-
Countering the Ransomware Threat: A Whole-of-Government Effort
The United States government has adopted a comprehensive approach to combating ransomware. -
France Doubles Down on Countering Foreign Interference Ahead of Key Elections
Following an increase in foreign interference and hostile information operations—both at home and abroad—the French government is preparing to fight back. -
Agile Multilateralism Is Needed to Address Cybercrime Safe Havens
To solidify recent gains against cybercrime safe havens, the United States must work with capable and willing partners and increase the pressure on countries that harbor cyber criminals. -
How Facebook’s Outage Could Shape Public Preferences on Cybersecurity Policy
What can public opinion polling tell us about public perceptions of cybersecurity? -
Will the EU Lose Access to U.S. Data Flows and Software?
Some EU decision-makers have adopted a radical and unreasonable interpretation of EU data protection law that lacks a limiting principle. -
Facial Recognition as a Less-Bad Option
The perils that flow from facial recognition can be mitigated through sensible limits without banning the technology and the risks of facial recognition are less bad than the options police have without ... -
Mark Zuckerberg’s Metaverse Unlocks a New World of Content Moderation Chaos
Given Facebook's problematic history with moderating its platform, the metaverse could recreate and exacerbate existing problems in a new environment. -
Summary of the GAO Report on Federal Use of Facial Recognition Technology
Federal departments are poised to expand their use of facial recognition systems across a wide range of use cases in the absence of federal regulation. -
A Hypothetical Command Vision Statement for a Fictional PLA Cyber Command
What would be the impact of other cyber powers adopting U.S. Cyber Command’s Command Vision concepts in pursuing their own security interests? -
Prosecuting Project Raven: A New Frontier for Export Control Enforcement
The deferred prosecution agreements for three members of Project Raven charged with hacking on behalf of a foreign government seem to set a precedent for lenient treatment for this type of conduct. In re... -
Online Regulation of Terrorist and Harmful Content
The surge of global internet regulation to combat terrorism and other harmful digital content continues to pose a risk to the freedom of expression online and the rule of law and leaves unanswered many q... -
What’s Working and What Isn’t in Researching Influence Operations?
The field has certainly grown apace producing countless case studies highlighting examples of influence operations. Yet in many other ways the field has hit a rut.



