CFR Presents

Net Politics

CFR experts investigate the impact of information and communication technologies on security, privacy, and international affairs.

Posts by Category

Showing posts for "Cybersecurity"

Why Policymakers Should Care About Weak Digital Infrastructure Abroad

by Guest Blogger
Cybersecurity Capacity Building Net Politics Cyber CFR The Organization of American States hosts a cyber crisis management exercise in June 2013. (Maria Patricia Leiva/Courtesy the OAS)

Mirko Hohmann is a Project Manager and Alexander Pirang is a non-resident Fellow with the Global Public Policy Institute (GPPi) in Berlin. You can follow Hohmann @mirkohohmann.

Read more »

President Trump Should Make the Power Grid Great Again

by Robert Knake
Department of Homeland Security workers at the National Cybersecurity and Communications Integration Center in Arlington, Virginia, January 13, 2015. (Larry Downing/Reuters).

Earlier this week, I published a paper making recommendations on how to protect the power grid from a cyberattack. Although my main argument is that government needs to create incentives for utility owners and operators to invest in cybersecurity, that investment should take place in part of a massive new investment to improve the grid’s resilience. It also needs to be redesigned to handle the shifting supply from renewable resources and be capable of moving electricity from where it is produced to where it is consumed.

Read more »

Hacking Charges Against Russian FSB Officers: A Quick Reaction

by Adam Segal
A poster of suspected Russian hacker is seen before FBI National Security Division and the U.S. Attorney's Office for the Northern District of California joint news conference at the Justice Department in Washington, U.S., March 15, 2017. (Yuri Gripas/Reuters).

This post was co-written with Alex Grigsby, assistant director of the Digital and Cyberspace Policy program.

Read more »

Wikileaks and the CIA: What’s in Vault7?

by Adam Segal
The Central Intelligence Agency (CIA) logo. (Yuri Gripas/Reuters).

On Tuesday, Wikileaks released a huge cache of documents it said were descriptions of CIA cyber tools used to break into smartphones, computers and internet-connected TVs. Wikileaks says the documents came from an inside source–speculation is it is either a CIA operator or contractor–and claimed the release was meant to spur a debate over “whether the CIA’s hacking capabilities exceed its mandated powers” and “the security, creation, use, proliferation and democratic control of cyberweapons.” In any case, it is damaging to the CIA and another in a growing list of embarrassing instances of the U.S. intelligence agencies losing control of their digital weapons (see, for example, Edward Snowden; Shadow Brokers; Harold Thomas Martin III).

Read more »

The Trump Administration Plays Right into Russia’s Information Warfare Strategy

by David Fidler
Painted Matryoshka dolls, or Russian nesting dolls, bearing the faces of U.S. Republican presidential nominee Donald Trump and Russian President Vladimir Putin are displayed for sale at a souvenir shop in central Moscow, Russia November 7, 2016. (Sergei Karpukhin/Reuters).

In discussing what President Trump might do in cybersecurity, an acquaintance sent me a hyperlink to a story supporting his perspective. The link contained an article from RT, formerly known as Russia Today–a tool of the Russian government. The link appeared during our robust sharing of ideas, not as a warning about Russian propaganda. But, there, in my email inbox was a manifestation of Russian information warfare.

Read more »

“You’re Fired!” Will Not Fix Federal Cybersecurity

by Robert Knake
Donald Trump, former host of the NBC television reality series "The Apprentice", says his catch line from the show as he arrives at a casting call for the sixth season of the show at Universal Studios Hollywood in Los Angeles March 10, 2006. (Fred Prouser/Reuters).

Earl Crane, former director for federal cybersecurity at the National Security Council and founder of Emergent Network Defense, co-authored this piece. 

Read more »

The Cybersecurity Dilemma: Where Thucydides Meets Cyberspace

by Guest Blogger
Thucydides, the grandfather of the security dilemma. (Flickr user Chris JL)

Ben Buchanan is a postdoctoral fellow at Harvard University’s Cybersecurity Project. His first book, The Cybersecurity Dilemma, was published by Oxford University Press in 2017. You can follow him @BuchananBen.

Read more »