Defending a New Domain by William J. Lynn III
Internet Governance in an Age of Cyber Insecurity by Robert K. Knake
Google's Lesson: Innovation Has to Be Accompanied by Reliability
by Robert K. Knake and Adam Segal
The recently released Annual Threat Assessment warned of cyberattacks and attacks by al-Qaeda, but that doesn't mean al-Qaeda is capable of cyberterrorism, says CFR's Robert K. Knake.
Google's decision to end censorship of its search content in China, and Beijing's response, appear to strike a balance between holding to principles and doing business, but U.S.-China clouds continue to gather, writes CFR's Adam Segal.
The U.S. government needs to marshal its cybersecurity resources in support of the private sector and build alliances with international partners, says former CIA director Michael Hayden, member of a new CFR independent task force on digital policy.
The steady theft of U.S. intellectual property by foreign cyberattackers could mean decreased economic growth, reduced competitiveness, and loss of jobs, says McAfee cybersecurity expert Dmitri Alperovitch.
The Pentagon's new strategy for operating in cyberspace breaks little ground and offers few specifics, says CFR's Adam Segal. While the last six months have been busy for U.S. cybersecurity policy, he cautions that "speed is not a measure of efficacy."
See more in Cybersecurity
Reports of Predator drones' data losses in Iraq and Afghanistan should serve as a call to action to upgrade U.S. cybersecurity capabilities, says analyst James Lewis.
The U.S. Air Force is standing up a dedicated command to coordinate offensive and defensive cyber strategy within the Pentagon.
What CFR.org Editors are reading the week of June 1–5, 2015.
"APT1 is a single organization of operators that has conducted a cyber espionage campaign against a broad range of victims since at least 2006. From our observations, it is one of the most prolific cyber espionage groups in terms of the sheer quantity of information stolen."
With incidence of severe cybersecurity breaches increasing, govenment and business leaders are forced to re-evaluate control computer systems and heighten defences against hackers, writes Robert O'Harrow Jr. in the Washington Post.
Government and business leaders in the United States and around the world are rushing to build better defenses -- and to prepare for the coming battles in the digital universe, writes Robert O'Harrow Jr. at the Washington Post. To succeed, they must understand one of the most complex, man-made environments on Earth: cyberspace.
This Congressional Research Service report compiles hearings, legislation, data, and other reports on cybersecurity.
This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats.
Richard Clarke, former special adviser to the president for cybersecurity, says the proposed cybersecurity bill would not do much to stop Chinese cyber espionage. He suggests that the Obama administration act to stop the threat.
Foreign Policy's Thomas Rid writes that we shouldn't fear the digital bogeyman--virtual conflict is still more hype than reality.
The Congressional Research Service reports that for more than a decade, various experts have expressed increasing concerns about cybersecurity in light of the growing frequency, impact, and sophistication of attacks on information systems in the United States and abroad. Consensus has also been building that the current legislative framework for cybersecurity might need to be revised.
Smart grids might revolutionize energy use and delivery, but there are associated security risks, particularly regarding communications technology.
Cyber espionage has become a critical aspect of Chinese economic growth, write Michael Riley and John Walcott.
This report argues that the lack of sustained attention to energy issues is undercutting U.S. foreign policy and national security.
Marten outlines how U.S. policymakers can deter Russian aggression with robust support for NATO, while reassuring Russia of NATO’s defensive intentions.
Segal offers recommendations for cooperation on issues such as encryption, data localization, and cybersecurity.
Knopf argues that the only remaining path for South Sudan is for an international transitional administration to run the country for a finite period.
The definitive account of the secret war in Laos, which forever changed the CIA from a relatively small spying agency into an organization with vast paramilitary powers. More
CFR President Haass argues for an updated global operating system to address challenges from terrorism to climate change. More
Alden provides an enlightening history of the last four decades of U.S. trade policies and a blueprint for how to keep the United States competitive in a globalized economy. More
Learn more about CFR’s mission and its work over the past year in the 2016 Annual Report. The Annual Report spotlights new initiatives, high-profile events, and authoritative scholarship from CFR experts, and includes a message from CFR President Richard N. Haass.
Read and download »