[{"command":"settings","settings":{"pluralDelimiter":"\u0003","suppressDeprecationErrors":true,"ajaxPageState":{"libraries":"eJwry0wtL9YvA5F6ufkppTmpOmBOfGJWYkV8emqJPowBFc_MS8vMyyxJjS9OLsrPyYFo1YWJ6kJEAdF1Ikc","theme":"cfr_theme","theme_token":null},"ajaxTrustedUrl":[],"views":{"ajax_path":"\/views\/ajax","ajaxViews":{"views_dom_id:f7062f444a499a4b9ac0dc6e436cac515d95c99a6c690663a2b7018534901d31":{"view_name":"blog_posts","view_display_id":"block_archived_blog_posts","view_args":"17\/252719\/2020","view_path":"\/custom\/ajax\/archived_blog_posts\/17\/252719\/2020","view_base_path":null,"view_dom_id":"f7062f444a499a4b9ac0dc6e436cac515d95c99a6c690663a2b7018534901d31","pager_element":0}}},"viewsAjaxGet":{"blog_posts":"blog_posts"},"user":{"uid":0,"permissionsHash":"e331052eb0a1bc4b2feb3d0cfc1f0f2f6ec5dfd9a50125d1397e4ccee31da7be"}},"merge":true},{"command":"add_css","data":[{"rel":"stylesheet","media":"all","href":"\/sites\/default\/files\/css\/css_sgviVl_37H6Ta5Bl-lc7uAkjneU0Dj6JvASOxbgV9L8.css?delta=0\u0026language=en\u0026theme=cfr_theme\u0026include=eJwry0wtL9YvA5F6ufkppTmpOmBOfGJWYkV8emqJPowBFc_MS8vMyyxJjS9OLsrPyYFo1YWJ6kJEAdF1Ikc"}]},{"command":"add_js","selector":"body","data":[{"src":"\/themes\/custom\/cfr_theme\/node_modules\/jquery\/dist\/jquery.min.js?v=3.1.0"},{"src":"\/themes\/custom\/cfr_theme\/node_modules\/jquery-migrate\/dist\/jquery-migrate.min.js?v=3.1.0"},{"src":"\/core\/assets\/vendor\/once\/once.min.js?v=1.0.1"},{"src":"\/core\/misc\/drupalSettingsLoader.js?v=10.2.11"},{"src":"\/core\/misc\/drupal.js?v=10.2.11"},{"src":"\/core\/misc\/drupal.init.js?v=10.2.11"},{"src":"\/core\/assets\/vendor\/tabbable\/index.umd.min.js?v=6.2.0"},{"src":"\/core\/misc\/progress.js?v=10.2.11"},{"src":"\/core\/assets\/vendor\/loadjs\/loadjs.min.js?v=4.2.0"},{"src":"\/core\/misc\/debounce.js?v=10.2.11"},{"src":"\/core\/misc\/announce.js?v=10.2.11"},{"src":"\/core\/misc\/message.js?v=10.2.11"},{"src":"\/core\/misc\/ajax.js?v=10.2.11"},{"src":"\/themes\/contrib\/stable\/js\/ajax.js?v=10.2.11"},{"src":"\/modules\/contrib\/views_ajax_get\/views_ajax_get.js?tcwifo"},{"src":"\/core\/assets\/vendor\/jquery-form\/jquery.form.min.js?v=4.3.0"},{"src":"\/core\/modules\/views\/js\/base.js?v=10.2.11"},{"src":"\/core\/modules\/views\/js\/ajax_view.js?v=10.2.11"},{"src":"\/modules\/contrib\/views_infinite_scroll\/js\/infinite-scroll.js?v=10.2.11"}]},{"command":"insert","method":"html","selector":".blog-series__accordion-item[data-year=\u00222020\u0022] .blog-series__accordion-body","data":"\u003Cdiv class=\u0022views-element-container\u0022\u003E\u003Cdiv class=\u0022js-view-dom-id-f7062f444a499a4b9ac0dc6e436cac515d95c99a6c690663a2b7018534901d31\u0022\u003E\n  \n  \n  \n\n  \n  \n  \n\n  \u003Cdiv data-drupal-views-infinite-scroll-content-wrapper class=\u0022views-infinite-scroll-content-wrapper clearfix\u0022\u003E\n\n\n\n    \u003Cdiv class=\u0022views-row\u0022\u003E\n    \u003Cdiv class=\u0022views-field views-field-search-api-rendered-item\u0022\u003E\u003Cspan class=\u0022field-content\u0022\u003E\n\n  \n\n\u003Cdiv class=\u0022card-article-large article card-article-large--with-thumbnail\u0022\u003E\n  \u003Cdiv class=\u0022card-article-large__container\u0022\u003E\n    \u003Cdiv class=\u0022card-article-large__content\u0022\u003E\n              \u003Cdiv class=\u0022card-article-large__topic-tag\u0022\u003E\n          \u003Ca href=\u0022\/defense-and-security\/cybersecurity\u0022 class=\u0022card-article-large__topic-tag-link\u0022\u003E\n            Cybersecurity\n          \u003C\/a\u003E\n        \u003C\/div\u003E\n            \n                  \u003Ca href=\u0022\/blog\/no-united-states-does-not-spend-too-much-cyber-offense \u0022 class=\u0022card-article-large__link\u0022\u003E\n              \u003Cdiv class=\u0022card-article-large__title\u0022\u003E\n            No, the United States Does Not Spend Too Much on Cyber Offense\n                    \u003C\/div\u003E\n                  \u003Cdiv class=\u0022card-article-large__image\u0022\u003E\n            \n                          \u003Cdiv class=\u0022card-article-large__image-cover\u0022 style=\u0022background-image: url(\/\/cdn.cfr.org\/sites\/default\/files\/styles\/card_landscape_m_380x253\/public\/image\/2020\/12\/rtx8gxyr.jpg.webp)\u0022\u003E\u003C\/div\u003E\n                      \u003C\/div\u003E\n              \u003C\/a\u003E\n\n              \u003Cdiv class=\u0022card-article-large__dek clamp-js\u0022 data-clamp-lines=\u00224\u0022\u003EContrary to arguments that the United States spends too much on cyber offense, more spending on offensive and defensive capabilities\u0026nbsp;could be in the cards for the future.\r\n\u003C\/div\u003E\n      \n      \u003Cdiv class=\u0022card-article-large__metadata\u0022\u003E\n                              \u003Cspan class=\u0022card-article-large__authors\u0022\u003Eby Robert K. Knake\u003C\/span\u003E\n                  \n        \n                  \u003Cspan class=\u0022card-article-large__date\u0022\u003E December 22, 2020\u003C\/span\u003E\n        \n        \n                          \u003Ca href=\u0022\/programs\/digital-and-cyberspace-policy-program\u0022 class=\u0022card-article-large__series\u0022\u003E\n            Digital and Cyberspace Policy Program\n          \u003C\/a\u003E\n              \u003C\/div\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n\u003C\/div\u003E\n\n\u003C\/span\u003E\u003C\/div\u003E\n  \u003C\/div\u003E\n    \u003Cdiv class=\u0022views-row\u0022\u003E\n    \u003Cdiv class=\u0022views-field views-field-search-api-rendered-item\u0022\u003E\u003Cspan class=\u0022field-content\u0022\u003E\n\n  \n\n\u003Cdiv class=\u0022card-article-large article card-article-large--with-thumbnail\u0022\u003E\n  \u003Cdiv class=\u0022card-article-large__container\u0022\u003E\n    \u003Cdiv class=\u0022card-article-large__content\u0022\u003E\n              \u003Cdiv class=\u0022card-article-large__topic-tag\u0022\u003E\n          \u003Ca href=\u0022\/defense-and-security\/cybersecurity\u0022 class=\u0022card-article-large__topic-tag-link\u0022\u003E\n            Cybersecurity\n          \u003C\/a\u003E\n        \u003C\/div\u003E\n            \n                  \u003Ca href=\u0022\/blog\/solarwinds-compromise-and-strategic-challenge-information-and-communications-technology-supply \u0022 class=\u0022card-article-large__link\u0022\u003E\n              \u003Cdiv class=\u0022card-article-large__title\u0022\u003E\n            The SolarWinds Compromise and the Strategic Challenge of the Information and Communications Technology Supply Chain \n                    \u003C\/div\u003E\n                  \u003Cdiv class=\u0022card-article-large__image\u0022\u003E\n            \n                          \u003Cdiv class=\u0022card-article-large__image-cover\u0022 style=\u0022background-image: url(\/\/cdn.cfr.org\/sites\/default\/files\/styles\/card_landscape_m_380x253\/public\/image\/2020\/12\/rtx8gyt3.jpg.webp)\u0022\u003E\u003C\/div\u003E\n                      \u003C\/div\u003E\n              \u003C\/a\u003E\n\n              \u003Cdiv class=\u0022card-article-large__dek clamp-js\u0022 data-clamp-lines=\u00224\u0022\u003EPossibly the most significant cyber breach targeting the U.S. government in years, the compromise of SolarWinds highlights the need for a risk-based approach to supply chain security and resilience.\u0026nbsp;\r\n\u003C\/div\u003E\n      \n      \u003Cdiv class=\u0022card-article-large__metadata\u0022\u003E\n                              \u003Cspan class=\u0022card-article-large__authors\u0022\u003Eby Guest Blogger for Net Politics\u003C\/span\u003E\n                  \n        \n                  \u003Cspan class=\u0022card-article-large__date\u0022\u003E December 22, 2020\u003C\/span\u003E\n        \n        \n                          \u003Ca href=\u0022\/programs\/digital-and-cyberspace-policy-program\u0022 class=\u0022card-article-large__series\u0022\u003E\n            Digital and Cyberspace Policy Program\n          \u003C\/a\u003E\n              \u003C\/div\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n\u003C\/div\u003E\n\n\u003C\/span\u003E\u003C\/div\u003E\n  \u003C\/div\u003E\n    \u003Cdiv class=\u0022views-row\u0022\u003E\n    \u003Cdiv class=\u0022views-field views-field-search-api-rendered-item\u0022\u003E\u003Cspan class=\u0022field-content\u0022\u003E\n\n  \n\n\u003Cdiv class=\u0022card-article-large article card-article-large--with-thumbnail\u0022\u003E\n  \u003Cdiv class=\u0022card-article-large__container\u0022\u003E\n    \u003Cdiv class=\u0022card-article-large__content\u0022\u003E\n              \u003Cdiv class=\u0022card-article-large__topic-tag\u0022\u003E\n          \u003Ca href=\u0022\/defense-and-security\/cybersecurity\u0022 class=\u0022card-article-large__topic-tag-link\u0022\u003E\n            Cybersecurity\n          \u003C\/a\u003E\n        \u003C\/div\u003E\n            \n                  \u003Ca href=\u0022\/blog\/assessing-president-trumps-legacy-cyber-confusion \u0022 class=\u0022card-article-large__link\u0022\u003E\n              \u003Cdiv class=\u0022card-article-large__title\u0022\u003E\n            Assessing President Trump\u2019s Legacy of Cyber Confusion \n                    \u003C\/div\u003E\n                  \u003Cdiv class=\u0022card-article-large__image\u0022\u003E\n            \n                          \u003Cdiv class=\u0022card-article-large__image-cover\u0022 style=\u0022background-image: url(\/\/cdn.cfr.org\/sites\/default\/files\/styles\/card_landscape_m_380x253\/public\/image\/2020\/12\/rtx8fpdt.jpg.webp)\u0022\u003E\u003C\/div\u003E\n                      \u003C\/div\u003E\n              \u003C\/a\u003E\n\n              \u003Cdiv class=\u0022card-article-large__dek clamp-js\u0022 data-clamp-lines=\u00224\u0022\u003EThe Trump administration leaves a legacy of confusion over cybersecurity issues with few positives.