Writings on China and Cyber Espionage since 2015
Connected Cars and Spying, CSIS, October 2024
Why The United Nations is Chasing Its Tail on Cybersecurity, CSIS, July 2024
Innovation and Antitrust in Competition with China, CSIS, April 2024
Moonshots are Expensive, CSIS, April 2024
TikTok and National Security, CSIS, March 2024
Is There a Cyber Arms Race? Lawfare, February 2024
Deterrence and Cyber Strategy, CSIS, November 2023
Cyberattack on Civilian Critical Infrastructures in a Taiwan Scenario, CSIS, August 2023
Evolving Cyber Operations and Capabilities, CSIS, May 2023
It’s a Beautiful Day in the Neighborhood , CSIS, May 2023
A Cybersecurity Strategy for the 21st Century , Directions Blog, April 2023
Chinese Spy Balloons: The Sky’s the Limit , CSIS, February 2023
TikTok and the First Amendment, CSIS, November 2022
Cyber War and Ukraine, CSIS, June 2022
A Strategic Outlook for Cyberspace Operations, in Cyberspace Strategic Outlook 2030: Horizon Scanning and Analysis, CCDCOE, March 2022
The West Is Already Fighting in a Cyber Conflict in the National Interest, February 2022
Creating Accountability for Global Cyber Norms, CSIS, February 2022
Ransomware and International Politics, CSIS, July 2021
Shaping the ground for Bilateral Cybersecurity Negotiations, China International Strategy Review, July 2021
Should the United States Enter a ‘No-Spy’ Agreement with Germany and Other EU Partners?, CSIS, June 2021
China: In Search of Tech Supremacy Through Chip Production?, Italian Institute for International Political Studies, June 2021
AI Strategies and Autonomous Vehicles Development, CSIS, April 2021
Securing the Information and Communications Technology and Services Supply Chain, CSIS, April 2021
Toward a More Coercive Cyber Strategy: Remarks to U.S. Cyber Command Legal Conference, CSIS, March 2021
SolarWinds and the Three Rs, CSIS, February 2021
Ban TikTok (Again), CSIS, February 2021
The Crypto Wars Are Over, CSIS, February 2021
The EU’s Investment Agreement with China Is a Diplomatic Opportunity, CSIS, January 2021
Five Cyber Strategies to Forget in 2021, CSIS, December 2020
Video Conferencing Technology and Risk, CSIS, December 2020
Can We Compete in Cyberspace?, CSIS, November 2020
The Russian Cyber Indictments, CSIS, October 2020
Chinese Technology Acquisitions in the Nordic Region, CSIS, September 2020
Dismissing Cyber Catastrophe, CSIS, August 2020
Tech Crisis with China, CSIS, August 2020
Take Me to the Cleaners: Negotiating with China, CSIS, July 2020
How Scary Is TikTok?, CSIS, July 2020
Can Telephones Race? 5G and the Evolution of Telecom, CSIS, June 2020
Cyber Stability, Conflict Prevention, and Capacity Building, CSIS, May 2020
Criteria for Security and Trust in Telecommunications Networks and Services, CSIS Working Group on Trust and Security in 5G Networks, May 2020
Managing Semiconductor Exports to China, CSIS, May 2020
A Necessary Contest: An Overview of U.S. Cyber Capabilities, The National Bureau of Asian Research, April 2020
Strategy after Deterrence, CSIS, March 2020
China’s Uneven High-Tech Drive: Implications for the United States, CSIS, February 2020
What did the United Kingdom just Decided on Huawei and 5G?, CSIS, January 2020
Cybersecurity and the Problem of Interoperability, CSIS, January 2020
The Universal Service Fund and National Security, CSIS, November 2019
Can Chipmunks Defeat Tigers?, CSIS, November 2019
Emerging Technologies and Next Generation Arms Control, CSIS, October 2019
Emerging Technologies and Managing the Risk of Tech Transfer to China, CSIS, September 2019
Selling to Huawei, CSIS, August 2019
Not Much of a Concession on Huawei, CSIS, July 2019
Was She a Spy? Probably Not, CSIS, April 2019
Issue the Executive Order, CSIS, March 2019
China’s Pursuit of Semiconductor Independence, CSIS, February 2019
Comments to the Department of Commerce, Bureau of Industry and Security, CSIS, January 2019
Technological Competition and China, CSIS, November 2018
Responding to Chinese Espionage, CSIS, November 2018
