58 Results for:

May 17, 2017

Cybersecurity
Transforming Election Cybersecurity

The events of the 2016 U.S. election demonstrate that more high-level political action is required to manage real and perceived cyber vulnerabilities in election systems.

June 15, 2015

Islamic State
Countering Islamic State Exploitation of the Internet

The use of social media and other Internet-enabled communications by the self-proclaimed Islamic State is pushing the United States and other democracies to react to the abuse of liberal freedoms by …

Countering Islamic State Exploitation of the Internet header

September 19, 2016

Cybersecurity
Using Incentives to Shape the Zero-Day Market

In early 2016, the Federal Bureau of Investigation reportedly paid more than $1.3 million for a software flaw that allowed it to unlock an iPhone without Apple’s assistance. The purchase was possible…

Segal-Cyber-Brief-image_lg.jpg

September 11, 2007

Iraq
CFR Fellows Respond to Iraq Testimony

Following congressional testimony by General David Petraeus and Ambassador Ryan C. Crocker, the top two U.S. officials in Iraq, six CFR experts offered their own insights. Peter Beinart: Decision …

October 21, 2014

Digital Policy
Holding the Multistakeholder Line at the ITU

The United States heads to the 2014 International Telecommunications Union (ITU) Plenipotentiary Conference in Busan, South Korea, looking to defend its approach to Internet governance. Washington an…

Holding the Multistakeholder Line at the ITU header