The key issues around Australia’s encryption laws are oversight and the scope of the laws. Opposition parties and the INSLM want more oversight and a narrower scope. Intelligence agencies are happy with what they have, but they wouldn’t object to having less oversight.
The direction of encryption policy in India remains nebulous, balancing imperatives of the privacy of the individual, the security of digital infrastructure, and government access to personal data, a balance that has only become harder to strike following the unprecedented surge in digitization of government, business, and daily life during the pandemic.
Germany’s government has supported widespread, strong, and unregulated encryption. Instead of focusing on regulating encryption itself, Germany has worked to enable its security agencies to conduct targeted remote hacking operations.
The encryption debate in the European Union (EU) continues to evolve, with new drivers, stronger tools, and increasingly higher stakes. The debate among policymakers and experts is maturing, but there is a widening knowledge gap between political elites and the public around encryption.
Chinese encryption policy is shaped by two competing interests—political control and commercial development.
Increasing diversity in the field of countering influence operations is essential to the field’s future. Members of the counter–influence operations community discuss the barriers to greater diversity and recommendations for making progress.
Without dedicated action, the global financial system will only become more vulnerable as innovation, competition, and the pandemic further fuel the digital revolution.
The spread of infectious diseases is a long-term, continually evolving threat, and India needs a full-time governmental body to prevent and mitigate impending biological disasters.
Immigration is critical to U.S. science success. But policies instituted under Donald Trump threaten STEM talent flows from China. The Biden administration should quickly revisit these changes.
In this growing field, few standards exist for researching influence operations. This panel explores one of the thorniest investigative challenges: who is behind an influence operation?