Op-Eds & Commentaries

What the Federal CISO Needs to get the Job Done

October 31, 2016

Read the full article here

Russia's Aggressive Power is Resurgent, Online and Off

August 25, 2016

Read the full article here

NATO After Brexit

July 04, 2016

Commentators have rushed to weigh in on the political and economic implications of the Brexit referendum. But the potential security effects are just as important. At risk are operational matters such as data and intelligence sharing. But also in question is something more fundamental: the relationships that allow security services to live and breathe. The United Kingdom, EU, and other partners will now have to redefine their security and intelligence relationships.

A Cyber JSOC Could Help the US Strike Harder and Faster

April 25, 2016

A network-attack analogue to the manhunting Joint Special Operations Command would allow cyber warriors to decide, deconflict, and execute more effectively.

Beyond Brussels: Turning the Tide against ISIL in Europe

March 31, 2016

In a tragic example of foreshadowing, French Minister of the Interior Bernard Cazeneuve stated in remarks at the George Washington University earlier this month that the terrorist threat level had never been so high. Last week’s attacks in Brussels plainly reinforce the point while begging the question of how they were possible.

Opinion: $19 billion alone won't fix Washington's cybersecurity problem

February 10, 2016

Spending more on cybersecurity is a start but it's certainly no panacea. President Obama's new spending plans should come with policy proposals and organizational initiatives that stand in the way of protecting US networks from malicious hackers.

Estonia: A Hub of Cyber Innovation

January 07, 2016

Estonia packs a punch in the cyber domain. The country is a world leader in cyber-related innovation, and it has charted that course without compromising security. Estonia initially gained global attention as a cyber-target, seeking to overcome a series of organized attacks in 2007 widely attributed to Russian groups. Estonia emerged energetically from those attacks, going beyond devising a coherent and expansive cyber-strategy calibrated defensively, to being one of the most wired countries in the world.

The US Needs Someone to Run the Effort to Defeat ISIS Online

December 21, 2015

If the United States and our allies are to reclaim the cyber battlefield from the Islamic State, we need a playbook for pushback, just as we would prepare battle plans to prosecute a war kinetically. First, we must collect online information and intelligence necessary to understand and ultimately defeat the adversary. Second, we must shut down the most noxious sources that amplify the most violent voices. Third, we must push back on ISIS’s narrative, expose its myths and falsehoods, and provide a credible and constructive alternative.

Paris Insights

November 24, 2015

PARIS INSIGHTS contains the reflections of key decision-makers and subject matter experts on three dimensions of the terrorist attacks in Paris on November 13, 2015: The implications of the Paris attacks, what they mean for the U.S. homeland in particular, and thoughts on the way forward.

Could New Global Regime Tame “Wild West” of Cyberspace?

November 12, 2015

A British intelligence agency warned this week that cyberattacks threatening the United Kingdom’s security doubled in a year, and similar challenges face every nation with digital infrastructure, leading policymakers to pursue the development of new norms of behavior in cyberspace. What has already been achieved in the area, and what obstacles stand in the way of further progress?

Vulnerability and Resilience in the Internet of Everything

September 22, 2015

By 2020, billions of devices will be connected online. The possibilities within this Internet of Everything are innovative, extensive, and valuable. Think driverless cars, “smart” houses and cities, and critical healthcare delivered virtually to remote locations. But these developments also have a dark side. With opportunity comes challenge, in the form of vulnerability.

Economic cyber-espionage: Time to tame the dragon

September 16, 2015

Later this month, China’s President Xi Jinping will travel to the United States for a weeklong visit that will include meetings with President Obama and the United Nations. The visit comes at a time of some turbulence in the bilateral relationship whose waters have been roiled recently by multiple incidents, “from China’s activities in the South China Sea to cyberespionage.”

Economic Espionage: A Case for Why the U.S. Needs to Push Back

August 17, 2015

Randall Coleman, the head of the FBI’s counterintelligence division, says that much of the suspicious activity is performed by Chinese companies against U.S. firms and that the Chinese government plays “a significant role” in the attempted theft of trade secrets. It’s time to demonstrate that truly egregious actions really do have significant consequences...

Canada’s Cyber-Attack Reveals Need for Greater Government Resilience

June 25, 2015

Last Wednesday, the government of Canada was the target of a distributed denial of service (DDoS) attack that took down multiple federal websites, including those of the Departments of Justice, and Foreign Affairs. The hacker group Anonymous is claiming responsibility for the attack, stating in a tweet that it was executed to protest Bill C-51, the government’s then proposed anti-terrorism legislation.

Meet Our Staff

Read about our Staff and other pieces they’ve authored.

Meet Our Senior Fellows

Read about our Senior Fellows and other pieces they’ve authored.