Op-Eds & Commentaries

The US Needs Someone to Run the Effort to Defeat ISIS Online

December 21, 2015

If the United States and our allies are to reclaim the cyber battlefield from the Islamic State, we need a playbook for pushback, just as we would prepare battle plans to prosecute a war kinetically. First, we must collect online information and intelligence necessary to understand and ultimately defeat the adversary. Second, we must shut down the most noxious sources that amplify the most violent voices. Third, we must push back on ISIS’s narrative, expose its myths and falsehoods, and provide a credible and constructive alternative.

Paris Insights

November 24, 2015

PARIS INSIGHTS contains the reflections of key decision-makers and subject matter experts on three dimensions of the terrorist attacks in Paris on November 13, 2015: The implications of the Paris attacks, what they mean for the U.S. homeland in particular, and thoughts on the way forward.

Could New Global Regime Tame “Wild West” of Cyberspace?

November 12, 2015

A British intelligence agency warned this week that cyberattacks threatening the United Kingdom’s security doubled in a year, and similar challenges face every nation with digital infrastructure, leading policymakers to pursue the development of new norms of behavior in cyberspace. What has already been achieved in the area, and what obstacles stand in the way of further progress?

Vulnerability and Resilience in the Internet of Everything

September 22, 2015

By 2020, billions of devices will be connected online. The possibilities within this Internet of Everything are innovative, extensive, and valuable. Think driverless cars, “smart” houses and cities, and critical healthcare delivered virtually to remote locations. But these developments also have a dark side. With opportunity comes challenge, in the form of vulnerability.

Economic cyber-espionage: Time to tame the dragon

September 16, 2015

Later this month, China’s President Xi Jinping will travel to the United States for a weeklong visit that will include meetings with President Obama and the United Nations. The visit comes at a time of some turbulence in the bilateral relationship whose waters have been roiled recently by multiple incidents, “from China’s activities in the South China Sea to cyberespionage.”

Economic Espionage: A Case for Why the U.S. Needs to Push Back

August 17, 2015

Randall Coleman, the head of the FBI’s counterintelligence division, says that much of the suspicious activity is performed by Chinese companies against U.S. firms and that the Chinese government plays “a significant role” in the attempted theft of trade secrets. It’s time to demonstrate that truly egregious actions really do have significant consequences...

Canada’s Cyber-Attack Reveals Need for Greater Government Resilience

June 25, 2015

Last Wednesday, the government of Canada was the target of a distributed denial of service (DDoS) attack that took down multiple federal websites, including those of the Departments of Justice, and Foreign Affairs. The hacker group Anonymous is claiming responsibility for the attack, stating in a tweet that it was executed to protest Bill C-51, the government’s then proposed anti-terrorism legislation.

Massive government employee data theft further complicates US-China relations

June 08, 2015

In the ever-escalating compendium of cyber incidents and intrusions, an enormous US government breach – perhaps the largest ever – came to light last week with news of a federal hack affecting “nearly every government agency.”

We Don't Need a Crisis to Act Unitedly Against Cyber Threats

June 01, 2015

Cybercrime has led to one of the greatest thefts of money, information, intellectual property and state secrets in modern history.

Cyber Deterrence Is a Strategic Imperative

April 28, 2015

From botnet takedowns to joint activities with law enforcement, there is a role to be played in cyber deterrence by nearly every public and private entity in the U.S., Guest Contributors Frank J.

Delays in confirming DHS management nominee put our security at risk

April 10, 2015

This past Sunday, 60 Minutes aired a segment examining the Department of Homeland Security (DHS) that was generally positive about Secretary Jeh Johnson’s leadership of DHS, but also described the department as a “management nightmare.”

The Bear is Inside the Wire

April 09, 2015

Russian hackers, fresh from breaching the State Department's unclassified networks in recent months, have managed to sneak into “sensitive but unclassified” White House networks, CNN reported on April 7. The perpetrators gained access to real-time non-public details of the President’s schedule, precisely the type of information foreign intelligence services prioritize for collection.

Fortifying the Internet of Things means baking in security at the beginning

March 06, 2015

Protecting smart devices means building cybersecurity into the design process, from hardware to software. Making security a priority at the start, instead of coming up with patches later, is the key to ensuring the growing number of connected gadgets remain safe.

Obama’s cybersecurity initiative: a start but businesses – and individuals – need to do more

February 24, 2015

The linchpin of President Obama’s recently launched cybersecurity initiative is to encourage the private sector to share information to better defend against cyberattacks. Yet US companies have historically been wary of openly talking about their cybersecurity efforts with competitors and with government — for good reason.

Learn from France's Counter-Extremism Push

February 02, 2015

France is trying to fight fire with fire. On the heels of the Charlie Hebdo attacks, French officials are dedicating resources and marshaling instruments intended to pack a powerful counterterrorism punch. Among these is a website designed to blunt the appeal of violent Islamist ideology and thwart the Islamic State recruitment efforts that accompany it.

Meet Our Staff

Read about our Staff and other pieces they’ve authored.

Meet Our Senior Fellows

Read about our Senior Fellows and other pieces they’ve authored.