Net Politics
Blogs

Net Politics

CFR experts investigate the impact of information and communication technologies on security, privacy, and international affairs.

Latest Post

The second battle of Libya during World War II. A British brigadier commanding tank units in Tobruk instructs officers on an operation, using a sand table for demonstration purposes. British Army/Wikimedia

What War Games Tell Us About the Use of Cyber Weapons in a Crisis

Dr. Jacquelyn G. Schneider is an assistant professor and affiliate faculty at the Center for Cyber Conflict Studies at the U.S. Naval War College. This article represents her views alone and do not represent those of the U.S. Naval War College, the U.S. Navy, or the Department of Defense. You can follow her @jackiegschneid. Read More

June 19, 2018

Cybersecurity
The Theft and Reuse of Advanced Offensive Cyber Weapons Pose A Growing Threat

Almost exactly a year ago, North Korea and Russia reused a vulnerability stolen from the U.S. government to conduct the WannaCry and NotPetya ransomware attacks. Is the theft and reuse of vulnerabilities likely to be the norm?

Read More

June 15, 2018

Cybersecurity
Cyber Week in Review: June 15, 2018

This week: sanctions against Russia over malicious cyber activity, reversing the ZTE ban, and Huawei has some trouble down under. 

Read More

June 11, 2018

Cybersecurity
Not The Cyber Deterrence the United States Wants

The U.S. approach to cyber deterrence assumes that Washington will be deterring others. The Obama administration's response to Russian interference in the 2016 election tests that assumption. 

Read More