What CFR.org Editors are reading the week of June 1–5, 2015.
What CFR.org Editors are reading the week of June 1–5, 2015.
"APT1 is a single organization of operators that has conducted a cyber espionage campaign against a broad range of victims since at least 2006. From our observations, it is one of the most prolific cyber espionage groups in terms of the sheer quantity of information stolen."
With incidence of severe cybersecurity breaches increasing, govenment and business leaders are forced to re-evaluate control computer systems and heighten defences against hackers, writes Robert O'Harrow Jr. in the Washington Post.
Government and business leaders in the United States and around the world are rushing to build better defenses -- and to prepare for the coming battles in the digital universe, writes Robert O'Harrow Jr. at the Washington Post. To succeed, they must understand one of the most complex, man-made environments on Earth: cyberspace.
This Congressional Research Service report compiles hearings, legislation, data, and other reports on cybersecurity.
This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats.
Richard Clarke, former special adviser to the president for cybersecurity, says the proposed cybersecurity bill would not do much to stop Chinese cyber espionage. He suggests that the Obama administration act to stop the threat.
Foreign Policy's Thomas Rid writes that we shouldn't fear the digital bogeyman--virtual conflict is still more hype than reality.
The Congressional Research Service reports that for more than a decade, various experts have expressed increasing concerns about cybersecurity in light of the growing frequency, impact, and sophistication of attacks on information systems in the United States and abroad. Consensus has also been building that the current legislative framework for cybersecurity might need to be revised.
Smart grids might revolutionize energy use and delivery, but there are associated security risks, particularly regarding communications technology.
Cyber espionage has become a critical aspect of Chinese economic growth, write Michael Riley and John Walcott.
Hackers have attacked America's defense establishment, as well as companies from Google to Morgan Stanley to security giant RSA, and fingers point to China as the culprit. Michael Joseph Gross gets an exclusive look at the raging cyber-war--Operation Aurora! Operation Shady rat!--and explains why Washington has been slow to fight back.
McAfee reports in a white paper on Operation Shady RAT, a set of targeted intrusions into the cyber infrastructure of over seventy global institutions in the last five years.
Eric Beidel and Stew Magnuson of National Defense present cyber threats as the cutting edge in asymmetric warfare, and highlight the risks entailed by the U.S. military's dearth of cybersecurity expertise.
See more in Cybersecurity
Kim Zetter of Wired's national security blog, Threat Level, discusses the politics and science of the stuxnet virus that infected Iran's nuclear centrifuges.
William McCants of Foreign Policy argues that the levelling power of internet search technology has provided a new mass platform for violence - and that Google has failed to seize upon the opportunity to curb it.
"The deeper problem with the nothing-to-hide argument is that it myopically views privacy as a form of secrecy. In contrast, understanding privacy as a plurality of related issues demonstrates that the disclosure of bad things is just one among many difficulties caused by government security measures. To return to my discussion of literary metaphors, the problems are not just Orwellian but Kafkaesque. Government information-gathering programs are problematic even if no information that people want to hide is uncovered."
This New York Times article by William J. Broad, John Markoff and David E. Sanger examines the development and impact of the Stuxnet computer worm in undermining Iran's nuclear program.
How well prepared are IT professionals within U.S. government agencies to respond to foreign cyber threats? Will government initiatives, such as the Comprehensive National Cybersecurity Initiative and the creation of the U.S. National Cybersecurity Coordinator role, be effective in addressing the challenges facing U.S. critical IT infrastructure? What is the impact of compliance on security within the federal IT environment?
As part of the New York Times' "Cyberwar" series examining the growing use of computer power as a weapon, David E. Sanger et al. discuss the U.S. government's failing efforts cyber security.
This report argues that the lack of sustained attention to energy issues is undercutting U.S. foreign policy and national security.
Williams argues that the status quo for peace operations in untenable and that greater U.S. involvement is necessary to enhance the quality and success of peacekeeping missions.
The authors argue that the United States has responded inadequately to the rise of Chinese power and recommend placing less strategic emphasis on the goal of integrating China into the international system and more on balancing China's rise.
Campbell evaluates the implications of the Boko Haram insurgency and recommends that the United States support Nigerian efforts to address the drivers of Boko Haram, such as poverty and corruption, and to foster stronger ties with Nigerian civil society.
In The Hacked World Order, CFR Senior Fellow Adam Segal shows how governments use the web to wage war and spy on, coerce, and damage each other. More
Red Team provides an in-depth investigation into the work of red teams, revealing the best practices, most common pitfalls, and most effective applications of these modern-day devil's advocates. More
Through insightful analysis and engaging graphics, How America Stacks Up explores how the United States can keep pace with global economic competition. More
Learn more about CFR’s mission and its work over the past year in the 2015 Annual Report. The Annual Report spotlights new initiatives, high-profile events, and authoritative scholarship from CFR experts, and includes a message from CFR President Richard N. Haass.
Read and download »