FP: Think Again: Cyberwar
Foreign Policy's Thomas Rid writes that we shouldn't fear the digital bogeyman--virtual conflict is still more hype than reality.
See more in United States, Cybersecurity
Foreign Policy's Thomas Rid writes that we shouldn't fear the digital bogeyman--virtual conflict is still more hype than reality.
See more in United States, Cybersecurity
How can the United States protect "cyberspace as a national asset," without restricting "the free and open nature of the Internet"? What should countries consider when developing international cybersecurity standards and protocol? What should their citizens know to protect their information and their rights? Cybersecurity Policy Research Links provide news, background information, legislation, analysis, and international efforts to protect government and the public's information.
See more in Cybersecurity
The Cybersecurity Act of 2012 (S. 2105) was introduced by Senator Joseph Lieberman in the U.S. Senate on February 14, 2012.
The summary states, "Directs the Secretary of Homeland Security (DHS), in consultation with owners and operators of critical infrastructure, the Critical Infrastructure Partnership Advisory Council, and other federal agencies and private sector entities, to: (1) to conduct a top-level assessment of cybersecurity risks to determine which sectors face the greatest immediate risk, and beginning with the sectors identified as having the highest priority, conduct, on a sector-by-sector basis, cyber risk assessments of the critical infrastructure; (2) establish a procedure for the designation of critical infrastructure; (3) identify or develop risk-based cybersecurity performance requirements; and (4) implement cyber response and restoration plans. Sets forth requirements for securing critical infrastructure, including notification of cyber risks and threats and reporting of significant cyber incidents affecting critical infrastructure."
See more in United States, Cybersecurity
In March 2011, the U.S. computer security company RSA announced that hackers had gained access to security tokens it produces that let millions of government and private-sector employees, including those of defense contractors such as Lockheed Martin, connect remotely to their office computers.
See more in China, Cybersecurity, Information and Communication
Most critical information systems in the United States are operated by the private sector and remain vulnerable to cyber attacks. Newly proposed legislation would require businesses to meet minimum standards of protection, but has raised concerns about regulatory overreach.
See more in United States, Cybersecurity
The Congressional Research Service reports that for more than a decade, various experts have expressed increasing concerns about cybersecurity in light of the growing frequency, impact, and sophistication of attacks on information systems in the United States and abroad. Consensus has also been building that the current legislative framework for cybersecurity might need to be revised.
See more in United States, Cybersecurity
The Congressional Research Service looks at some of issues surrounding America's critical infrastructure, identifying critical assets, assessing vulnerabilities and risks, and appraising policies.
See more in United States, Cybersecurity, Homeland Security
Adam Segal says Chinese hacking is not going away soon, and with no international consensus on cyber standards, companies need to do a better job of protecting intellectual property and trade secrets.
See more in China, Cybersecurity
Richard A. Falkenrath says changes to national privacy law are essential to protect personal privacy in the age of pervasive social media and cloud computing--and Google's new privacy policy points even more firmly to the need for a right to be forgotten.
See more in Cybersecurity, Telecommunications, Information and Communication, Counterterrorism
The Department of Homeland Security national strategy on cybersecurity, "Blueprint for a Secure Cyber Future", was released in November 2011.
See more in United States, Cybersecurity
The foreward of this National Science and Technology Council strategy document, written by John P. Holdren (Assistant to the President for Science and Technology and Director, Office of Science and Technology Policy) states,
"This report, Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program was developed by the NITRD agencies and directly responds to the need for a new cybersecurity R&D strategy. As recommended in the CyberspacePolicy Review's near-term action plan, Trustworthy Cyberspace replaces the piecemeal approaches of the past with a set of coordinated research priorities whose promise is to "change the game," resulting in a trustworthy cyberspace. As called for in the policy review's mid-term action plan, this plan identifies opportunities to engage the private sector in activities for transitioning promising R&D into practice. In addition, and consistent with the PCAST recommendations, it prioritizes the development of a "science of security" to derive first principles and the fundamental building blocks of security and trustworthiness.
I am pleased to commend this Federal cybersecurity R&D strategic plan as part of the Administration's comprehensive effort to secure the future of the Nation's digital infrastructure."
See more in United States, Cybersecurity
Cyber espionage has become a critical aspect of Chinese economic growth, write Michael Riley and John Walcott.
See more in China, Cybersecurity
Richard A. Falkenrath discusses how the modern American police department must balance its information technology needs--including cloud computing services--against the unique legal framework within which it operates.
See more in Defense/Homeland Security, Cybersecurity, Information and Communication
British Foreign Secretary William Hague gave these remarks at the London Conference on Cyberspace on November 2, 2011.
See more in Cybersecurity
Adam Segal and Matthew C. Waxman discuss the London Conference on Cyberspace and argue that progress toward a vision of cybersecurity and freedom will be incremental and achieved through multiple arrangements between state and private actors rather than through a global accord.
See more in Cybersecurity
Paul Twomey, chief executive officer of Argo Pacific, discusses the challenges posed by the present state of global cyber instability for governance at both the corporate and international levels.
This event is made possible in partnership with the Atlantic Council and the Cyber Conflict Studies Association.
See more in United States, Cybersecurity, Global Governance
Paul Twomey, chief executive officer of Argo Pacific, discusses the challenges posed by the present state of global cyber instability for governance at both the corporate and international levels.
This event is made possible in partnership with the Atlantic Council and the Cyber Conflict Studies Association.
See more in United States, Cybersecurity, Global Governance
Paul Twomey, former president and CEO of the Internet Corporation for Assigned Names and Numbers (ICANN), discusses the challenges posed by the present state of global cyber instability for governance at both the corporate and internatinoal levels.
See more in Cybersecurity, Terrorism and Technology
The steady theft of U.S. intellectual property by foreign cyberattackers could mean decreased economic growth, reduced competitiveness, and loss of jobs, says McAfee cybersecurity expert Dmitri Alperovitch.
See more in United States, Cybersecurity, Economics
Hackers have attacked America's defense establishment, as well as companies from Google to Morgan Stanley to security giant RSA, and fingers point to China as the culprit. Michael Joseph Gross gets an exclusive look at the raging cyber-war--Operation Aurora! Operation Shady rat!--and explains why Washington has been slow to fight back.
See more in United States, China, Cybersecurity
What effect would the fall of the Assad regime have on U.S. policy towards Syria?
Reforming U.S. Drone Strike Policies
The author analyzes the potentially serious consequences, both at home and abroad, of a lightly overseen drone program and makes recommendations for improving its governance.
The Battle of Bretton Woods
The remarkable story of how the blueprint for the postwar economic order was drawn. More
Invisible Armies
A complete global history of guerrilla uprisings through the ages. More
Tested by Zion
The full insider account of the Bush administration and the Israeli-Palestinian conflict. More