16 Results for:

June 25, 2013

Transnational Crime
The Global Regime for Transnational Crime

This page is part of the Global Governance Monitor. Scope of the Challenge Over the past two decades, as the world economy has globalized, so has its illicit counterpart. The global impact of t…

ggm_crime_500.jpg

December 6, 2018

China
A New Old Threat

China is once again conducting cyber-enabled theft of U.S. intellectual property to advance its technological capabilities. To combat the problem, the United States should build a multinational coali…

Trump, Bolton, and Xi at G20

January 13, 2021

Cybersecurity
Transatlantic Data Transfers

U.S. surveillance activities have alarmed European partners, throwing the future of transatlantic digital trade into question. The United States should embrace collaboration and protections for perso…

Yellow wires, tied together, hang from the back of a black and gray server.

January 11, 2011

Cybersecurity
Summary Report for the Workshop on Cybersecurity, Foreign Policy, and Business

Introduction In early 2011, the Council on Foreign Relations held a workshop focused on the intersection of cybersecurity, foreign policy, and global business. The program, which included a keynot…

October 21, 2014

Digital Policy
Holding the Multistakeholder Line at the ITU

The United States heads to the 2014 International Telecommunications Union (ITU) Plenipotentiary Conference in Busan, South Korea, looking to defend its approach to Internet governance. Washington an…

Holding the Multistakeholder Line at the ITU header