Cybersecurity

Ask CFR Experts

Is the threat of a "cyber Pearl Harbor" as potent as some have suggested?

Asked by James Bingham, from King's College, London

The phrase "cyber Pearl Harbor" received attention when it by former defense secretary Leon E. Panetta in a speech about U.S. vulnerability to cyberwarfare threats. It is best understood as an effort to shape the domestic political debate and as a description of a potential future scenario, rather than as an accurate description of the cybersecurity threat.

Read full answer

See more in Cybersecurity; United States

Audio

Media Conference Call: North Korean Cyberattack on Sony Pictures (Audio)

Speakers: Adam Segal and Scott A. Snyder
Presider: Robert McMahon

Adam Segal, CFR senior fellow for China studies, and Scott A. Snyder, CFR senior fellow for Korea studies, discussed the cyberattack on Sony Pictures and the studio's decision to cancel its release of The Interview, a comedy that reportedly depicts the assassination of North Korean leader Kim Jong-un.

See more in North Korea; Cybersecurity; Homeland Security

Audio

Defending an Open, Global, Secure, and Resilient Internet

Speakers: John D. Negroponte, Samuel J. Palmisano, and Adam Segal
Introductory Speaker: Anya Schmemann
Presider: Thomas Gjelten

The CFR-sponsored Independent Task Force report, Defending an Open, Global, Secure, and Resilient Internet, finds that as more people and services become interconnected and dependent on the Internet, societies are becoming increasingly vulnerable to cyberattacks.

See more in Global; Cybersecurity

Audio

Defending an Open, Global, Secure, and Resilient Internet

Speakers: John D. Negroponte, Samuel J. Palmisano, and Adam Segal
Introductory Speaker: Anya Schmemann
Presider: Jacob Weisberg

The CFR-sponsored Independent Task Force report, Defending an Open, Global, Secure, and Resilient Internet, finds that as more people and services become interconnected and dependent on the Internet, societies are becoming increasingly vulnerable to cyberattacks.

See more in United States; Cybersecurity; Internet Policy

Book

The Hacked World Order

Author: Adam Segal

Beginning with the Stuxnet virus launched by the US at an Iranian nuclear facility in 2010 and continuing through to the most recent Sony hacking scandal, A Hacked World Order exposes how the internet has ushered in a new era of geopolitical maneuvering and reveals the tremendous and terrifying implications for our economic livelihood, security, and personal identity.

See more in Global; Cybersecurity; Technology and Foreign Policy

Contingency Planning Memorandum No. 24

Strategic Risks of Ambiguity in Cyberspace

Author: Benjamin Brake

Ambiguity in cyberspace—in terms of who is responsible for and the intent of a cyberattack—poses a growing risk of unnecessary military escalation in and outside the cyber domain. Benjamin Brake details how the Obama administration can strengthen its ability to correctly and efficiently attribute an ambiguous attack, reduce the likelihood of its escalation, and mitigate the consequences.

See more in Global; Cybersecurity