Join us for a conversation featuring Vicki Birchfield, Erik Brattberg, Philip Breedlove, and Suzanne DiMaggio in conversation with Suzanne Kelly, with special remarks by Sam Nunn on on the path forward for the transatlantic alliance.
Faster and more trackable than cash, newly minted, state-managed digital currencies are poised to revolutionize how the world buys, sells, and invests.
Conspiracies pushed by QAnon played a key role in the January attack on the U.S. Congress.
How are threats of force conveyed in cyberspace? When hackers compromised the SolarWinds Orion software in the spring of 2020, they trojanized the so-called Sunburst backdoor, a system designed to communicate with third-party providers.
The encryption debate in Brazil, much as in Latin America and the Caribbean and across most of the globe, continues to be framed as a tension between, on the one hand, data and communications security and, on the other hand, accessibility for law enforcement and national security purposes.
The key issues around Australia’s encryption laws are oversight and the scope of the laws. Opposition parties and the INSLM want more oversight and a narrower scope. Intelligence agencies are happy with what they have, but they wouldn’t object to having less oversight.
The direction of encryption policy in India remains nebulous, balancing imperatives of the privacy of the individual, the security of digital infrastructure, and government access to personal data, a balance that has only become harder to strike following the unprecedented surge in digitization of government, business, and daily life during the pandemic.
Germany’s government has supported widespread, strong, and unregulated encryption. Instead of focusing on regulating encryption itself, Germany has worked to enable its security agencies to conduct targeted remote hacking operations.
The encryption debate in the European Union (EU) continues to evolve, with new drivers, stronger tools, and increasingly higher stakes. The debate among policymakers and experts is maturing, but there is a widening knowledge gap between political elites and the public around encryption.
Chinese encryption policy is shaped by two competing interests—political control and commercial development.