CFR Presents

Net Politics

CFR experts investigate the impact of information and communication technologies on security, privacy, and international affairs.

The Top Five Cyber Policy Developments of 2015: Encryption

by Guest Blogger Monday, December 28, 2015
U.S. Deputy Attorney General Sally Quillian Yates (L) listens as FBI Director James Comey (R) speaks during a Senate Judiciary Committee hearing on "Going Dark: Encryption, Technology, and the Balance Between Public Safety and Privacy" in Washington July 8, 2015. (Kevin Lamarque/Reuters) U.S. Deputy Attorney General Sally Quillian Yates (L) listens as FBI Director James Comey (R) speaks during a Senate Judiciary Committee hearing on "Going Dark: Encryption, Technology, and the Balance Between Public Safety and Privacy" in Washington July 8, 2015. (Kevin Lamarque/Reuters)

Over the next few days, Net Politics will countdown the top five developments in cyber policy of 2015. Each policy event will have its own post, explaining what happened, what it all means, and its impact on cyber policy in 2016. In this post, the encryption debate. 

Read more »

The Top Five Cyber Policy Developments of 2015: The Trans-Pacific Partnership

by David Fidler Thursday, December 24, 2015
Cyber Net Politics CFR TPP Men sit on a pile of corn at a factory of a buying agent in Son La province, northwest of Hanoi, Vietnam October 13, 2015. The communist nation is seen as one of the biggest winners from the Trans-Pacific Partnership, with a surge of investment expected into its $186-billion economy, especially in low-cost manufacturing. (Kham/Reuters).

Over the next few days, Net Politics will countdown the top five developments in cyber policy of 2015. Each policy event will have its own post, explaining what happened, what it all means, and its impact on cyber policy in 2016. In this post, the WSIS+10 process. 

Read more »

The Top Five Cyber Policy Developments of 2015: The WSIS+10 Review

by Guest Blogger Tuesday, December 22, 2015
CFR Cyber Net Politics WSIS+10 Internet Governance The United Nations General Assembly (Mike Segar/Reuters).

Over the next few days, Net Politics will countdown the top five developments in cyber policy of 2015. Each policy event will have its own post, explaining what happened, what it all means, and its impact on cyber policy in 2016. In this post, the WSIS+10 process. 

Read more »

Final Thoughts on China’s World Internet Conference

by Adam Segal Monday, December 21, 2015
Wuzhen provided a scenic venue for the World Internet Conference.

The big takeaway from the second annual World Internet Conference was Xi’s speech and his promotion of cyber sovereignty, which I wrote about here. The rest of the meeting was a bit of letdown, though the infrastructure and logistics were formidable, Wuzhen a very picturesque city to walk around, and the blue-coated volunteers friendly and helpful. But before moving on to the next conference, two quick comments on organization, and one on content.

Read more »

Cyber Week in Review: December 18, 2015

by Adam Segal Friday, December 18, 2015
cyber cfr net politics A carnival float with a papier-mache caricature representing Google and Facebook takes part in a carnival parade in Duesseldorf, Germany in 2015. (Ina Fassbender/Reuters).

Here is a quick round-up of this week’s technology headlines and related stories you may have missed. Given the upcoming holiday season, please note that this will be the last week in review post of the year.

Read more »

Q&A With Peiter Zatko (aka Mudge): Setting Up the Cyber Independent Testing Laboratory

by Robert Knake Friday, December 18, 2015
Cyber Net Politics Mudge Q&A CFR A man types on a computer keyboard in Warsaw in this February 28, 2013 illustration file picture. (Kacper Pempel/Reuters).

In June of 2015, noted cybersecurity researcher Peiter Zatko, better known as Mudge, announced he was leaving Google’s advanced technology and projects group to start what he then dubbed a cyber underwriter’s laboratory at the behest of the White House. In this Q&A, I catch up with Mudge and discuss the origins of the project, its goals, and what he has been up to since launching the effort.

Read more »

Cybersecurity Lessons from Star Wars: Blame Vader, Not the IT Department

by Guest Blogger Thursday, December 17, 2015
CFR Cyber Star Wars Net Politics Darth Vader Darth Vader is terrifying. (Flickr user _Teb/Creative Commons).

Adam Shostack is an entrepreneur, technologist, author and game designer. When not using Star Wars to teach threat modeling, he’s building a stealth startup, benchmarking security effectiveness. You can follow him on Twitter @adamshostack.

Read more »

China’s Internet Conference: Xi Jinping’s Message to Washington

by Adam Segal Wednesday, December 16, 2015
cyber cfr net politics wuzhen xi Xi Jinping speaking at the World Internet Conference, who seems to be channeling Apple's famous 1984 ad.

President Xi Jinping opened the second annual World Internet Conference in Wuzhen, China with a forceful statement of Beijing’s views of how cyberspace should be governed. Most of the ideas in the speech have been heard before–though there was a new call for an international convention on cyberterrorism–but the conference is as much about symbols as it is content. China wants to make Wuzhen the Davos of the Internet and this year Xi delivered his comments in person in an effort to consolidate the conference’s international standing. China is no longer the outside voice at venues organized by others, but has its own platform to promote a competing vision.

Read more »