You can jump to any part of the United States International Cyberspace & Digital Policy Strategy here. This is the table of links with all parts. TABLE OF CONTENTS Preface Introduction The Digital World: Opportunities and Challenges Cyber Attacks and National Security Threats Competing Internet Norms Threats to Internet and Digital Freedom Challenges of the Digital Economy The Future of AI Technologies Governance Working with the Private Sector and Civil Society Building Digital Solidarity ACTION AREA 1: Promote, Build, and Maintain an Open, Inclusive, Secure, and Resilient Digital Ecosystem Line of Effort 1: Promote Development and Adoption of Open, Inclusive, Secure, and Resilient Telecommunication Networks Line of Effort 2: Further Common Understandings and Shared Principles for the Secure Use and Trustworthiness of Cloud Services, Data Centers, and Related Infrastructure Technologies Line of Effort 3: Enhance Security and Resilience of Undersea Cables Line of Effort 4: Pursue Shared Interests in the Development, Use, Resilience, and Security of Satellite Communication Networks Line of Effort 5: Enhance the International Telecommunication Union’s Effectiveness, Transparency, and Accountability ACTION AREA 2: Align Rights-Respecting Approaches to Digital and Data Governance with International Partners Line of Effort 1: Support the Trusted Flow of Data and Advocate for Multistakeholder, Risk-Based Approaches to Digital and Data Governance Line of Effort 2: Promote Common Understandings of Trust, Interoperable Standards, and Shared Values and Governance Principles for Critical and Emerging Technologies Line of Effort 3: Ensure International Standards Processes are Transparent, Open, Inclusive, and Impartial Line of Effort 4: Expand and Diversify Civil Society Participation in Multistakeholder Processes Line of Effort 5: Advance a Common, Rights-Respecting Vision for the Digital Future Line of Effort 6: Negotiate a Rights-Respecting Cybercrime Treaty Line of Effort 7: Defend Information Integrity ACTION AREA 3: Advance Responsible State Behavior in Cyberspace and Counter Threats to Cyberspace and Critical Infrastructure by Building Coalitions and Engaging Partners Line of Effort 1: Pursue Action-Oriented Discussions Focused on Norm Implementation at the UN Line of Effort 2: Disrupt and Build Resilience to Malicious State Activity Line of Effort 3: Support Allies and Partners Amid Malicious Activity Line of Effort 4: Hold Irresponsible States Accountable Line of Effort 5: Affirm Application of Mutual Defense Treaties with Certain Allies to the Cyber Domain Line of Effort 6: Counter Criminal and Ransomware Actors Line of Effort 7: Safeguard Democratic Processes and Institutions Line of Effort 8: Combat the Proliferation and Misuse of Commercial Spyware ACTION AREA 4: Strengthen and Build International Partner Digital Policy and Cyber Capacity Line of Effort 1: Support and Expand Digital Policy, Legal, and Regulatory Capacity Building Efforts Line of Effort 2: Augment Partner Cyber Capacity Building Efforts Line of Effort 3: Develop New Tools to Deliver Digital and Cyber Assistance Quickly and Efficiently Conclusion This post was originally published on May 6, 2024, by the U.S Department of State You can jump to any part of the United States International Cyberspace & Digital Policy Strategy here. This is the table of links with all parts. You can jump to any part of the United States International Cyberspace & Digital Policy Strategy here . This is the table of links with all parts. here This is the table of links with all parts. TABLE OF CONTENTS Preface Preface Preface Introduction Introduction Introduction The Digital World: Opportunities and Challenges The Digital World: Opportunities and Challenges The Digital World: Opportunities and Challenges Cyber Attacks and National Security Threats Competing Internet Norms Threats to Internet and Digital Freedom Challenges of the Digital Economy The Future of AI Technologies Governance Working with the Private Sector and Civil Society Cyber Attacks and National Security Threats Cyber Attacks and National Security Threats Competing Internet Norms Competing Internet Norms Threats to Internet and Digital Freedom Threats to Internet and Digital Freedom Challenges of the Digital Economy Challenges of the Digital Economy The Future of AI Technologies Governance The Future of AI Technologies Governance Working with the Private Sector and Civil Society Working with the Private Sector and Civil Society