Now that the U.S. government is no longer responsible for the IANA functions, the United States needs to take action to maintain its influence on internet governance.
To reduce the risk of attack, the U.S. government should create incentives for individuals, companies, and governments to find and patch software vulnerabilities.
The flow of data across international borders creates jurisdictional challenges and causes international tensions. Increasingly, countries have responded by imposing new requirements to store data locally, threatening cross-border data flows, which generate approximately $2.8 trillion of global gross domestic product each year. CFR Senior Fellow for Digital Policy Karen Kornbluh argues that the United States should take the lead in addressing these tensions.
The U.S. government's effort to persuade other countries to adopt norms of responsibility for cyberspace faces a significant obstacle: computers located in the United States host much of the malicious software used to carry out cyberattacks. Robert K. Knake explains.
The use of social media and other Internet-enabled communications by the self-proclaimed Islamic State is pushing the United States and other democracies to react to the abuse of liberal freedoms by illiberal forces. CFR Visiting Fellow David P. Fidler outlines ways to counter the Islamic State's online onslaught through policies anchored in free speech, transparency, and accountability.
Samir Saran explains India's position in advance of the 2014 ITU conference, arguing that India believes that the ITU has a role to play in Internet governance, although Delhi does not oppose a multistakeholder approach.
Christian Schaller and Johannes Thimm analyze Germany's policy priorities at the ITU conference in Busan, South Korea, arguing that Germany will go to Busan opposed to the expansion of the ITU mandate, but in search of ways to increase the ITU's technical capabilities to broaden access.
Adam Segal explains the U.S. approach at the ITU Plenipotentiary Conference in Busan, South Korea, where the United States is looking to defend its approach to Internet governance. Washington and its allies favor the "multistakeholder" model: a bottom-up policy process that includes organizations representing technical experts, governments, businesses, civil society, and individual users.
CFR's Adam Segal says the showdown between Google and the Chinese government could result in a world of separate regional Internets and comes at a difficult time in U.S.-China relations.
Xiao Qiang, an expert on China, says a digital revolution alone will not bring leadership change in Beijing but it could, in the long run, lead to a less repressive government in the country.
Dan Southerland, executive editor at Radio Free Asia, talks about Chinese bloggers and “online muckrakers” breaking stories in China.
Economist technology writer Kenneth Neil Cukier discusses issues he raised in a 2005 Foreign Affairs article about control of the Internet. At present the United States holds the most power, but other nations are clamoring to have a say.
The second World Internet Conference (WIC) was held in Wuzhen, China, from December 16-18, 2015. The theme for the conference was "An Interconnected World Shared and Governed by All: Building a Community of Common Future in Cyberspace" and conference leaders proposed the Wuzhen Initiative as a continuation of the work of the World Summit on the Information Society (WSIS).
UN General Assembly Resolution 56/183 in December 2001 endorsed the World Summit on the Information Society (WSIS), which encourages global discussions on how to benefit from the digital revolution while addressing the digital divide. The International Telecommunication Union hosted two phases in Geneva from December 10 to 12, 2003, and in Tunis from November 16 to 18, 2005. From February 25 to 27, 2013, WSIS participants met in Paris to evaluate progress and goals. In December 2015, the UN produced a draft resolution on the outcome of the WSIS from the past ten years and renewed the Internet Governance Forum (IGF) for another ten years.
The United Nations Group of Governmental Experts (GGE) released this consensus report (A/70/172) on rules of behavior in cyberspace, particularly during peacetime. The report recommends that nations should not use information and communication technologies to attack critical infrastructure or interrupt the information systems of emergency services.
National People's Congress of China released this draft text on July 6, 2015, and it will be available for public comment through August 2015. The law outlines the Chinese government's goals for security standards for technical systems, networks, and user data. It requires companies with operations in China to comply with government requests for regulating and restricting technology use. See also the broader National Security Law passed on July 1, 2015.
Federal Communications Commission (FCC) voted on February 26, 2015, on rules governing regulation of U.S. broadband networks. The FCC published rules (FCC 15-24) regulating this order on March 12, 2015. The rules ban the ability of broadband companies to prioritize traffic from sources that pay more and reclassify broadband as a telecommunications service, subject to regulation under Title II of the Communications Act. The FCC news release states that the rules are focused on making networks "fast, fair, and open."
On November 26, 2014, the European Union adopted guidelines for search engines to use when deciding whether to remove, upon request, specific articles from search results for a person's name, in accordance with EU data privacy laws. These privacy laws are also referred to as "the right to be forgotten," for citizens to request that searches for their names not surface particular results.
Congressional Representatives Raúl Grijalva and Keith Ellison sent a letter to Federal Communications Commission Chair Tom Wheeler, before a May 15, 2014 FCC meeting to propose new Internet speed and pricing policies. The cosigners of the letter support preservation of Net Neutrality and equal access to the Internet, to prevent companies from paying higher fees to Internet service providers and in turn having their online content favored. The FCC voted on February 26, 2015, on rules governing regulation of U.S. broadband networks.
Knopf argues that the only remaining path for South Sudan is for an international transitional administration to run the country for a finite period.
The U.S. relationship with Israel is in trouble. Blackwill and Gordon offer six core policy proposals to repair, redefine, and invigorate the partnership.
To ensure the success of Myanmar's historic democratic transition, the United States should revise its outdated and counterproductive sanctions policy.
The definitive account of the secret war in Laos, which forever changed the CIA from a relatively small spying agency into an organization with vast paramilitary powers. More
CFR President Haass argues for an updated global operating system to address challenges from terrorism to climate change. More
Alden provides an enlightening history of the last four decades of U.S. trade policies and a blueprint for how to keep the United States competitive in a globalized economy. More
Learn more about CFR’s mission and its work over the past year in the 2016 Annual Report. The Annual Report spotlights new initiatives, high-profile events, and authoritative scholarship from CFR experts, and includes a message from CFR President Richard N. Haass.
Read and download »