While the United States is right to counteract illicit technology transfer and protect work opportunities for Americans, it must do so in a way that avoids inflicting unnecessary harm on its own science and innovation base by disrupting one of its most important international STEM talent sources.
The risk of the United States and China going to war, leading to a nuclear exchange, is growing by the day. Cyber operations by either or both countries increase the risk significantly, as each side is tempted to use cyber tools to gain warning and an early edge in a crisis.
What are the ‘rules of the road’ for cyberspace, and who sets them? The question has risen in prominence and priority as cyber threats have grown more severe. A lack of clarity about acceptable behavior enables destabilizing cyber activity.
Join us for a conversation featuring Vicki Birchfield, Erik Brattberg, Philip Breedlove, and Suzanne DiMaggio in conversation with Suzanne Kelly, with special remarks by Sam Nunn on on the path forward for the transatlantic alliance.
Faster and more trackable than cash, newly minted, state-managed digital currencies are poised to revolutionize how the world buys, sells, and invests.
Conspiracies pushed by QAnon played a key role in the January attack on the U.S. Congress.
How are threats of force conveyed in cyberspace? When hackers compromised the SolarWinds Orion software in the spring of 2020, they trojanized the so-called Sunburst backdoor, a system designed to communicate with third-party providers.
The encryption debate in Brazil, much as in Latin America and the Caribbean and across most of the globe, continues to be framed as a tension between, on the one hand, data and communications security and, on the other hand, accessibility for law enforcement and national security purposes.
The key issues around Australia’s encryption laws are oversight and the scope of the laws. Opposition parties and the INSLM want more oversight and a narrower scope. Intelligence agencies are happy with what they have, but they wouldn’t object to having less oversight.
The direction of encryption policy in India remains nebulous, balancing imperatives of the privacy of the individual, the security of digital infrastructure, and government access to personal data, a balance that has only become harder to strike following the unprecedented surge in digitization of government, business, and daily life during the pandemic.