[{"command":"settings","settings":{"pluralDelimiter":"\u0003","suppressDeprecationErrors":true,"ajaxPageState":{"libraries":"eJwry0wtL9YvA5F6ufkppTmpOmBOfGJWYkV8emqJPowBFc_MS8vMyyxJjS9OLsrPyYFo1YWJ6kJEAdF1Ikc","theme":"cfr_theme","theme_token":null},"ajaxTrustedUrl":[],"views":{"ajax_path":"\/views\/ajax","ajaxViews":{"views_dom_id:44100759b84b30d153550140fc294a7b46a8de7bd29b091edf7b356fa5ce0d95":{"view_name":"blog_posts","view_display_id":"block_archived_blog_posts","view_args":"17\/252719\/2017","view_path":"\/custom\/ajax\/archived_blog_posts\/17\/252719\/2017","view_base_path":null,"view_dom_id":"44100759b84b30d153550140fc294a7b46a8de7bd29b091edf7b356fa5ce0d95","pager_element":0}}},"viewsAjaxGet":{"blog_posts":"blog_posts"},"user":{"uid":0,"permissionsHash":"e331052eb0a1bc4b2feb3d0cfc1f0f2f6ec5dfd9a50125d1397e4ccee31da7be"}},"merge":true},{"command":"add_css","data":[{"rel":"stylesheet","media":"all","href":"\/sites\/default\/files\/css\/css_sgviVl_37H6Ta5Bl-lc7uAkjneU0Dj6JvASOxbgV9L8.css?delta=0\u0026language=en\u0026theme=cfr_theme\u0026include=eJwry0wtL9YvA5F6ufkppTmpOmBOfGJWYkV8emqJPowBFc_MS8vMyyxJjS9OLsrPyYFo1YWJ6kJEAdF1Ikc"}]},{"command":"add_js","selector":"body","data":[{"src":"\/themes\/custom\/cfr_theme\/node_modules\/jquery\/dist\/jquery.min.js?v=3.1.0"},{"src":"\/themes\/custom\/cfr_theme\/node_modules\/jquery-migrate\/dist\/jquery-migrate.min.js?v=3.1.0"},{"src":"\/core\/assets\/vendor\/once\/once.min.js?v=1.0.1"},{"src":"\/core\/misc\/drupalSettingsLoader.js?v=10.2.11"},{"src":"\/core\/misc\/drupal.js?v=10.2.11"},{"src":"\/core\/misc\/drupal.init.js?v=10.2.11"},{"src":"\/core\/assets\/vendor\/tabbable\/index.umd.min.js?v=6.2.0"},{"src":"\/core\/misc\/progress.js?v=10.2.11"},{"src":"\/core\/assets\/vendor\/loadjs\/loadjs.min.js?v=4.2.0"},{"src":"\/core\/misc\/debounce.js?v=10.2.11"},{"src":"\/core\/misc\/announce.js?v=10.2.11"},{"src":"\/core\/misc\/message.js?v=10.2.11"},{"src":"\/core\/misc\/ajax.js?v=10.2.11"},{"src":"\/themes\/contrib\/stable\/js\/ajax.js?v=10.2.11"},{"src":"\/modules\/contrib\/views_ajax_get\/views_ajax_get.js?tcwifo"},{"src":"\/core\/assets\/vendor\/jquery-form\/jquery.form.min.js?v=4.3.0"},{"src":"\/core\/modules\/views\/js\/base.js?v=10.2.11"},{"src":"\/core\/modules\/views\/js\/ajax_view.js?v=10.2.11"},{"src":"\/modules\/contrib\/views_infinite_scroll\/js\/infinite-scroll.js?v=10.2.11"}]},{"command":"insert","method":"html","selector":".blog-series__accordion-item[data-year=\u00222017\u0022] .blog-series__accordion-body","data":"\u003Cdiv class=\u0022views-element-container\u0022\u003E\u003Cdiv class=\u0022js-view-dom-id-44100759b84b30d153550140fc294a7b46a8de7bd29b091edf7b356fa5ce0d95\u0022\u003E\n  \n  \n  \n\n  \n  \n  \n\n  \u003Cdiv data-drupal-views-infinite-scroll-content-wrapper class=\u0022views-infinite-scroll-content-wrapper clearfix\u0022\u003E\n\n\n\n    \u003Cdiv class=\u0022views-row\u0022\u003E\n    \u003Cdiv class=\u0022views-field views-field-search-api-rendered-item\u0022\u003E\u003Cspan class=\u0022field-content\u0022\u003E\n\n  \n\n\u003Cdiv class=\u0022card-article-large article card-article-large--with-no-image\u0022\u003E\n  \u003Cdiv class=\u0022card-article-large__container\u0022\u003E\n    \u003Cdiv class=\u0022card-article-large__content\u0022\u003E\n              \u003Cdiv class=\u0022card-article-large__topic-tag\u0022\u003E\n          \u003Ca href=\u0022\/defense-and-security\/cybersecurity\u0022 class=\u0022card-article-large__topic-tag-link\u0022\u003E\n            Cybersecurity\n          \u003C\/a\u003E\n        \u003C\/div\u003E\n            \n                  \u003Ca href=\u0022\/blog\/cyber-week-review-december-22-2017 \u0022 class=\u0022card-article-large__link\u0022\u003E\n              \u003Cdiv class=\u0022card-article-large__title\u0022\u003E\n            Cyber Week in Review: December 22, 2017\n                    \u003C\/div\u003E\n              \u003C\/a\u003E\n\n              \u003Cdiv class=\u0022card-article-large__dek clamp-js\u0022 data-clamp-lines=\u00224\u0022\u003EThis week: WannaCry attribution, cybersecurity in Trump\u0027s National Security Strategy,\u0026nbsp;new election security bill, and North Korea tries its luck at Bitcoin.