Writings on China and Cyber Espionage since 2015


 Connected Cars and Spying, CSIS, October 2024

Why The United Nations is Chasing Its Tail on Cybersecurity, CSIS, July 2024

Innovation and Antitrust in Competition with China, CSIS, April 2024  

Moonshots are Expensive, CSIS, April 2024  

TikTok and National Security, CSIS, March 2024

Is There a Cyber Arms Race? Lawfare, February 2024

Deterrence and Cyber Strategy, CSIS, November 2023

Cyberattack on Civilian Critical Infrastructures in a Taiwan Scenario, CSIS, August 2023

Evolving Cyber Operations and Capabilities, CSIS, May 2023

It’s a Beautiful Day in the Neighborhood , CSIS, May 2023

A Cybersecurity Strategy for the 21st Century , Directions Blog, April 2023

Chinese Spy Balloons: The Sky’s the Limit , CSIS, February 2023

TikTok and the First Amendment, CSIS, November 2022

Cyber War and Ukraine, CSIS, June 2022

A Strategic Outlook for Cyberspace Operations, in Cyberspace Strategic Outlook 2030: Horizon Scanning and Analysis, CCDCOE, March 2022

The West Is Already Fighting in a Cyber Conflict in the National Interest, February 2022

Creating Accountability for Global Cyber Norms, CSIS, February 2022

Ransomware and International Politics, CSIS, July 2021

Shaping the ground for Bilateral Cybersecurity Negotiations, China International Strategy Review, July 2021

Should the United States Enter a ‘No-Spy’ Agreement with Germany and Other EU Partners?, CSIS, June 2021

China: In Search of Tech Supremacy Through Chip Production?, Italian Institute for International Political Studies, June 2021

AI Strategies and Autonomous Vehicles Development, CSIS, April 2021

Securing the Information and Communications Technology and Services Supply Chain, CSIS, April 2021

Toward a More Coercive Cyber Strategy: Remarks to U.S. Cyber Command Legal Conference, CSIS, March 2021

SolarWinds and the Three Rs, CSIS, February 2021

Ban TikTok (Again), CSIS, February 2021

The Crypto Wars Are Over, CSIS, February 2021

The EU’s Investment Agreement with China Is a Diplomatic Opportunity, CSIS, January 2021

Five Cyber Strategies to Forget in 2021, CSIS, December 2020

Video Conferencing Technology and Risk, CSIS, December 2020

Can We Compete in Cyberspace?, CSIS, November 2020

The Russian Cyber Indictments, CSIS, October 2020

Chinese Technology Acquisitions in the Nordic Region, CSIS, September 2020

Dismissing Cyber Catastrophe, CSIS, August 2020

Tech Crisis with China, CSIS, August 2020

Take Me to the Cleaners: Negotiating with China, CSIS, July 2020

How Scary Is TikTok?, CSIS, July 2020

Can Telephones Race? 5G and the Evolution of Telecom, CSIS, June 2020

Cyber Stability, Conflict Prevention, and Capacity Building, CSIS, May 2020

Criteria for Security and Trust in Telecommunications Networks and Services, CSIS Working Group on Trust and Security in 5G Networks, May 2020

Managing Semiconductor Exports to China, CSIS, May 2020

A Necessary Contest: An Overview of U.S. Cyber Capabilities, The National Bureau of Asian Research, April 2020

Strategy after Deterrence, CSIS, March 2020

China’s Uneven High-Tech Drive: Implications for the United States, CSIS, February 2020

What did the United Kingdom just Decided on Huawei and 5G?, CSIS, January 2020

Cybersecurity and the Problem of Interoperability, CSIS, January 2020

The Universal Service Fund and National Security, CSIS, November 2019

Can Chipmunks Defeat Tigers?, CSIS, November 2019

Emerging Technologies and Next Generation Arms Control, CSIS, October 2019

Emerging Technologies and Managing the Risk of Tech Transfer to China, CSIS, September 2019

Selling to Huawei, CSIS, August 2019

Not Much of a Concession on Huawei, CSIS, July 2019

Was She a Spy? Probably Not, CSIS, April 2019

Issue the Executive Order, CSIS, March 2019

China’s Pursuit of Semiconductor Independence, CSIS, February 2019

Comments to the Department of Commerce, Bureau of Industry and Security, CSIS, January 2019

