Adam Segal says the recent Chinese cyberattacks on Bloomberg and the New York Timeshighlights both the willingness of Beijing to shape the narrative about China, as well as the vulnerability the top leadership feels about how they are portrayed.
Blake Clayton argues that cyber attacks on oil and gas operations are the new face of energy insecurity, with vast potential for crippling effects on global energy prices and nations far beyond the Middle East.
Richard A. Falkenrath and Paul Rosenzweig argue that encryption-based technology is a better way to secure governmental data than mandates that keep information within geographical boundaries.
Harold Koh, Legal Advisor at the U.S. Department of State, gave these remarks at the USCYBERCOM Inter-Agency Legal Conference in Maryland on September 18, 2012.
Post-9/11 U.S. counterterrorism and surrounding civil liberties issues are unlikely to stray far from currently policy no matter who is in the White House in 2013, says CFR's Matthew Waxman.
With incidence of severe cybersecurity breaches increasing, govenment and business leaders are forced to re-evaluate control computer systems and heighten defences against hackers, writes Robert O'Harrow Jr. in the Washington Post.
Government and business leaders in the United States and around the world are rushing to build better defenses -- and to prepare for the coming battles in the digital universe, writes Robert O'Harrow Jr. at the Washington Post. To succeed, they must understand one of the most complex, man-made environments on Earth: cyberspace.
The Additional Protocol to the Council of Europe's Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through computer systems, was adopted in Strasbourg, France on January 28, 2003.
This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats.
Richard Clarke, former special adviser to the president for cybersecurity, says the proposed cybersecurity bill would not do much to stop Chinese cyber espionage. He suggests that the Obama administration act to stop the threat.
The White House released this multinational statement on nuclear information security on March 27, 2012 during the U.S.' participation in the nuclear security summit in Seoul, South Korea.
The Cybersecurity Act of 2012 (S. 2105) was introduced by Senator Joseph Lieberman in the U.S. Senate on February 14, 2012.
The summary states, "Directs the Secretary of Homeland Security (DHS), in consultation with owners and operators of critical infrastructure, the Critical Infrastructure Partnership Advisory Council, and other federal agencies and private sector entities, to: (1) to conduct a top-level assessment of cybersecurity risks to determine which sectors face the greatest immediate risk, and beginning with the sectors identified as having the highest priority, conduct, on a sector-by-sector basis, cyber risk assessments of the critical infrastructure; (2) establish a procedure for the designation of critical infrastructure; (3) identify or develop risk-based cybersecurity performance requirements; and (4) implement cyber response and restoration plans. Sets forth requirements for securing critical infrastructure, including notification of cyber risks and threats and reporting of significant cyber incidents affecting critical infrastructure."
In March 2011, the U.S. computer security company RSA announced that hackers had gained access to security tokens it produces that let millions of government and private-sector employees, including those of defense contractors such as Lockheed Martin, connect remotely to their office computers.
The Council on Foreign Relations' David Rockefeller Studies Program—CFR's "think tank"—is home to more than seventy full-time, adjunct, and visiting scholars and practitioners (called "fellows"). Their expertise covers the world's major regions as well as the critical issues shaping today's global agenda. Download the printable CFR Experts Guide.
The author analyzes the potentially serious consequences, both at home and abroad, of a lightly overseen drone program and makes recommendations for improving its governance.