Content

Report

Jun 15, 2020

The reverse cascade: Enforcing security on the global IoT supply chain

By Nathaniel Kim, Trey Herr, and Bruce Schneier

The Internet of Things (IoT) refers to the increasing convergence of the physical and digital worlds and it affects us all. Hundreds of “things” are being connected to the Internet and each other, with more than fifty billion devices expected to be connected by 2030. Many IoT devices are manufactured abroad at low cost with little consideration for security. How can we secure these devices, especially those manufactured outside the United States?

Cybersecurity
Internet of Things

In the News

Jun 11, 2020

Sherman quoted in Marketplace on Zoom and censorship

Cybersecurity
Technology & Innovation

New Atlanticist

Jun 11, 2020

Two Chinese telecoms attempt to mollify FCC’s security concerns

By Justin Sherman

The main claim of the Pacific Networks and ComNet response tot he FCC is that “the Companies are not ‘wholly-owned’ by the Chinese government and operate independently and without ‘exploitation, influence, and control’ of the Chinese government.

China
Cybersecurity

New Atlanticist

Jun 9, 2020

Russian cyberattack on Georgia shows why the US should pass the Georgia Support Act

By George Tsereteli

The US Senate could take a significant step toward helping its vulnerable ally by passing the Georgia Support Act and ensuring its provisions are met. The multitude of statements supporting Georgia and condemning the Russian attacks are, of course, a politically positive message for Georgia—but to think statements can change or deter the Kremlin’s behavior is beyond naïve. Concrete actions, such as the passage and signing of H.R.598 into law, would be a message of support backed with real weight.

Cybersecurity
Security Partnerships

Timely Commentary & Analysis

Jun 5, 2020

Artificial intelligence principles: Avoiding catastrophe

By Robert A. Manning

An urgent challenge for the coming decade is to forge a global consensus to operationalize widely-shared ethical principles, standards, and norms to govern the development and use of artificial intelligence.

Americas
China

New Atlanticist

Jun 2, 2020

The UK is forging a 5G club of democracies to avoid reliance on Huawei

By Justin Sherman

As the need for alternatives to Huawei 5G technology becomes more urgent, democracies must pursue these kinds of diplomatic, coalition solutions. Forming a democratic 5G alliance is a step in that direction.

China
Cybersecurity

New Atlanticist

May 27, 2020

The cybersecurity effects of coronavirus

By Derek Bernsen

Since COVID-19 began to spread within the United States in January of this year, the United States has been concentrating its efforts on mitigating the crisis at both a state and federal level. However, all efforts at containing the growing cybersecurity problems have been surface level and reactive at best.

Coronavirus
Cybersecurity

In the News

May 26, 2020

Sherman in Defense News: War rhetoric surrounds COVID surveillance

Cybersecurity
National Security

New Atlanticist

May 26, 2020

The 5×5—Is it a game or is it real? Simulations and wargaming in cyber

By Simon Handler

Greater insight into risk and response allow public and private sector organizations to better prepare for crisis before it happens and rerun history to stave off defeat in future. Wargames can be complex live events or low-cost simulations. They can even be the basis for major reforms to policy and doctrine, giving us much to understand about them. Shall we play a game?

Cybersecurity
gtc photo of currencies in jars

Digital currencies

May 26, 2020

Going deeper: Central bank digital currencies and how best to design them to benefit everyone

By Corina DuBois

On May 19, 2020 - Lisa Pollina, Gabriel Abed, George Bachiashvili, Shane Glynn, Aditi Kuma shared perspectives on "The digital dollar: Do we need it and how do we build it?" as part of a live video discussion moderated by Michael Greenwald. The discussion focused what exactly is a digital dollar? How would it work, how could it best be designed, and who would manage it?

Cybersecurity
Digital Currencies

Experts