Defining Rules of Behavior for Force and Coercion in Cyberspace, in “Confronting an ‘Axis of Cyber’? China, Iran, North Korea, Russia in Cyberspace,” Italian Institute for International Political Studies, October 2018
State Practice and Precedent in Cybersecurity Negotiations, CSIS, August 2018
Evaluating a “Cybersecurity Moonshot”, CSIS, June 2018
ZTE, the Telecom Wars, and Cyber Spies, CSIS, June 2018
Facebook in the Forbidden City, CSIS, June 2018
ZTE Redux, CSIS, May 2018
ZTE and Building America’s Competitors, CSIS, April 2018
How Much Have the Chinese Actually Taken?, CSIS, March 2018
Telecom and National Security, CSIS, March 2018
Economic Impact of Cybercrime - No Slowing Down, CSIS/McAfee, February 2018
Meeting the China Challenge: Responding to China’s Managed Economy, CSIS, January 2018
Rethinking Cybersecurity: Strategy, Mass Effect, and States, CSIS, January 2018
Understanding ANT, Big Data, and CFIUS, CSIS, January 2018
The Likelihood of North Korean Cyber Attacks, CSIS, September 2017
Revitalizing Progress in International Negotiations on Cybersecurity, Centre for International Governance Innovation, September 2017
The Truth About a Cyber Pearl Harbor, CNN, August 2017
Put China’s Intellectual Property Theft in a Larger Context, CSIS, August 2017
China and Technology: Tortoise and Hare Again, CSIS, August 2017
Sustaining Progress in International Negotiations on Cybersecurity, CSIS, July 2017
Essence of Indecision, CSIS, June 2017
China’s Information Controls, Global Media Influence, and Cyber Warfare Strategy, U.S. China Security and Economic Review Commission, May 2017
Sketching the Contours of Cyberconflict in Asia, CSIS, March 2017. Originally on IAPS Dialogue
Catastrophic Attack and “Reasonable Probability”, CSIS, February 2017
The Effect of Encryption on Lawful Access to Communications and Data, CSIS, February 2017
From Awareness to Action: A Cybersecurity Agenda for the 45th President, CSIS, December 2016
Cybersecurity Strategy in the Age of Russian Hacking", World Politics Review, December 2016
How to Really Punish Russia for Hacking, The Daily Beast, December 2016
Cybersecurity’s Role in Maritime Operations, Speech Transcript from the International Seapower Symposium, CSIS, September 2016
1st Committee of Enquiry, Speech Transcript, German Bundestag’s, September 2016
Report of the International Security Cyber Issues Workshop Series, United Nations Institute for Disarmament Research (UNIDIR), August 2016
Russia and the DNC Hacks, CSIS, August 2016
The US Really Does Want to Constrain Commercial Espionage: Why Does Nobody Believe It?, Lawfare, July 2016. Also at CSIS
Rethinking Deterrence, CSIS Brzezinski Institute on Geostrategy, May 2016
Stability, Legitimacy, and the Internet, National Intelligence Council, April 2016
Indictments, Countermeasures, and Deterrence, CSIS, March 2016
Encryption Myths and Fables, CSIS, March 2016
Cyberspace and armed forces: the rationale for offensive cyber capabilities, ASPI, March 2016
Rethinking Deterrence, CSIS Brzezinski Institute on Geostrategy, May 2016
Confidence Building Measures in Cyberspace, Organization of American States, February 2016
North Korea’s cyber capability, in The Conventional Military Balance on the Korean Peninsula, 2018, IISS
Managing Risk for the Internet of Things, CSIS, February 2016
Expanding International Norms after the U.S.-China Cyber Theft Agreement, World Politics Review, January 2016
“Compelling Opponents to Our Will”: The role of cyber warfare in Ukraine, in Cyber War in Perspective: Russian Aggression against Ukraine, NATO Cooperative Cyber Defence Centre of Excellence, 2015
Moving Forward with the Obama-Xi Cybersecurity Agreement, CSIS, October 2015
Measuring Cybersecurity Success at the Summit, CSIS, October 2015
Friends Don’t Let Friends…, CSIS, September 2015
The Role of Offensive Cyber Operations in NATO's Collective Defence, Tallinn Papers, NATO Cooperative Cyber Defence Centre of Excellence, March 2015.