The Implications of Brexit on UK Cyber Policy
The United Kingdom’s vote to leave the European Union has prompted pundits and politicians to speculate on what the result means for the country, Europe, and the world. To paraphrase Churchill, never...
View ArticleDisclosure of DNC Emails: Was Russia Making Up for the Fact It Got Caught?
Alex Grigsby is the assistant director for the Digital and Cyberspace Policy program at the Council on Foreign Relations. Identifying the responsible party for a cyber incident is always a challenge....
View ArticleBlaming Russia For the DNC Hack Is Almost Too Easy
Dr. Sandro Gaycken is the Director of the Digital Society Institute, a former hacktivist, and a strategic advisor to NATO, some German DAX-companies and the German government on cyber matters. The hack...
View ArticleIs Hacking Hillary Clinton Russian Payback for the “Freedom to Connect”?
Allegations the Russian government hacked the Democratic National Committee (DNC), Democratic Congressional Campaign Committee (DCCC), and the Hillary Clinton campaign have generated intense attention,...
View ArticleCongress Needs to Warn Russia on Election Interference
Responding to reports that Russian hackers stole voter lists in Arizona and Illinois, federal officials are scrambling to help states protect voting systems from cyberattacks in the next sixty days....
View ArticleShouting at Americans: A Peek Into French Signals Intelligence
Alex Grigsby is the assistant director for the Digital and Cyberspace Policy program at the Council on Foreign Relations. Something remarkable happened a few months ago. Bernard Barbier, the former...
View ArticleLessons From the Cold War to Combat Modern Russian Disinformation Campaigns
Robert Caruso served in the Department of Defense and Department of State in the administrations of George W. Bush and Barack H. Obama. You can find him on Twitter @robertcaruso. Since Russia’s 2008...
View ArticleThe U.S.-China Cyber Espionage Deal One Year Later
A year ago, presidents Barack Obama and Xi Jinping stood next to each other and declared that neither the U.S. nor Chinese governments “will conduct or knowingly support cyber-enabled theft of...
View ArticleAfter Attributing a Cyberattack to Russia, the Most Likely Response Is Non Cyber
Almost four months after the cybersecurity firm CrowdStrike claimed that two Russian hacker groups were behind the theft of data from computers at the Democratic National Committee and other political...
View ArticleDemocracy and Digital Technology After the 2016 Election
Efforts to understand the causes and consequences of Donald J. Trump’s victory are underway, and this election illuminates features about the relationship between democratic politics and digital...
View ArticleRaising the Cost to Chinese Hackers
The Director of National Intelligence released his annual threat assessment last week, and cyberattacks top the list. There were at least three headlines in Clapper’s written and oral statements....
View ArticleThe Relationship Between the Biological Weapons Convention and Cybersecurity
Today, the Biological Weapons Convention (BWC)—the first treaty to ban an entire class of weapons—marks the 40th anniversary of its entry into force. Reflections on this milestone will examine the...
View ArticleSanctioning Hackers
President Obama signed an executive order today that allows the U.S. Department of the Treasury to sanction individuals or entities involved in “significant malicious cyber-enabled activities” (you can...
View ArticleThe UN GGE on Cybersecurity: How International Law Applies to Cyberspace
This week, Net Politics is taking a look at the work of the UN Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security,...
View ArticleThe Messages the Federal Court of Appeals Sent to Congress and the Executive...
Last week, a federal appeals court ruled that Section 215 of the PATRIOT Act does not authorize the NSA’s telephone metadata surveillance program. Since Edward Snowden disclosed it in June 2013, the...
View ArticleTaking Stock of Snowden’s Disclosures Two Years On
Last Friday marked the second anniversary of the start of Edward Snowden’s disclosures. The days preceding this anniversary highlighted Snowden’s continued prominence. On June 1, Section 215 of the USA...
View ArticleThe OPM Hack: Weighing the Damage to U.S. Intelligence
I finally got my letter from the Office of Personnel Management (OPM). What a relief. I was worried my credibility as a commentator would be damaged if my data wasn’t stolen. Imagine how Dan Rather...
View ArticleEspionage in the Digital Era: Lessons From the OPM Hack
Brandon Valeriano is a Senior Lecturer at the University of Glasgow, and recently published Cyber War versus Cyber Realities on Oxford University Press. Stephen Coulthart is a Senior Lecturer in the...
View ArticleRetaliating Against China’s Great Firewall
David Sanger has a very interesting article in Saturday’s New York Times, reporting that the United States has decided to retaliate against China for the hacking of the Office of Personnel Management....
View ArticleAvoiding Escalation in Cyberspace
Brandon Valeriano is a Senior Lecturer at the University of Glasgow and Ryan C. Maness is a Postdoctoral Researcher at Northeastern University. They have recently published Cyber War versus Cyber...
View ArticleQuick Reactions to the U.S.-China Cybersecurity Agreement
After an all night sessions at the Marriot Wardman Park, the United States has emerged with a landmark cybersecurity agreement with China. The deal has three parts: China agrees to stop engaging in...
View ArticleU.S.-China Cyber Deal Takes Norm Against Economic Espionage Global
For years, the United States has argued that economic espionage by governments is wrong and should stop. The U.S. government became more vocal about this position as the Internet provided means for...
View ArticleThe Top Five Cyber Policy Developments of 2015: United States-China Cyber...
Over the next few days, Net Politics will countdown the top five developments in cyber policy of 2015. Each policy event will have its own post, explaining what happened, what it all means, and its...
View ArticleChina’s Strategic Support Force: The New Home of the PLA’s Cyber Operations?
Lincoln Davidson is a research associate for Asia Studies at the Council on Foreign Relations. China’s military reforms, which have sped up since Xi Jinping came to power in 2012, are making steady...
View ArticleAfter a Chinese National Pleads Guilty to Hacking, What’s Next for the...
Late Wednesday, the Department of Justice announced that Su Bin, a Chinese national living in Canada, had plead guilty to “participating in a years-long conspiracy to hack into the computer networks of...
View ArticleReducing and Managing U.S.-China Conflict in Cyberspace
Two weeks ago, the Financial Times ran a story that suggested China was sticking by its September 2015 commitment to not engage in cyber-enabled economic espionage. It quoted officials from private...
View ArticleA Fancy Bear Finds Its Way Into the Middle Kingdom
Lorand Laskai, research assistant in the Asia studies program, and Alex Grigsby, assistant director of the Digital and Cyberspace Policy program, contributed to this post. Earlier this week, Chinese...
View ArticleWikileaks and the CIA: What’s in Vault7?
On Tuesday, Wikileaks released a huge cache of documents it said were descriptions of CIA cyber tools used to break into smartphones, computers and internet-connected TVs. Wikileaks says the documents...
View ArticleHacking Charges Against Russian FSB Officers: A Quick Reaction
This post was co-written with Alex Grigsby, assistant director of the Digital and Cyberspace Policy program. This morning, the U.S. Department of Justice (DOJ) announced the indictment of four people...
View Article