This report argues that while the Republic of Yemen substantially filters material on topics related to sex, sexuality and gambling, the state does not try to control broadly what its citizens see on the Internet. For instance, unlike certain other states that filter Internet content, Yemen does not block political content and its blocking of religious content is limited, focusing only on a small number of anti-Islam sites.
“While it should continue to promote and espouse the virtues of an open, global, and secure Internet, the United States must prepare for a more likely future—a highly contested, nationally divided cyberspace,” writes Adam Segal, director of the digital and cyberspace policy program at the Council on Foreign Relations, in his new book, The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age.
The number of "state-backed operations continues to rise, and future attacks will become more sophisticated and disruptive," argues the new Task Force report, Defending an Open, Global, Secure, and Resilient Internet.
Following the revelation of USAID's deployment of a secret Twitter-inspired communications platform in Cuba, Julia Sweig reflects, in her column, on U.S.-Cuba relations and on the loose definition of democracy-promotion in foreign policy.
On the internet's 25th anniversary, Eric Schmidt and Jared Cohen explain the challenges of ending internet censorship.
Matthew Waxman discusses the new CFR Task Force Report, Defending an Open, Global, Secure, and Resilient Internet.
Jared Cohen and Eric Schmidt discuss potential future Internet censorship and security scenarios.
Joshua Kurlantzick and Elizabeth Leader discuss how the newest threats to expression and access on the Internet are not coming from authoritarian states, but instead from somewhere more surprising: electoral democracies like Thailand, Turkey, and South Korea.
Jerome A. Cohen states, "The Chinese government's current suppression of rising internet protests against its barbaric abuse of the blind 'barefoot lawyer' Chen Guangcheng raises fundamental questions about the impact of legal reforms on real life in China."
The impact of the standoff between Google and China, argue Adam Segal and Robert K. Knake, may have less to do with censorship and more to do with the nature of technological development.
Adam Segal argues that while, "China's cyberaggression doesn't mean that the United States should stop all attempts at engagement," the goal of an open and transparent Web may not be realistic.
The U.S. government's effort to persuade other countries to adopt norms of responsibility for cyberspace faces a significant obstacle: computers located in the United States host much of the malicious software used to carry out cyberattacks. Robert K. Knake explains.
The use of social media and other Internet-enabled communications by the self-proclaimed Islamic State is pushing the United States and other democracies to react to the abuse of liberal freedoms by illiberal forces. CFR Visiting Fellow David P. Fidler outlines ways to counter the Islamic State's online onslaught through policies anchored in free speech, transparency, and accountability.
Samir Saran explains India's position in advance of the 2014 ITU conference, arguing that India believes that the ITU has a role to play in Internet governance, although Delhi does not oppose a multistakeholder approach.
Christian Schaller and Johannes Thimm analyze Germany's policy priorities at the ITU conference in Busan, South Korea, arguing that Germany will go to Busan opposed to the expansion of the ITU mandate, but in search of ways to increase the ITU's technical capabilities to broaden access.
Adam Segal explains the U.S. approach at the ITU Plenipotentiary Conference in Busan, South Korea, where the United States is looking to defend its approach to Internet governance. Washington and its allies favor the "multistakeholder" model: a bottom-up policy process that includes organizations representing technical experts, governments, businesses, civil society, and individual users.
CFR's Adam Segal says the showdown between Google and the Chinese government could result in a world of separate regional Internets and comes at a difficult time in U.S.-China relations.
Williams argues that the status quo for peace operations in untenable and that greater U.S. involvement is necessary to enhance the quality and success of peacekeeping missions.
The authors argue that the United States has responded inadequately to the rise of Chinese power and recommend placing less strategic emphasis on the goal of integrating China into the international system and more on balancing China's rise.
Campbell evaluates the implications of the Boko Haram insurgency and recommends that the United States support Nigerian efforts to address the drivers of Boko Haram, such as poverty and corruption, and to foster stronger ties with Nigerian civil society.
In The Hacked World Order, CFR Senior Fellow Adam Segal shows how governments use the web to wage war and spy on, coerce, and damage each other. More
Red Team provides an in-depth investigation into the work of red teams, revealing the best practices, most common pitfalls, and most effective applications of these modern-day devil's advocates. More
Through insightful analysis and engaging graphics, How America Stacks Up explores how the United States can keep pace with global economic competition. More
Learn more about CFR’s mission and its work over the past year in the 2015 Annual Report. The Annual Report spotlights new initiatives, high-profile events, and authoritative scholarship from CFR experts, and includes a message from CFR President Richard N. Haass.
Read and download »