74 Results for:

May 17, 2017

Cybersecurity
Transforming Election Cybersecurity

The events of the 2016 U.S. election demonstrate that more high-level political action is required to manage real and perceived cyber vulnerabilities in election systems.

December 6, 2018

China
A New Old Threat

China is once again conducting cyber-enabled theft of U.S. intellectual property to advance its technological capabilities. To combat the problem, the United States should build a multinational coali…

Trump, Bolton, and Xi at G20

April 12, 2011

Capital Flows
Doubts About Capital Controls

Overview China's policy of holding down the value of its currency and monetary easing in the United States have led to large capital inflows into emerging economies, raising fears of currency appr…

Doubts About Capital Controls

June 15, 2015

Islamic State
Countering Islamic State Exploitation of the Internet

The use of social media and other Internet-enabled communications by the self-proclaimed Islamic State is pushing the United States and other democracies to react to the abuse of liberal freedoms by …

Countering Islamic State Exploitation of the Internet header

September 11, 2007

Iraq
CFR Fellows Respond to Iraq Testimony

Following congressional testimony by General David Petraeus and Ambassador Ryan C. Crocker, the top two U.S. officials in Iraq, six CFR experts offered their own insights. Peter Beinart: Decision …