The Council on Foreign Relations (CFR) has launched Net Politics, a blog on cybersecurity, Internet governance, digital trade, and privacy. It will provide original insight, highlight notable research and analysis, and introduce new voices on the emerging politics of cyberspace.
Cyberspace is a largely ungoverned domain with a growing threat of disruptive acts. In the absence of a cyber regulatory regime, the United States must strengthen deterrence and bolster its resilience, writes CFR President Richard N. Haass.
Over the course of the next four years, President Donald Trump’s administration will likely have to contend with Russian influence operations, Chinese cyber espionage, Iranian subterfuge, fights over appropriate use of encryption, data localization, and attracting technical talent to protect U.S. networks. Successfully meeting these challenges will require policy changes and deft maneuvering, write CFR's Alex Grigsby and Adam Segal.
Last week’s rollout of new sanctions against Russia by the Obama administration answered many questions about Moscow’s alleged hacking activities. But it didn’t address one crucial question, writes Stephen Sestanovich.
Our democracy is under attack by Russia, but almost no one is treating the situation with the gravity it deserves. President Obama is loathe to retaliate. Would-be president Donald Trump denies that any attack is happening. And the media are acting as enablers for the attackers.
Since the 1990s, U.S. law enforcement has expressed concern about “going dark,” roughly defined as an inability to access encrypted communications or data even with a court order. Silicon Valley companies are rolling out encrypted products that allow users alone to access their data, and in the wake of the Paris and San Bernardino, Calif., terrorist attacks, law enforcement officials argue that their fears are being realized.
Hackers are often mistakenly portrayed in popular culture as inarticulate geeks donning hoodies or ninja suits. However, the opposite is true, and policymakers in Washington could benefit from a deeper understanding of who hackers are and what they have to offer.
Writing in Foreign Policy, Emerson Brooking argues that, given ISIS’ strategically significant use of social media for recruiting and messaging, any comprehensive plan to defeat the terror network must also neutralize its online presence. He proposes the creation of a bounty system that would pay hacktivists in anonymized Bitcoin to flag ISIS social media accounts and disrupt its websites.
While Sony may have dominated the news toward the end of 2014, three major cyberattacks against U.S. companies shook the corporate world earlier this year: Target opened the year by announcing in January that hackers had stolen personal information from an estimated 110 million accounts; hackers accessed approximately 83 million J.P. Morgan Chase accounts in August; and Home Depot confirmed that its payment system was breached in September, compromising an estimated 56 million accounts. Here’s a look back at the details of each of those attacks, and how they affected the conversation about cybersecurity in the United States and the corporate sector.
The free flow of information across borders is essential for the modern economy, but a growing number of countries have erected restrictions curtailing a free and open Internet. Karen Kornbluh discusses what diplomatic and policy steps the United States can take to safeguard the free flow of information worldwide.
"For the last fifty years, Washington has assumed the scientific dominance of the US. This assumption is now in question as scientific capabilities become more widely distributed," especially to China, writes Adam Segal.
Learn more about CFR’s mission and its work over the past year in the 2016 Annual Report. The Annual Report spotlights new initiatives, high-profile events, and authoritative scholarship from CFR experts, and includes a message from CFR President Richard N. Haass. Read and download »