\u0026nbsp;\r\n\u003C\/div\u003E\n      \n      \u003Cdiv class=\u0022card-article-large__metadata\u0022\u003E\n                              \u003Cspan class=\u0022card-article-large__authors\u0022\u003Eby                   \u003Ca href=\u0022\/expert\/adam-segal\u0022 class=\u0022card-article-large__authors-link\u0022\u003EAdam Segal\u003C\/a\u003E\n                \u003C\/span\u003E\n                  \n        \n                  \u003Cspan class=\u0022card-article-large__date\u0022\u003E December 22, 2017\u003C\/span\u003E\n        \n        \n                          \u003Ca href=\u0022\/blog\/net-politics\u0022 class=\u0022card-article-large__series\u0022\u003E\n            Net Politics\n          \u003C\/a\u003E\n              \u003C\/div\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n\u003C\/div\u003E\n\n\u003C\/span\u003E\u003C\/div\u003E\n  \u003C\/div\u003E\n    \u003Cdiv class=\u0022views-row\u0022\u003E\n    \u003Cdiv class=\u0022views-field views-field-search-api-rendered-item\u0022\u003E\u003Cspan class=\u0022field-content\u0022\u003E\n\n  \n\n\u003Cdiv class=\u0022card-article-large article card-article-large--with-thumbnail\u0022\u003E\n  \u003Cdiv class=\u0022card-article-large__container\u0022\u003E\n    \u003Cdiv class=\u0022card-article-large__content\u0022\u003E\n              \u003Cdiv class=\u0022card-article-large__topic-tag\u0022\u003E\n          \u003Ca href=\u0022\/defense-and-security\/cybersecurity\u0022 class=\u0022card-article-large__topic-tag-link\u0022\u003E\n            Cybersecurity\n          \u003C\/a\u003E\n        \u003C\/div\u003E\n            \n                  \u003Ca href=\u0022\/blog\/year-review-malware-attacks-impact-operations-and-bottom-line \u0022 class=\u0022card-article-large__link\u0022\u003E\n              \u003Cdiv class=\u0022card-article-large__title\u0022\u003E\n            Year in Review: Malware Attacks Impact Operations and the Bottom Line\n                    \u003C\/div\u003E\n                  \u003Cdiv class=\u0022card-article-large__image\u0022\u003E\n            \n                          \u003Cdiv class=\u0022card-article-large__image-cover\u0022 style=\u0022background-image: url(\/\/cdn.cfr.org\/sites\/default\/files\/styles\/card_landscape_m_380x253\/public\/image\/2017\/12\/RTX10SEJ%20%281%29.jpg.webp)\u0022\u003E\u003C\/div\u003E\n                      \u003C\/div\u003E\n              \u003C\/a\u003E\n\n              \u003Cdiv class=\u0022card-article-large__dek clamp-js\u0022 data-clamp-lines=\u00224\u0022\u003E2017 will be remembered as the year that cyber incidents started inflicting real economic losses on companies.\u0026nbsp;\r\n\u003C\/div\u003E\n      \n      \u003Cdiv class=\u0022card-article-large__metadata\u0022\u003E\n                              \u003Cspan class=\u0022card-article-large__authors\u0022\u003Eby Robert K. Knake\u003C\/span\u003E\n                  \n        \n                  \u003Cspan class=\u0022card-article-large__date\u0022\u003E December 22, 2017\u003C\/span\u003E\n        \n        \n                          \u003Ca href=\u0022\/blog\/net-politics\u0022 class=\u0022card-article-large__series\u0022\u003E\n            Net Politics\n          \u003C\/a\u003E\n              \u003C\/div\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n\u003C\/div\u003E\n\n\u003C\/span\u003E\u003C\/div\u003E\n  \u003C\/div\u003E\n    \u003Cdiv class=\u0022views-row\u0022\u003E\n    \u003Cdiv class=\u0022views-field views-field-search-api-rendered-item\u0022\u003E\u003Cspan class=\u0022field-content\u0022\u003E\n\n  \n\n\u003Cdiv