet"? What should countries consider when developing international cybersecurity standards and protocol? What should their citizens know to protect their information and their rights? Cybersecurity Policy Research Links provide news, background information, legislation, analysis, and international efforts to protect government and the public's information.
The CFR-sponsored Independent Task Force report, Defending an Open, Global, Secure, and Resilient Internet, finds that as more people and services become interconnected and dependent on the Internet, societies are becoming increasingly vulnerable to cyberattacks. To support security, innovation, growth, and the free flow of information, the Task Force recommends that the United States and its partners work to build a cyber alliance, make the free flow of information a part of all future trade agreements, and articulate an inclusive and robust vision of Internet governance.
Adam Segal testifies before the House Foreign Affairs Subcommittee on Oversight and Investigations about Chinese cyber espionage and China's desire to reduce its dependence on the West for advanced technologies.
Robert K. Knake testifies before the House of Representatives Committee on Science and Technology on the role of attack attribution in preventing cyber attacks and how attribution technologies can affect the anonymity and the privacy of Internet users.
Adam Segal, CFR senior fellow for China studies, and Scott A. Snyder, CFR senior fellow for Korea studies, discussed the cyberattack on Sony Pictures and the studio's decision to cancel its release of The Interview, a comedy that reportedly depicts the assassination of North Korean leader Kim Jong-un.
This report argues that the lack of sustained attention to energy issues is undercutting U.S. foreign policy and national security.