Richard A. Falkenrath discusses how the modern American police department must balance its information technology needs--including cloud computing services--against the unique legal framework within which it operates.
Adam Segal and Matthew C. Waxman discuss the London Conference on Cyberspace and argue that progress toward a vision of cybersecurity and freedom will be incremental and achieved through multiple arrangements between state and private actors rather than through a global accord.
Adam Segal argues that while Washington must engage Beijing in discussions about the rules of the road of cyberspace, more important will be efforts to work with allies and close friends in defining international norms of behavior.
Policymakers around the world are increasingly concerned about the security of information and communications technology (ICT) supply chains. Danielle Kriz explains how the U.S. government can defend its ICT supply chains against counterfeit products, malicious code, and cyberattacks.
As offensive cyber activity becomes more prevalent, policymakers will be challenged to develop proportionate responses to disruptive or destructive attacks. Tobias Feakin outlines the variables that each state should consider in determining the appropriate response to a state-sponsored cyber incident.
The use of social media and other Internet-enabled communications by the self-proclaimed Islamic State is pushing the United States and other democracies to react to the abuse of liberal freedoms by illiberal forces. CFR Visiting Fellow David P. Fidler outlines ways to counter the Islamic State's online onslaught through policies anchored in free speech, transparency, and accountability.
U.S. efforts to promote its preferred norms for cyberspace—Internet openness, security, and free speech—suffered a significant setback in the summer of 2013 with the Snowden disclosures. Henry Farrell identifies three steps the United States can take to reinvigorate its norm-promotion efforts.
CFR Senior Fellow Adam Segal argues that the United States should shape rules for the virtual world through informal multilateralism rather than formal negotiations, reaching out to allies and other powers, as well as private corporations and nongovernmental organizations.
This bill would require websites and technology firms to share user information with the government if the government wants the information to response to a cyber threat. Critics of the bill say it is similar to Cyber Intelligence Sharing and Protection Act (CISPA), which did not pass the Senate two years ago.
National People's Congress of China released this draft text on July 6, 2015, and it will be available for public comment through August 2015. The law outlines the Chinese government's goals for security standards for technical systems, networks, and user data. It requires companies with operations in China to comply with government requests for regulating and restricting technology use. See also the broader National Security Law passed on July 1, 2015.
The first Department of Defense strategy report on cyberspace was released on July 14, 2011 and an update to the strategy was released April 23, 2015. The strategy outlines the three missions in the cyber domain: to defend Department of Defense networks, systems, and information; to defend the U.S. homeland and U.S. national interests against cyberattacks of significant consequence; and to provide integrated cyber capabilities to support military operations and contingency plans.
President Obama spoke at the White House Summit on Cybersecurity and Consumer Protection at Stanford on February 13, 2015. He announced a new executive order for private and government sectors to better share information about cyber threats.
This press release previews the Obama administration's proposed legislation on cybersecurity issues, including increasing information sharing between agencies, modernizing law enforcement capabilities to address cybercrime, improving consumer protection online, and funding cybersecurity information at historically black colleges.
The authors argue that the United States has responded inadequately to the rise of Chinese power and recommend placing less strategic emphasis on the goal of integrating China into the international system and more on balancing China's rise.
Campbell evaluates the implications of the Boko Haram insurgency and recommends that the United States support Nigerian efforts to address the drivers of Boko Haram, such as poverty and corruption, and to foster stronger ties with Nigerian civil society.
Learn more about CFR’s mission and its work over the past year in the 2015 Annual Report. The Annual Report spotlights new initiatives, high-profile events, and authoritative scholarship from CFR experts, and includes a message from CFR President Richard N. Haass. Read and download »