Attackers in cyberspace have had the systemwide advantage for decades. Reversing this requires both a more nuanced understanding of the offense-defense balance and innovations with leverage that works at scale across the internet.
Latest in Cyber & Technology
On the more technical areas of tech reform, like data portability, U.S. policymakers should learn from China’s experience.
The European Union has stopped issuing cyber sanctions, but it's not for lack of new attacks.
Modern Day General Warrants and the Challenge of Protecting Third-Party Privacy Rights in Mass, Suspicionless Searches of Consumer Databases
Today, more than ever, law enforcement has access to massive amounts of consumer data that allow police to, essentially, pluck a suspect out of thin air. Internet service providers and third parties collect and aggregate precise location data generated by our devices and their apps, making it possible for law enforcement to easily determine everyone who was in a given area during a given time period.
The field has certainly grown apace producing countless case studies highlighting examples of influence operations. Yet in many other ways the field has hit a rut.
Just five years ago, in September 2016, a significant change in the operation of the internet occurred.
A review of Daniel W. Drezner, Henry Farrell and Abraham L. Newman, eds., “The Uses and Abuses of Weaponized Interdependence” (Brookings Institution Press, 2021).
Technical standards set the foundation for billions of devices and systems used daily. Congress has focused on international standards bodies in several provisions of the Senate-passed United States Competition and Innovation Act.
The internet was designed from its very beginnings to be radically decentralized and, therefore, robust to the failure of individual components. A once-distributed system is now being channeled in increasing measure through the infrastructure of a small cadre of cloud service providers.