Technological Competition and China, CSIS, November 2018

Responding to Chinese Espionage, CSIS, November 2018

Defining Rules of Behavior for Force and Coercion in Cyberspace, in “Confronting an ‘Axis of Cyber’? China, Iran, North Korea, Russia in Cyberspace,” Italian Institute for International Political Studies, October 2018

State Practice and Precedent in Cybersecurity Negotiations, CSIS, August 2018

Evaluating a “Cybersecurity Moonshot”, CSIS, June 2018

ZTE, the Telecom Wars, and Cyber Spies, CSIS, June 2018

Facebook in the Forbidden City, CSIS, June 2018

ZTE Redux, CSIS, May 2018

ZTE and Building America’s Competitors, CSIS, April 2018

How Much Have the Chinese Actually Taken?, CSIS, March 2018

Telecom and National Security, CSIS, March 2018

Economic Impact of Cybercrime - No Slowing Down, CSIS/McAfee, February 2018

Meeting the China Challenge: Responding to China’s Managed Economy, CSIS, January 2018

Rethinking Cybersecurity: Strategy, Mass Effect, and States, CSIS, January 2018

Understanding ANT, Big Data, and CFIUS, CSIS, January 2018

The Likelihood of North Korean Cyber Attacks, CSIS, September 2017

Revitalizing Progress in International Negotiations on Cybersecurity, Centre for International Governance Innovation, September 2017

The Truth About a Cyber Pearl Harbor, CNN, August 2017

Put China’s Intellectual Property Theft in a Larger Context, CSIS, August 2017

China and Technology: Tortoise and Hare Again, CSIS, August 2017

Sustaining Progress in International Negotiations on Cybersecurity, CSIS, July 2017

Essence of Indecision, CSIS, June 2017

China’s Information Controls, Global Media Influence, and Cyber Warfare Strategy, U.S. China Security and Economic Review Commission, May 2017

Sketching the Contours of Cyberconflict in Asia, CSIS, March 2017. Originally on IAPS Dialogue

Catastrophic Attack and “Reasonable Probability”, CSIS, February 2017

The Effect of Encryption on Lawful Access to Communications and Data, CSIS, February 2017

From Awareness to Action: A Cybersecurity Agenda for the 45th President, CSIS, December 2016

Cybersecurity Strategy in the Age of Russian Hacking", World Politics Review, December 2016

How to Really Punish Russia for Hacking, The Daily Beast, December 2016

Cybersecurity’s Role in Maritime Operations, Speech Transcript from the International Seapower Symposium, CSIS, September 2016

1st Committee of Enquiry, Speech Transcript, German Bundestag’s, September 2016

Report of the International Security Cyber Issues Workshop Series, United Nations Institute for Disarmament Research (UNIDIR), August 2016

Russia and the DNC Hacks, CSIS, August 2016

The US Really Does Want to Constrain Commercial Espionage: Why Does Nobody Believe It?, Lawfare, July 2016. Also at CSIS

Rethinking Deterrence, CSIS Brzezinski Institute on Geostrategy, May 2016

Stability, Legitimacy, and the Internet, National Intelligence Council, April 2016

Indictments, Countermeasures, and Deterrence, CSIS, March 2016

Encryption Myths and Fables, CSIS, March 2016

Cyberspace and armed forces: the rationale for offensive cyber capabilities, ASPI, March 2016

Rethinking Deterrence, CSIS Brzezinski Institute on Geostrategy, May 2016

Confidence Building Measures in Cyberspace, Organization of American States, February 2016

North Korea’s cyber capability, in The Conventional Military Balance on the Korean Peninsula, 2018, IISS

Managing Risk for the Internet of Things, CSIS, February 2016

Expanding International Norms after the U.S.-China Cyber Theft Agreement, World Politics Review, January 2016

Compelling Opponents to Our Will”: The role of cyber warfare in Ukraine, in Cyber War in Perspective: Russian Aggression against Ukraine, NATO Cooperative Cyber Defence Centre of Excellence, 2015

Moving Forward with the Obama-Xi Cybersecurity Agreement, CSIS, October 2015

Measuring Cybersecurity Success at the Summit, CSIS, October 2015

Friends Don’t Let Friends…, CSIS, September 2015

The Role of Offensive Cyber Operations in NATO's Collective Defence, Tallinn Papers, NATO Cooperative Cyber Defence Centre of Excellence, March 2015.

Senior Vice President; Pritzker Chair; Director, Strategic Technologies Program