Harold Koh, Legal Advisor at the U.S. Department of State, gave these remarks at the USCYBERCOM Inter-Agency Legal Conference in Maryland on September 18, 2012.
Published in December 2011 and amended in August 2012, the Department of Homeland Security proposed a framework for ethical guidelines for computer and information security research. The framework was informed by the three principles of the 1979 Belmont Report for ethical research in the biomedical and behavioral sciences, Respect for Persons, Beneficence, and Justice. The Menlo Report adds the principle Respect for Law and Public Interest.
Adam Segal discusses the Cybersecurity Act, China, and technology innovation in an interview with Evan Osnos.
President Barack Obama published this article on cybersecurity in the Wall Street Journal on July 19, 2012.
With incidence of severe cybersecurity breaches increasing, govenment and business leaders are forced to re-evaluate control computer systems and heighten defences against hackers, writes Robert O'Harrow Jr. in the Washington Post.
Government and business leaders in the United States and around the world are rushing to build better defenses -- and to prepare for the coming battles in the digital universe, writes Robert O'Harrow Jr. at the Washington Post. To succeed, they must understand one of the most complex, man-made environments on Earth: cyberspace.
The UN Economic and Social Council (ECOSOC) Draft Resolution 20/7: Promotion of Activities Relating to Combating Cybercrime, Including Technical Assistance and Capacity-building was adopted in April 2011.
See more in Cybersecurity
This Congressional Research Service report compiles hearings, legislation, data, and other reports on cybersecurity.
Adam Segal says that rather than just defacing websites, Anonymous should target five specific Chinese websites to obtain real secrets.
This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats.
Richard Clarke, former special adviser to the president for cybersecurity, says the proposed cybersecurity bill would not do much to stop Chinese cyber espionage. He suggests that the Obama administration act to stop the threat.
UN General Assembly Resolution 57/239 regarding the "creation of a global culture of cybersecurity" was adopted on January 31, 2003.
Foreign Policy's Thomas Rid writes that we shouldn't fear the digital bogeyman--virtual conflict is still more hype than reality.
The Cybersecurity Act of 2012 (S. 2105) was introduced by Senator Joseph Lieberman in the U.S. Senate on February 14, 2012.
The summary states, "Directs the Secretary of Homeland Security (DHS), in consultation with owners and operators of critical infrastructure, the Critical Infrastructure Partnership Advisory Council, and other federal agencies and private sector entities, to: (1) to conduct a top-level assessment of cybersecurity risks to determine which sectors face the greatest immediate risk, and beginning with the sectors identified as having the highest priority, conduct, on a sector-by-sector basis, cyber risk assessments of the critical infrastructure; (2) establish a procedure for the designation of critical infrastructure; (3) identify or develop risk-based cybersecurity performance requirements; and (4) implement cyber response and restoration plans. Sets forth requirements for securing critical infrastructure, including notification of cyber risks and threats and reporting of significant cyber incidents affecting critical infrastructure."
In March 2011, the U.S. computer security company RSA announced that hackers had gained access to security tokens it produces that let millions of government and private-sector employees, including those of defense contractors such as Lockheed Martin, connect remotely to their office computers.
Most critical information systems in the United States are operated by the private sector and remain vulnerable to cyber attacks. Newly proposed legislation would require businesses to meet minimum standards of protection, but has raised concerns about regulatory overreach.
The Congressional Research Service reports that for more than a decade, various experts have expressed increasing concerns about cybersecurity in light of the growing frequency, impact, and sophistication of attacks on information systems in the United States and abroad. Consensus has also been building that the current legislative framework for cybersecurity might need to be revised.
Adam Segal says Chinese hacking is not going away soon, and with no international consensus on cyber standards, companies need to do a better job of protecting intellectual property and trade secrets.
This report argues that the lack of sustained attention to energy issues is undercutting U.S. foreign policy and national security.
To ensure the success of Myanmar's historic democratic transition, the United States should revise its outdated and counterproductive sanctions policy.
Blackwill and Campbell analyze the rise of Chinese President Xi Jinping and call for a new American grand strategy for Asia.
Williams argues that greater U.S. involvement is necessary to enhance the quality and success of peacekeeping missions.
Kurlantzick offers the sharpest analysis yet of what state capitalism’s emergence means for democratic politics around the world. More
In a cogent analysis of why the United States is losing ground as a world power, Blackwill and Harris explore the statecraft of geoeconomics. More
Takeyh and Simon reframe the legacy of U.S. involvement in the Arab world from 1945 to 1991 and shed new light on the makings of the contemporary Middle East. More
Learn more about CFR’s mission and its work over the past year in the 2015 Annual Report. The Annual Report spotlights new initiatives, high-profile events, and authoritative scholarship from CFR experts, and includes a message from CFR President Richard N. Haass.
Read and download »