CFR Presents

Net Politics

CFR experts investigate the impact of information and communication technologies on security, privacy, and international affairs.

Hacking Defense and Diplomacy in Silicon Valley

by Guest Blogger Monday, March 27, 2017
U.S. Navy SEALs jump from an CH-46E Sea Knight during training near Fort Pickett. (Petty Officer 2nd Class Meranda Keller/U.S. Navy)

Scott Hartley is a venture capitalist and term member at the Council on Foreign Relations. His new book, The Fuzzy and the Techie (Houghton Mifflin), comes out in April. You can follow him @scottehartley

Read more »

Cyber Week in Review: March 24, 2017

by Adam Segal Friday, March 24, 2017
Harry Shum (C), Microsoft Executive Vice President of Technology and Research, and Microsoft CEO Satya Nadella (L) show Chinese President Xi Jinping (R) a display of devices running the Windows operating system that were made in China by ZTE Corporation during a tour of Microsoft's main campus in Redmond, Washington September 23, 2015. (Ted S. Warren/Reuters).

Here is a quick round-up of this week’s technology headlines and related stories you may have missed:

Read more »

Cyber Week in Review: March 17, 2017

by Adam Segal Friday, March 17, 2017
Department of Justice staffer installs a poster of a suspected Russian hacker before FBI National Security Division and the U.S. Attorney's Office for the Northern District of California joint news conference on March 15, 2017. (Yuri Gripas/Reuters).

Happy St. Patrick’s Day! Here is a quick round-up of this week’s technology headlines and related stories you may have missed while you were in a pub:

Read more »

Hacking Charges Against Russian FSB Officers: A Quick Reaction

by Adam Segal Wednesday, March 15, 2017
A poster of suspected Russian hacker is seen before FBI National Security Division and the U.S. Attorney's Office for the Northern District of California joint news conference at the Justice Department in Washington, U.S., March 15, 2017. (Yuri Gripas/Reuters).

This post was co-written with Alex Grigsby, assistant director of the Digital and Cyberspace Policy program.

Read more »

Wikileaks and the CIA: What’s in Vault7?

by Adam Segal Wednesday, March 8, 2017
The Central Intelligence Agency (CIA) logo. (Yuri Gripas/Reuters).

On Tuesday, Wikileaks released a huge cache of documents it said were descriptions of CIA cyber tools used to break into smartphones, computers and internet-connected TVs. Wikileaks says the documents came from an inside source–speculation is it is either a CIA operator or contractor–and claimed the release was meant to spur a debate over “whether the CIA’s hacking capabilities exceed its mandated powers” and “the security, creation, use, proliferation and democratic control of cyberweapons.” In any case, it is damaging to the CIA and another in a growing list of embarrassing instances of the U.S. intelligence agencies losing control of their digital weapons (see, for example, Edward Snowden; Shadow Brokers; Harold Thomas Martin III).

Read more »