Southeast Asiaโs digital landscape is a pixelated patchwork of partners. As geopolitical tensions threaten a decoupling that will ripple through all aspects of technology including the rule-making frameworks that underpin…
This article considers the ways that journalists cover cybersecurity incidents and convey technical material to general audiences. It describes how journalists have provided increasingly detailed and technical descriptions of these…
The staggering rise of cryptocurrencies poses several challenges for governments and central banks. Some countries are moving to implement their own digital cash in response to this phenomenon. Chinaโs introduction…
The American public is gaining a greater understanding of the deleterious effects that social media is having on society and the unhealthy concentration of power that rests with tech giants…
The SolarWinds and Microsoft Exchange hacks highlight serious problems with cybersecurity in the United States. The hacks also expose geopolitical and ideological challenges for US approaches to cybersecurity and cyberspace.
For several decades, US security policy in West Africa focused on transnational terrorist organizations, domestic armed groups, and the general spread of instability. This article argues that an increase in…
A new Georgetown report examines the problem of information operations and disinformation during election season and beyond. Thanks to better preparation and less aggressive attempts of outside interference,…
The current state of the Internet parallels the call found in The Federalist Papers to reject authoritarianism by championing an open exchange among diverse peoples and regions. This analysis defends…
Once upon a time, in legal circles, there was just one conversationโLaw 1.0. This wasโand still isโa conversation about how settled legal principles should be applied to a…
On February 28, 2020, Dr. Ben Buchanan, a Senior Faculty Fellow at Georgetownโs Center for Security and Emerging Technology, discussed challenges states face in navigating cyberwarfare as highlighted…