\r\n\u003C\/div\u003E\n      \n      \u003Cdiv class=\u0022card-article-large__metadata\u0022\u003E\n                              \u003Cspan class=\u0022card-article-large__authors\u0022\u003Eby Brandon Valeriano\u003C\/span\u003E\n                  \n        \n                  \u003Cspan class=\u0022card-article-large__date\u0022\u003E December 21, 2020\u003C\/span\u003E\n        \n        \n                          \u003Ca href=\u0022\/programs\/digital-and-cyberspace-policy-program\u0022 class=\u0022card-article-large__series\u0022\u003E\n            Digital and Cyberspace Policy Program\n          \u003C\/a\u003E\n              \u003C\/div\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n\u003C\/div\u003E\n\n\u003C\/span\u003E\u003C\/div\u003E\n  \u003C\/div\u003E\n\n\n\n\n\t\t  \t  \u003Cli class=\u0022views-row\u0022\u003E\n\t    \u003Cdiv class=\u0022views-field views-field-search-api-rendered-item\u0022\u003E\u003Cspan class=\u0022field-content\u0022\u003E\n\n  \n\n\u003Cdiv class=\u0022card-article-large article card-article-large--with-thumbnail\u0022\u003E\n  \u003Cdiv class=\u0022card-article-large__container\u0022\u003E\n    \u003Cdiv class=\u0022card-article-large__content\u0022\u003E\n              \u003Cdiv class=\u0022card-article-large__topic-tag\u0022\u003E\n          \u003Ca href=\u0022\/defense-and-security\/cybersecurity\u0022 class=\u0022card-article-large__topic-tag-link\u0022\u003E\n            Cybersecurity\n          \u003C\/a\u003E\n        \u003C\/div\u003E\n            \n                  \u003Ca href=\u0022\/blog\/week-review-december-18-2020 \u0022 class=\u0022card-article-large__link\u0022\u003E\n              \u003Cdiv class=\u0022card-article-large__title\u0022\u003E\n            Week in Review: December 18, 2020\n                    \u003C\/div\u003E\n                  \u003Cdiv class=\u0022card-article-large__image\u0022\u003E\n            \n                          \u003Cdiv class=\u0022card-article-large__image-cover\u0022 style=\u0022background-image: url(\/\/cdn.cfr.org\/sites\/default\/files\/styles\/card_landscape_m_380x253\/public\/image\/2020\/12\/rtx8g8q7.jpg.webp)\u0022\u003E\u003C\/div\u003E\n                      \u003C\/div\u003E\n              \u003C\/a\u003E\n\n              \u003Cdiv class=\u0022card-article-large__dek clamp-js\u0022 data-clamp-lines=\u00224\u0022\u003EBig tech\u0027s terrible, horrible, no good, very bad week; Russia\u2019s SolarWinds hack compromises thousands of customers; Facebook calls out France and Russia for misinformation operations in Africa; Germany refuses to exclude Huawei; and European Union introduces cybersecurity strategy.\r\n\u003C\/div\u003E\n      \n      \u003Cdiv class=\u0022card-article-large__metadata\u0022\u003E\n                              \u003Cspan class=\u0022card-article-large__authors\u0022\u003Eby                   \u003Ca href=\u0022\/expert\/adam-segal\u0022 class=\u0022card-article-large__authors-link\u0022\u003EAdam Segal\u003C\/a\u003E\n                \u003C\/span\u003E\n                  \n        \n                  \u003Cspan class=\u0022card-article-large__date\u0022\u003E December 18, 2020\u003C\/span\u003E\n        \n        \n                          \u003Ca href=\u0022\/programs\/digital-and-cyberspace-policy-program\u0022 