CFR Presents

Net Politics

CFR experts investigate the impact of information and communication technologies on security, privacy, and international affairs.

Posts by Category

Showing posts for "Cyber crime"

Hacking Charges Against Russian FSB Officers: A Quick Reaction

by Adam Segal
A poster of suspected Russian hacker is seen before FBI National Security Division and the U.S. Attorney's Office for the Northern District of California joint news conference at the Justice Department in Washington, U.S., March 15, 2017. (Yuri Gripas/Reuters).

This post was co-written with Alex Grigsby, assistant director of the Digital and Cyberspace Policy program.

Read more »

The UN Counter-Terrorism Committee Revisits Terrorism in Cyberspace

by David Fidler
Twitter hashtag for UN Counter-Terrorism Committee meetings on ICT terrorism, Nov. 30-Dec. 1, 2016 (D Fidler)

Last week, the UN Security Council’s Counter-Terrorism Committee held meetings on preventing the exploitation of information and communication technologies (ICTs) for terrorist purposes. These meetings, like similar ones in December 2015, focused on the self-declared Islamic State’s use of the internet and social media and highlighted increased activities during 2016 against ICT terrorism by international organizations, governments, civil society, and tech companies. However, problems exposed in 2015 appeared again in these meetings, raising questions about what impact the increased actions have had.

Read more »

Africans Want Cross-Border Data Access Reform, But They Might Get Left Out

by Guest Blogger
CFR Cyber Net Politics MLAT Africa A women checks a message on her mobile phone in Epworth, east of the capital Harare, Zimbabwe, August 11,2016. (Philimon Bulawayo/Reuters).

Mailyn Fidler is a fellow at the Berkman Klein Center for Internet and Society at Harvard University. You can follow her @mailynfidler

Read more »

A Common Insurance Fund to Improve the U.S.-China Cyber Relationship

by Guest Blogger
Xi Obama Net Politics Cyber CFR China's President Xi Jinping (L) and U.S. President Barack Obama arrive for a joint news conference in the Rose Garden at the White House in Washington September 25, 2015. (Gary Cameron/Reuters).

Fred Tsai is a senior director of strategy at Salesforce.com in San Francisco. Previously, he served as Dell Inc.’s director of China strategy.  His comments represent his personal views and not those of Salesforce.com.

Read more »

The Implications of Brexit on UK Cyber Policy

by David Fidler
CFR Cyber net politics brexit A British flag lies on the street in London after Britain voted to leave the European Union. (Reinhard Krause/REUTERS).

The United Kingdom’s vote to leave the European Union has prompted pundits and politicians to speculate on what the result means for the country, Europe, and the world. To paraphrase Churchill, never before have so few created such doubt for so many. These speculations touch on the practical politics and philosophical implications of the United Kingdom’s disengagement from the European Union. The Brexit process will affect practical and philosophical aspects of cyberspace politics as well.

Read more »

California’s Gangs Go Digital and Global

by Guest Blogger
CFR Cyber Net Politics A gang member looks on as he attends a mass at the prison of Izalco ion El Salvador in 2012. (Ulises Rodriguez/Reuters).

Robert Muggah is co-founder and research director of the SecDev Foundation and the Igarapé Institute. He is co-editor of a new volume entitled Open Empowerment: From Digital Protest to Cyberwar that focuses on the evolution of digital crime in the Americas. Julian Way is a lead analyst at the SecDev Group and research fellow at the SecDev Foundation. 

Read more »

After a Chinese National Pleads Guilty to Hacking, What’s Next for the U.S.-China Relationship?

by Adam Segal
Mark Jette, lawyer for Su Bin, speaks to the media after Su was denied bail during a hearing in Vancouver July 23, 2014. (Ben Nelms/Reuters) Mark Jette, lawyer for Su Bin, speaks to the media after Su was denied bail during a hearing in Vancouver July 23, 2014. (Ben Nelms/Reuters)

Late Wednesday, the Department of Justice announced that Su Bin, a Chinese national living in Canada, had plead guilty to “participating in a years-long conspiracy to hack into the computer networks of major U.S. defense contractors, steal sensitive military and export-controlled data and send the stolen data to China.” Over several years, under Su’s direction, two hackers stole some 630,000 files from Boeing related to the C-17 military transport aircraft as well as data from the F-35 and F-22 fighter jets. The information included detailed drawings; measurements of the wings, fuselage, and other parts; outlines of the pipeline and electric wiring systems; and flight test data.

Read more »

Paying Ransom on Ransomware Should be Illegal

by Robert Knake
Kim Dotcom CFR Cyber Net Politics Megaupload founder Kim Dotcom has an extravagant lifestyle. (Nigel Marple/Reuters).

Two weeks ago, a California hospital paid $17,000 to cyber criminals who had broken into its computer network and taken its data hostage. The attackers used ransomware, a type of malicious software, to encrypt the files at Hollywood Presbyterian Medical Center, and would only provide the decryption key upon payment in bitcoin of the ransom.

Read more »

No, the FDIC Doesn’t Insure Your Bank Account Against Cybercrime (and Why That Is OK)

by Robert Knake
Cybercrime CFR Cyber Net Politics Sheets of former U.S. President Abraham Lincoln on the five-dollar bill currency are seen at the Bureau of Engraving and Printing in Washington in 2015. (Gary Cameron/Reuters).

2016 may be the year when financial services regulators “get tough” on cybersecurity. The head of the Commodity Futures Trading Commission recently said that his organization would likely push out cybersecurity standards. The Securities and Exchange Commission recently put out new examination priorities. And the New York Department of Financial Services sent a letter to federal regulators outlining its proposal for regulation.

Read more »