Hackers have attacked America's defense establishment, as well as companies from Google to Morgan Stanley to security giant RSA, and fingers point to China as the culprit. Michael Joseph Gross gets an exclusive look at the raging cyber-war--Operation Aurora! Operation Shady rat!--and explains why Washington has been slow to fight back.
Eric Beidel and Stew Magnuson of National Defense present cyber threats as the cutting edge in asymmetric warfare, and highlight the risks entailed by the U.S. military's dearth of cybersecurity expertise.
William McCants of Foreign Policy argues that the levelling power of internet search technology has provided a new mass platform for violence - and that Google has failed to seize upon the opportunity to curb it.
"The deeper problem with the nothing-to-hide argument is that it myopically views privacy as a form of secrecy. In contrast, understanding privacy as a plurality of related issues demonstrates that the disclosure of bad things is just one among many difficulties caused by government security measures. To return to my discussion of literary metaphors, the problems are not just Orwellian but Kafkaesque. Government information-gathering programs are problematic even if no information that people want to hide is uncovered."
How well prepared are IT professionals within U.S. government agencies to respond to foreign cyber threats? Will government initiatives, such as the Comprehensive National Cybersecurity Initiative and the creation of the U.S. National Cybersecurity Coordinator role, be effective in addressing the challenges facing U.S. critical IT infrastructure? What is the impact of compliance on security within the federal IT environment?
The Center for Strategy and Technology suggests that the Air Force continue to anticipate and develop countermeasures to emerging threats in order to proactively protect and dominate the cyberspace domain of the future.
The Internet and its communications infrastructure serve as the critical backbone of information exchange that is vital to U.S. security, says the U.S. Business Roundtable in this report. Yet the United States is not sufficiently prepared for a major attack, software incident or natural disaster that would lead to disruption of large parts of the Internet.
"For the last fiftyyears, Washington has assumed the scientific dominance of the US. This assumption is now in question as scientific capabilities become more widely distributed," especially to China, writes Adam Segal.
In preparation for President Xi Jinping and President Barack Obama's meeting in California on June 7-9, Adam Segal writes, "The presidents won't come to any agreements next week, but over the course of the two days, they should try and dispel the growing mistrust by explaining their national interests and intentions in cyberspace."
Blake Clayton argues that cyber attacks on oil and gas operations are the new face of energy insecurity, with vast potential for crippling effects on global energy prices and nations far beyond the Middle East.
This report argues that the lack of sustained attention to energy issues is undercutting U.S. foreign policy and national security.
CFR Experts Guide
The Council on Foreign Relations' David Rockefeller Studies Program—CFR's "think tank"—is home to more than seventy full-time, adjunct, and visiting scholars and practitioners (called "fellows"). Their expertise covers the world's major regions as well as the critical issues shaping today's global agenda. Download the printable CFR Experts Guide.
The author examines Pakistan's complex role in U.S. foreign policy and advocates for a two-pronged approach that works to quarantine threats while integrating Pakistan into the broader U.S. agenda in Asia.