Beginning with the Stuxnet virus launched by the US at an Iranian nuclear facility in 2010 and continuing through to the most recent Sony hacking scandal, A Hacked World Order exposes how the internet has ushered in a new era of geopolitical maneuvering and reveals the tremendous and terrifying implications for our economic livelihood, security, and personal identity.
On November 4, 2015, the Council on Foreign Relations held symposium bringing together leading policymakers and experts to address the state of cybersecurity in the United States and abroad. The discussion covered U.S. legislation, offensive cyber activity and norms of behavior, and cybersecurity around the world.
Policymakers around the world are increasingly concerned about the security of information and communications technology (ICT) supply chains. Danielle Kriz explains how the U.S. government can defend its ICT supply chains against counterfeit products, malicious code, and cyberattacks.
The Internet’s transformative power has created challenges for governments on a host of policy issues. A new Council on Foreign Relations interactive assesses them through video, a timeline of Internet milestones, an issue brief, and policy recommendations.
The European Court of Justice struck down the Safe Harbor framework, which has governed data transfers between the United States and the European Union for the last fifteen years. CFR Senior Fellow for Digital Policy Karen Kornbluh explains.
CFR's David Fidler examines the impact that malware and other cybersecurity threats have had on markets and international trade.
The Digital and Cyberspace Policy program addresses one of the most challenging issues facing the country in the 21st century: how to keep the global Internet open, secure, and resilient in the face of unprecedented threats. Digital technologies have become ubiquitous. More than six billion people use a cell phone, and five billion will be on the Internet by 2020. These trends have generated immense wealth and expanded political participation, but they have also created new vulnerabilities for nations, corporations, and individuals.