class=\u0022card-article-large article card-article-large--with-thumbnail\u0022\u003E\n  \u003Cdiv class=\u0022card-article-large__container\u0022\u003E\n    \u003Cdiv class=\u0022card-article-large__content\u0022\u003E\n              \u003Cdiv class=\u0022card-article-large__topic-tag\u0022\u003E\n          \u003Ca href=\u0022\/defense-and-security\/cybersecurity\u0022 class=\u0022card-article-large__topic-tag-link\u0022\u003E\n            Cybersecurity\n          \u003C\/a\u003E\n        \u003C\/div\u003E\n            \n                  \u003Ca href=\u0022\/blog\/year-review-death-un-gge-process \u0022 class=\u0022card-article-large__link\u0022\u003E\n              \u003Cdiv class=\u0022card-article-large__title\u0022\u003E\n            The Year in Review: The Death of the UN GGE Process?\n                    \u003C\/div\u003E\n                  \u003Cdiv class=\u0022card-article-large__image\u0022\u003E\n            \n                          \u003Cdiv class=\u0022card-article-large__image-cover\u0022 style=\u0022background-image: url(\/\/cdn.cfr.org\/sites\/default\/files\/styles\/card_landscape_m_380x253\/public\/image\/2017\/12\/RTX3URWL.jpg.webp)\u0022\u003E\u003C\/div\u003E\n                      \u003C\/div\u003E\n              \u003C\/a\u003E\n\n              \u003Cdiv class=\u0022card-article-large__dek clamp-js\u0022 data-clamp-lines=\u00224\u0022\u003EAn effort at the United Nations to clarify norms of state behavior in cyberspace suffered a setback this year, perhaps causing the United States to alter its cyber norm promotion efforts.\u0026nbsp;\r\n\u003C\/div\u003E\n      \n      \u003Cdiv class=\u0022card-article-large__metadata\u0022\u003E\n                              \u003Cspan class=\u0022card-article-large__authors\u0022\u003Eby Guest Blogger for Net Politics\u003C\/span\u003E\n                  \n        \n                  \u003Cspan class=\u0022card-article-large__date\u0022\u003E December 21, 2017\u003C\/span\u003E\n        \n        \n                          \u003Ca href=\u0022\/blog\/net-politics\u0022 class=\u0022card-article-large__series\u0022\u003E\n            Net Politics\n          \u003C\/a\u003E\n              \u003C\/div\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n\u003C\/div\u003E\n\n\u003C\/span\u003E\u003C\/div\u003E\n  \u003C\/div\u003E\n\n\n\n\n\t\t  \t  \u003Cli class=\u0022views-row\u0022\u003E\n\t    \u003Cdiv class=\u0022views-field views-field-search-api-rendered-item\u0022\u003E\u003Cspan class=\u0022field-content\u0022\u003E\n\n  \n\n\u003Cdiv class=\u0022card-article-large article card-article-large--with-thumbnail\u0022\u003E\n  \u003Cdiv class=\u0022card-article-large__container\u0022\u003E\n    \u003Cdiv class=\u0022card-article-large__content\u0022\u003E\n              \u003Cdiv class=\u0022card-article-large__topic-tag\u0022\u003E\n          \u003Ca href=\u0022\/defense-and-security\/cybersecurity\u0022 class=\u0022card-article-large__topic-tag-link\u0022\u003E\n            Cybersecurity\n          \u003C\/a\u003E\n        \u003C\/div\u003E\n            \n                  \u003Ca href=\u0022\/blog\/reasoning-analogy-cyberspace-deadly-balloons-and-avoiding-digital-doom \u0022 class=\u0022card-article-large__link\u0022\u003E\n              \u003Cdiv class=\u0022card-article-large__title\u0022\u003E\n            Reasoning by Analogy in Cyberspace: Deadly Balloons and Avoiding Digital Doom\n                    \u003C\/div\u003E\n                  \u003Cdiv class=\u0022card-article-large__image\u0022\u003E\n            \n                          \u003Cdiv class=\u0022card-article-large__image-cover\u0022 style=\u0022background-image: url(\/\/cdn.cfr.org\/sites\/default\/files\/styles\/card_landscape_m_380x253\/public\/image\/2017\/12\/Balloons_%28WWI%29.jpg.webp)\u0022\u003E\u003C\/div\u003E\n                      \u003C\/div\u003E\n              \u003C\/a\u003E\n\n              \u003Cdiv class=\u0022card-article-large__dek clamp-js\u0022 data-clamp-lines=\u00224\u0022\u003EHow the regulation of\u0026nbsp;early balloon warfare can inform current debates about regulating cyber conflict.