iOS app Android app


After Paris: War Is Not What It Used to Be

Moisés Naím | Posted 11.15.2015 | World
Moisés Naím

In reaction to the Paris massacre, French President François Hollande said, "[This] is an act of war ... committed by a terrorist army." Acts of war used to be the monopoly of nation-states. Obviously, that is no longer the case.

Russia's 'Lukewarm' War

Geza Tatrallyay | Posted 10.29.2015 | World
Geza Tatrallyay

It is worth focusing on the means that Putin is employing to further his strategic international goals of expanding Russian power and hegemony and weakening NATO and the European Union.

Today Corrupt Officials Spend Your Money. Tomorrow This Will Stop Them.

Singularity University | Farah_Mohamed | Posted 10.26.2015 | World

Honduras has had the world’s highest murder rate for years. The Transparency International organization’s Corruption Perception Index ran...

For China and the U.S., Cyber Governance Is Better Than Cyberwar

Shen Yi | Posted 09.22.2015 | World
Shen Yi

SHANGHAI -- On the American West Coast, it will be a picture of entrepreneurial optimism characterized by growth and opportunities. Back East at the political center inside the Beltway, a chilly atmosphere with shrill rhetoric awaits Xi.

Digital Warfare (VIDEO)

XPRIZE | Posted 06.10.2015 | Technology

In the future, what countries do with digital weapons may be more destructive than boots on the ground or drones in the sky.

The Business of Cybercrime

XPRIZE | Posted 06.01.2015 | Technology

The competitions designed by XPRIZE touch the furthest reaches of human achievement in fields like health care, oceanography and space exploration. We are currently designing a prize competition in the field of cybersecurity.

The End of Privacy (VIDEO)

XPRIZE | Posted 06.01.2015 | Technology

In this three-part video series, you'll hear from some of the giants in the Internet and cyber security fields as they relate stories of cybercrime becoming a worldwide business, privacy becoming an antiquated idea, the discovery of Stuxnet and the real possibility of cyber warfare.

Moving From Axis to Access of Evil

Stanley Weiss | Posted 04.08.2015 | World
Stanley Weiss

If the first 15 years of the 21st century were defined by the so-called Axis of Evil -- the phrase George W. Bush applied to Iraq, Iran, and North Korea for their support of terrorists -- the next 15 years will likely be defined by the Access of Evil, as state and non-state cyberterrorists use technology to bypass our defenses in ways that damage businesses, lives, and nations.

The Second Crypto War and the Future of the Internet

Matthew Prince | Posted 03.23.2015 | Technology
Matthew Prince

Today, the technology industry is more powerful and better organized than it was when it won the first Crypto War. However, I am concerned that the industry underestimates the threat posed by regulators reluctant to use strong crypto.

Cyberwar or Cybervandalism?

Chris Weigant | Posted 02.21.2015 | Politics
Chris Weigant

Does hacking into a private entertainment corporation's computer files constitute an act of war? Against whom, exactly?

North Korea's Cyberarmy

AP | YOUKYUNG LEE | Posted 12.18.2014 | Technology

SEOUL, South Korea (AP) — Most North Koreans have never seen the Internet. But the country Washington suspects is behind a devastating hack on Sony...

The Wuzhen Summit and Chinese Internet Sovereignty

Franz-Stefan Gady | Posted 02.07.2015 | Politics
Franz-Stefan Gady

China's concept of Internet sovereignty seems likely to result in a diplomatic cul-de-sac. However, Chinese officials will continue to employ sovereignty issues to occupy conference agendas and stall real progress on international cooperation in cyberspace.

The Axiom Report: Cybersecurity and Its Impact on China-U.S. Relations

Franz-Stefan Gady | Posted 01.05.2015 | Politics
Franz-Stefan Gady

While the actual impact of the Novetta report on making U.S. systems more secure from Chinese attacks in the long run will be negligible on the diplomatic front, the recent Axiom revelations will allow the U.S. government to press the Chinese side harder on contentious cybersecurity issues.

The Dawn of World War IV: America Under Cyber Attack | Posted 12.22.2014 | Money

Einstein was wrong. World War IV will not be fought with sticks or rocks. It will be fought with bits and bytes, Trojans and bots, APTs and zero-days -- it's already started and we're already losing.

Chinese Cyber-Attacks: Will the United States Step Up Its Active Cyber Defense Posture?

Franz-Stefan Gady | Posted 07.27.2014 | Politics
Franz-Stefan Gady

To avoid escalatory steps, the United States and China have to find ways to have an open and fair dialogue on cyber-espionage and other cybersecurity related issues.

De-Escalation in Cyberspace: It is China's Turn to Act!

Franz-Stefan Gady | Posted 07.07.2014 | Politics
Franz-Stefan Gady

While there is an inherent asymmetry between U.S. and Chinese military capabilities in related technology, this should not be used as an excuse by the Chinese leadership to avoid a more open engagement with the United States in the coming months and try to break the cyber stalemate between the two rivals.

China-EU Cooperation on Combatting Cybercrime: A Model for China-US Relations?

Franz-Stefan Gady | Posted 06.30.2014 | Politics
Franz-Stefan Gady

The European Union is by its mere existence inherently an anomaly in modern Chinese political thought, which emphasizes state sovereignty and territorial integrity. Yet the transnational need for increased EU-China cooperation on cybercrime is more pressing than ever.

Too Big to Jail? Why Kidnapping, Torture, Assassination, and Perjury Are No Longer Crimes in Washington

Tom Engelhardt | Posted 06.21.2014 | Politics
Tom Engelhardt

Tthere is but one crime for which anyone in America's national security state can be held accountable in a court of law, and that's leaking information that might put those in it in a bad light or simply let the American public know something more about what its government is really doing.

A Wake-up Call on Government Security?

Rebecca Abrahams | Posted 06.02.2014 | Technology
Rebecca Abrahams

Co-authored by Dr. Stephen Bryen, Chairman, Ziklag Systems Rachel King and Danny Yardon of the Wall Street Journal have done some excellent reporti...

Advice Too Secret to Ignore

Tom Engelhardt | Posted 05.19.2014 | Politics
Tom Engelhardt

"'Be prepared' isn't just a saying for boy scouts -- not any more, not on our new, totally connected, and remarkably dangerous cyberplanet."

Obama Sees Limited Options For Cyberwar In Syria

New York Times | DAVID E. SANGER | Posted 02.24.2014 | Politics

Not long after the uprising in Syria turned bloody late in the spring of 2011, the Pentagon and the National Security Agency developed a battle plan t...

Intensifying Cyber Threats

Jonathan Zittrain | Posted 03.24.2014 | Impact
Jonathan Zittrain

Perceived digital warfare is escalating as a sophisticated breed of attack against corporations, governments and individuals.

We Need a Geneva Convention on Cyber Warfare

Chris Weigant | Posted 12.28.2013 | Politics
Chris Weigant

The "brave new world" of computer warfare -- in all its frightening aspects -- desperately needs some rules and limits. Communications spying and drone attacks are only the precursors for what could be eventually deployed against the United States.

A New Era of Digital Protest

Robert Muggah | Posted 01.23.2014 | World
Robert Muggah

Social networks are viewed with suspicion by the political establishment. Many governments are finding it increasingly difficult to control the public narrative in a world where information is available in realtime, and on an unfathomable scale.

Someone Is Telling Iranian Scientists: Don't Buy Green Bananas!

Haggai Carmon | Posted 01.23.2014 | World
Haggai Carmon

Someone has been sending a message to Iranian nuclear scientists, and now to Iranian Cyberwar experts: don't bother buying green bananas; before they ripen, you could be dead.