The recently released Annual Threat Assessment warned of cyberattacks and attacks by al-Qaeda, but that doesn't mean al-Qaeda is capable of cyberterrorism, says CFR's Robert K. Knake.
Google's decision to end censorship of its search content in China, and Beijing's response, appear to strike a balance between holding to principles and doing business, but U.S.-China clouds continue to gather, writes CFR's Adam Segal.
The U.S. government needs to marshal its cybersecurity resources in support of the private sector and build alliances with international partners, says former CIA director Michael Hayden, member of a new CFR independent task force on digital policy.
The steady theft of U.S. intellectual property by foreign cyberattackers could mean decreased economic growth, reduced competitiveness, and loss of jobs, says McAfee cybersecurity expert Dmitri Alperovitch.
The Pentagon's new strategy for operating in cyberspace breaks little ground and offers few specifics, says CFR's Adam Segal. While the last six months have been busy for U.S. cybersecurity policy, he cautions that "speed is not a measure of efficacy."
See more in Cybersecurity
Reports of Predator drones' data losses in Iraq and Afghanistan should serve as a call to action to upgrade U.S. cybersecurity capabilities, says analyst James Lewis.
The U.S. Air Force is standing up a dedicated command to coordinate offensive and defensive cyber strategy within the Pentagon.
What CFR.org Editors are reading the week of June 1–5, 2015.
"APT1 is a single organization of operators that has conducted a cyber espionage campaign against a broad range of victims since at least 2006. From our observations, it is one of the most prolific cyber espionage groups in terms of the sheer quantity of information stolen."
With incidence of severe cybersecurity breaches increasing, govenment and business leaders are forced to re-evaluate control computer systems and heighten defences against hackers, writes Robert O'Harrow Jr. in the Washington Post.
Government and business leaders in the United States and around the world are rushing to build better defenses -- and to prepare for the coming battles in the digital universe, writes Robert O'Harrow Jr. at the Washington Post. To succeed, they must understand one of the most complex, man-made environments on Earth: cyberspace.
This Congressional Research Service report compiles hearings, legislation, data, and other reports on cybersecurity.
This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats.
Richard Clarke, former special adviser to the president for cybersecurity, says the proposed cybersecurity bill would not do much to stop Chinese cyber espionage. He suggests that the Obama administration act to stop the threat.
Foreign Policy's Thomas Rid writes that we shouldn't fear the digital bogeyman--virtual conflict is still more hype than reality.
The Congressional Research Service reports that for more than a decade, various experts have expressed increasing concerns about cybersecurity in light of the growing frequency, impact, and sophistication of attacks on information systems in the United States and abroad. Consensus has also been building that the current legislative framework for cybersecurity might need to be revised.
Smart grids might revolutionize energy use and delivery, but there are associated security risks, particularly regarding communications technology.
Cyber espionage has become a critical aspect of Chinese economic growth, write Michael Riley and John Walcott.
This report argues that the lack of sustained attention to energy issues is undercutting U.S. foreign policy and national security.
Williams argues that the status quo for peace operations in untenable and that greater U.S. involvement is necessary to enhance the quality and success of peacekeeping missions.
The authors argue that the United States has responded inadequately to the rise of Chinese power and recommend placing less strategic emphasis on the goal of integrating China into the international system and more on balancing China's rise.
Campbell evaluates the implications of the Boko Haram insurgency and recommends that the United States support Nigerian efforts to address the drivers of Boko Haram, such as poverty and corruption, and to foster stronger ties with Nigerian civil society.
Ashley's War tells the poignant and gripping story of a groundbreaking team of female American warriors who served alongside Special Operations soldiers in Afghanistan. More
Smith's insightful book explores the policy issues testing the Japanese government as it tries to navigate its relationship with an advancing China. More
This revolutionary new look at volatility and crisis in oil markets explores the conditions in which oil supply fears arise, gain popularity, and eventually wane. More
Learn more about CFR’s mission and its work over the past year in the 2014 Annual Report. The Annual Report spotlights new initiatives, high-profile events, and authoritative scholarship from CFR experts, and includes a message from CFR President Richard N. Haass.
Read and download »