class=\u0022card-article-large__series\u0022\u003E\n            Digital and Cyberspace Policy Program\n          \u003C\/a\u003E\n              \u003C\/div\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n\u003C\/div\u003E\n\n\u003C\/span\u003E\u003C\/div\u003E\n\t  \u003C\/li\u003E\n\t\t  \t  \u003Cli class=\u0022views-row\u0022\u003E\n\t    \u003Cdiv class=\u0022views-field views-field-search-api-rendered-item\u0022\u003E\u003Cspan class=\u0022field-content\u0022\u003E\n\n  \n\n\u003Cdiv class=\u0022card-article-large article card-article-large--with-thumbnail\u0022\u003E\n  \u003Cdiv class=\u0022card-article-large__container\u0022\u003E\n    \u003Cdiv class=\u0022card-article-large__content\u0022\u003E\n              \u003Cdiv class=\u0022card-article-large__topic-tag\u0022\u003E\n          \u003Ca href=\u0022\/asia\/china\u0022 class=\u0022card-article-large__topic-tag-link\u0022\u003E\n            China\n          \u003C\/a\u003E\n        \u003C\/div\u003E\n            \n                  \u003Ca href=\u0022\/blog\/part-three-huaweis-role-china-russia-technological-partnership \u0022 class=\u0022card-article-large__link\u0022\u003E\n              \u003Cdiv class=\u0022card-article-large__title\u0022\u003E\n            Part Three: Huawei\u2019s Role in the China-Russia Technological Partnership\n                    \u003C\/div\u003E\n                  \u003Cdiv class=\u0022card-article-large__image\u0022\u003E\n            \n                          \u003Cdiv class=\u0022card-article-large__image-cover\u0022 style=\u0022background-image: url(\/\/cdn.cfr.org\/sites\/default\/files\/styles\/card_landscape_m_380x253\/public\/image\/2020\/12\/rts2zvd2.jpg.webp)\u0022\u003E\u003C\/div\u003E\n                      \u003C\/div\u003E\n              \u003C\/a\u003E\n\n              \u003Cdiv class=\u0022card-article-large__dek clamp-js\u0022 data-clamp-lines=\u00224\u0022\u003EWhile Huawei clearly benefits from the China-Russia science and technology\u0026nbsp;partnership, it also helps facilitate it.\r\n\u003C\/div\u003E\n      \n      \u003Cdiv class=\u0022card-article-large__metadata\u0022\u003E\n                              \u003Cspan class=\u0022card-article-large__authors\u0022\u003Eby Guest Blogger for Net Politics\u003C\/span\u003E\n                  \n        \n                  \u003Cspan class=\u0022card-article-large__date\u0022\u003E December 16, 2020\u003C\/span\u003E\n        \n        \n                          \u003Ca href=\u0022\/programs\/digital-and-cyberspace-policy-program\u0022 class=\u0022card-article-large__series\u0022\u003E\n            Digital and Cyberspace Policy Program\n          \u003C\/a\u003E\n              \u003C\/div\u003E\n    \u003C\/div\u003E\n  \u003C\/div\u003E\n\u003C\/div\u003E\n\n\u003C\/span\u003E\u003C\/div\u003E\n\t  \u003C\/li\u003E\n\t\u003C\/div\u003E\n\n    \n\u003Cul class=\u0022js-pager__items pager\u0022 data-drupal-views-infinite-scroll-pager\u003E\n  \u003Cli class=\u0022pager__item\u0022\u003E\n    \u003Ca class=\u0022button\u0022 href=\u0022?page=1\u0022 title=\u0022Load more items\u0022 rel=\u0022next\u0022\u003ELoad More\u003C\/a\u003E\n  \u003C\/li\u003E\n\u003C\/ul\u003E\n\n\n  \n  \n\n  \n  \n\u003C\/div\u003E\n\u003C\/div\u003E\n","settings":null}]