Transatlantic Data Transfers

U.S. surveillance activities have alarmed European partners, throwing the future of transatlantic digital trade into question. The U.S. should embrace collaboration and protections for personal data. | Continue reading


@cfr.org | 2 days ago

How Dangerous Are New Covid-19 Strains?

The global distribution of COVID-19 vaccines is underway, but the emergence of new coronavirus strains threatens to make the pandemic far worse before it gets better. | Continue reading


@cfr.org | 3 days ago

Tax Games: Big Pharma versus Big Tech

American pharmaceutical companies are skilled at using transfer pricing to shift the profit on their U.S. sales out of the United States. That is why the United States' trade deficit in pharmaceuticals is now bigger than the United States' trade surplus in aircraft. | Continue reading


@cfr.org | 1 month ago

Lots of money sloshing around (2005)

Net purchases of US long-term securities topped $100 billion in September -- more than enough to finance the United States' current account defic… | Continue reading


@cfr.org | 8 months ago

The Coronavirus Outbreak Could Disrupt the U.S. Drug Supply

U.S. health officials have warned that the coronavirus outbreak could lead to drug shortages. Just how much does the United States rely on pharmaceutical products from China and India? | Continue reading


@cfr.org | 9 months ago

How China Is Interfering in Taiwan’s Election

Beijing is spreading disinformation to influence Taiwan’s election in January, but that doesn’t necessarily mean President Tsai Ing-wen will get voted out. | Continue reading


@cfr.org | 1 year ago

Funding the United Nations

Many UN agencies, programs, and missions receive crucial funding from the United States. President Trump’s budget cuts could jeopardize their work. | Continue reading


@cfr.org | 1 year ago

Is China Manipulating Its Currency?

The Trump administration has declared China a currency manipulator, but what that means for the ongoing trade war is far from clear. | Continue reading


@cfr.org | 1 year ago

Securing 5G Networks: Challenges and Recommendations

5G networks could revolutionize the digital economy, but with this opportunity come major cybersecurity challenges. U.S. policymakers need to respond using technical and regulatory measures, diplomacy, and investments in cybersecurity skills training. | Continue reading


@cfr.org | 1 year ago

Trump's Foreign Policies Are Better Than They Seem

President Donald J. Trump’s actions have often been rash, ignorant, and chaotic. Yet some of his individual foreign policies are better than his opponents assert. | Continue reading


@cfr.org | 1 year ago

Cyber Operations Tracker

CFR’s Cyber Operations Tracker catalogues over 150 state-sponsored acts of espionage, sabotage and data destruction. | Continue reading


@cfr.org | 1 year ago

Authoritarians Export Surveillance Tech, Along Their Vision for the Internet

Justin Sherman is a cybersecurity policy fellow at New America. Robert Morgus is the deputy director of the FIU - New America Cybersecurity Capacity … | Continue reading


@cfr.org | 2 years ago

UN Doubles Its Workload on Cyber Norms, and Not Everyone Is Pleased

Russia and the United States proposed two competing resolutions, possibly expecting one to prevail over the other. Instead, the General Assembly approved both.  | Continue reading


@cfr.org | 2 years ago

Cyber Conflict as an Academic Discipline: It’s Not All Doom-And-Gloom

Although there are challenges facing the study of cyber conflict, they are not insurmountable.  | Continue reading


@cfr.org | 2 years ago

The Drone Revolution Shakes Up Tort Law

The advent of drones has led to calls for new law to regulate the skies. One such proposal from the Uniform Law Commission is causing a stir in the United States.  | Continue reading


@cfr.org | 2 years ago

What Policymakers Need to Know About Quantum Computing

Imagine a global leak, an explosion of data unlike anything the planet has yet seen, where the innermost secrets of virtually every government, corporation, and entity on the planet are thrown open. That could be the future of quantum computing.  | Continue reading


@cfr.org | 2 years ago

Not the cyber deterrence the United States wants

The U.S. approach to cyber deterrence assumes that Washington will be deterring others. The Obama administration's response to Russian interference in the 2016 election tests that assumption.  | Continue reading


@cfr.org | 2 years ago

German Klimenko and What His Dismissal Means for the Russian Internet?

Earlier this month, Russian President Vladimir Putin sacked his internet adviser, German Klimenko. The dismissal has injected rare optimism into those hoping for a thaw of sorts in the battle for the Russian internet. That optimism may be misplaced.  | Continue reading


@cfr.org | 2 years ago

What War Games Tell Us About the Use of Cyber Weapons in a Crisis

Recent U.S. war games have shown that decision makers are surprisingly reluctant to use cyber weapons during a crisis scenario that escalates into armed conflict. Why? | Continue reading


@cfr.org | 2 years ago

The Reality of Modern Slavery

From debt bondage in India, forced labor in North Korea, and human trafficking in Europe and the United States, an estimated 40.3 million people worldwide are victims of modern slavery. | Continue reading


@cfr.org | 2 years ago

Three Measures That Could Pave the Way to Building Successful Cyber Norms

Although states have sought to develop norms that constrain destabilizing behavior in cyberspace, they have struggled to make them stick. Here are three things state and non-state actors should consider when developing cyber norms.  | Continue reading


@cfr.org | 2 years ago

How Japan’s Pacifist Constitution Shapes Its Approach to Cyberspace

As part of a new cybersecurity strategy, Japan wants to deter adversaries through cyberspace. That might prove challenging given its pacifist constitution.  | Continue reading


@cfr.org | 2 years ago

Getting the International Development Community to Care About Cybersecurity

International assistance programs rely on digital technologies to deliver food, housing, education, and a host of other services to the developing world. However, few donors or recipients incorporate cybersecurity into their activities. That's a problem. | Continue reading


@cfr.org | 2 years ago

Forces Fueling the Rohingya Crisis

Hundreds of thousands of Rohingya, a Muslim ethnic minority group, are fleeing persecution in Myanmar’s western Rakhine State, fueling a historic migration crisis. | Continue reading


@cfr.org | 2 years ago