\r\n\u003C\/div\u003E\n      \n      \u003Cdiv class=\u0022card-article-large__metadata\u0022\u003E\n                              \u003Cspan class=\u0022card-article-large__authors\u0022\u003Eby Guest Blogger for Net Politics\u003C\/span\u003E\n                  \n        \n                  \u003Cspan class=\u0022card-article-large__date\u0022\u003E December 18, 2017\u003C\/span\u003E\n        \n        \n                          \u003Ca href=\u0022\/blog\/net-politics\u0022 class=\u0022card-article-large__series\u0022\u003E\n            Net Politics\n          \u003C\/a\u003E\n              \u003C\/div\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n\u003C\/div\u003E\n\n\u003C\/span\u003E\u003C\/div\u003E\n\t  \u003C\/li\u003E\n\t\t  \t  \u003Cli class=\u0022views-row\u0022\u003E\n\t    \u003Cdiv class=\u0022views-field views-field-search-api-rendered-item\u0022\u003E\u003Cspan class=\u0022field-content\u0022\u003E\n\n  \n\n\u003Cdiv class=\u0022card-article-large article card-article-large--with-thumbnail\u0022\u003E\n  \u003Cdiv class=\u0022card-article-large__container\u0022\u003E\n    \u003Cdiv class=\u0022card-article-large__content\u0022\u003E\n              \u003Cdiv class=\u0022card-article-large__topic-tag\u0022\u003E\n          \u003Ca href=\u0022\/americas\/united-states\u0022 class=\u0022card-article-large__topic-tag-link\u0022\u003E\n            United States\n          \u003C\/a\u003E\n        \u003C\/div\u003E\n            \n                  \u003Ca href=\u0022\/blog\/year-review-trump-administration-disrupts-us-cyber-diplomacy \u0022 class=\u0022card-article-large__link\u0022\u003E\n              \u003Cdiv class=\u0022card-article-large__title\u0022\u003E\n            Year in Review: The Trump Administration Disrupts U.S. Cyber Diplomacy\n                    \u003C\/div\u003E\n                  \u003Cdiv class=\u0022card-article-large__image\u0022\u003E\n            \n                          \u003Cdiv class=\u0022card-article-large__image-cover\u0022 style=\u0022background-image: url(\/\/cdn.cfr.org\/sites\/default\/files\/styles\/card_landscape_m_380x253\/public\/image\/2017\/12\/RTS1KS0P.jpg.webp)\u0022\u003E\u003C\/div\u003E\n                      \u003C\/div\u003E\n              \u003C\/a\u003E\n\n              \u003Cdiv class=\u0022card-article-large__dek clamp-js\u0022 data-clamp-lines=\u00224\u0022\u003EA look back at the Trump administration\u0027s approach to cyber diplomacy and what it means for next year.\u0026nbsp;\r\n\u003C\/div\u003E\n      \n      \u003Cdiv class=\u0022card-article-large__metadata\u0022\u003E\n                              \u003Cspan class=\u0022card-article-large__authors\u0022\u003Eby David P. Fidler\u003C\/span\u003E\n                  \n        \n                  \u003Cspan class=\u0022card-article-large__date\u0022\u003E December 18, 2017\u003C\/span\u003E\n        \n        \n                          \u003Ca href=\u0022\/blog\/net-politics\u0022 class=\u0022card-article-large__series\u0022\u003E\n            Net Politics\n          \u003C\/a\u003E\n              \u003C\/div\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n\u003C\/div\u003E\n\n\u003C\/span\u003E\u003C\/div\u003E\n\t  \u003C\/li\u003E\n\t\u003C\/div\u003E\n\n    \n\u003Cul class=\u0022js-pager__items pager\u0022 data-drupal-views-infinite-scroll-pager\u003E\n  \u003Cli class=\u0022pager__item\u0022\u003E\n    \u003Ca class=\u0022button\u0022 href=\u0022?page=1\u0022 title=\u0022Load more items\u0022 rel=\u0022next\u0022\u003ELoad More\u003C\/a\u003E\n  \u003C\/li\u003E\n\u003C\/ul\u003E\n\n\n  \n  \n\n  \n  \n\u003C\/div\u003E\n\u003C\/div\u003E\n","settings":null}]