Confrontation in cyber space is increasingly alarming. To come to grips with cyber power and its implications, people naturally turn to historical analogies.
Efforts to promote international norms for cyberspace are more likely to succeed if their advocates clearly grasp and convey to other actors how norms tend to function in different global contexts.
Increasingly frequent and severe cyberattacks targeting the private sector are fueling debates around the world over whether or not to allow corporations to engage in active cyber defense.
Understanding Cyber Conflict draws lessons from past technological disruptions to inform and shape responses to today’s cyber challenges.
Identifying the legal norms that apply in cyberspace remains highly challenging.
The G20 should commit not to manipulate the integrity of data and algorithms of financial institutions and to cooperate when such incidents occur.
Faced with limited capacity and resources, governments need to develop a complementary, legitimate space for private sector active cyber defense.
With the recent allegations about Russia’s military intelligence targeting U.S. voting software suppliers, more and more details are becoming available about what looks like a comprehensive, multifaceted operation targeting U.S. elections in 2016.
At a moment of uncertainty and unease in global politics and economics, German Finance Minister Wolfgang Schäuble will offer his thoughts on the future of Europe, the transatlantic partnership, and the global economy, as well as preview the priorities of the Germany G20 presidency.
International humanitarian law applies only to international and non-international armed conflicts. Most offensive cyber operations to date have not taken place during an armed conflict.
The Carnegie Cyber Policy Initiative focuses on addressing international cyber policy challenges, as cyberspace is increasingly central to international security and diplomacy. The Initiative develops and promotes norms and policy recommendations for enhancing international stability and security in cyberspace.