Building Digital Solidarity Building Digital Solidarity Building Digital Solidarity ACTION AREA 1: Promote, Build, and Maintain an Open, Inclusive, Secure, and Resilient Digital Ecosystem Line of Effort 1: Promote Development and Adoption of Open, Inclusive, Secure, and Resilient Telecommunication Networks Line of Effort 2: Further Common Understandings and Shared Principles for the Secure Use and Trustworthiness of Cloud Services, Data Centers, and Related Infrastructure Technologies Line of Effort 3: Enhance Security and Resilience of Undersea Cables Line of Effort 4: Pursue Shared Interests in the Development, Use, Resilience, and Security of Satellite Communication Networks Line of Effort 5: Enhance the International Telecommunication Union’s Effectiveness, Transparency, and Accountability ACTION AREA 2: Align Rights-Respecting Approaches to Digital and Data Governance with International Partners Line of Effort 1: Support the Trusted Flow of Data and Advocate for Multistakeholder, Risk-Based Approaches to Digital and Data Governance Line of Effort 2: Promote Common Understandings of Trust, Interoperable Standards, and Shared Values and Governance Principles for Critical and Emerging Technologies Line of Effort 3: Ensure International Standards Processes are Transparent, Open, Inclusive, and Impartial Line of Effort 4: Expand and Diversify Civil Society Participation in Multistakeholder Processes Line of Effort 5: Advance a Common, Rights-Respecting Vision for the Digital Future Line of Effort 6: Negotiate a Rights-Respecting Cybercrime Treaty Line of Effort 7: Defend Information Integrity ACTION AREA 3: Advance Responsible State Behavior in Cyberspace and Counter Threats to Cyberspace and Critical Infrastructure by Building Coalitions and Engaging Partners Line of Effort 1: Pursue Action-Oriented Discussions Focused on Norm Implementation at the UN Line of Effort 2: Disrupt and Build Resilience to Malicious State Activity Line of Effort 3: Support Allies and Partners Amid Malicious Activity Line of Effort 4: Hold Irresponsible States Accountable Line of Effort 5: Affirm Application of Mutual Defense Treaties with Certain Allies to the Cyber Domain Line of Effort 6: Counter Criminal and Ransomware Actors Line of Effort 7: Safeguard Democratic Processes and Institutions Line of Effort 8: Combat the Proliferation and Misuse of Commercial Spyware ACTION AREA 4: Strengthen and Build International Partner Digital Policy and Cyber Capacity Line of Effort 1: Support and Expand Digital Policy, Legal, and Regulatory Capacity Building Efforts Line of Effort 2: Augment Partner Cyber Capacity Building Efforts Line of Effort 3: Develop New Tools to Deliver Digital and Cyber Assistance Quickly and Efficiently ACTION AREA 1: Promote, Build, and Maintain an Open, Inclusive, Secure, and Resilient Digital Ecosystem Line of Effort 1: Promote Development and Adoption of Open, Inclusive, Secure, and Resilient Telecommunication Networks Line of Effort 2: Further Common Understandings and Shared Principles for the Secure Use and Trustworthiness of Cloud Services, Data Centers, and Related Infrastructure Technologies Line of Effort 3: Enhance Security and Resilience of Undersea Cables Line of Effort 4: Pursue Shared Interests in the Development, Use, Resilience, and Security of Satellite Communication Networks Line of Effort 5: Enhance the International Telecommunication Union’s Effectiveness, Transparency, and Accountability ACTION AREA 1: Promote, Build, and Maintain an Open, Inclusive, Secure, and Resilient Digital Ecosystem ACTION AREA 1: Promote, Build, and Maintain an Open, Inclusive, Secure, and Resilient Digital Ecosystem Line of Effort 1: Promote Development and Adoption of Open, Inclusive, Secure, and Resilient Telecommunication Networks Line of Effort 2: Further Common Understandings and Shared Principles for the Secure Use and Trustworthiness of Cloud Services, Data Centers, and Related Infrastructure Technologies Line of Effort 3: Enhance Security and Resilience of Undersea Cables Line of Effort 4: Pursue Shared Interests in the Development, Use, Resilience, and Security of Satellite Communication Networks Line of Effort 5: Enhance the International Telecommunication Union’s Effectiveness, Transparency, and Accountability Line of Effort 1: Promote Development and Adoption of Open, Inclusive, Secure, and Resilient Telecommunication Networks Line of Effort 1: Promote Development and Adoption of Open, Inclusive, Secure, and Resilient Telecommunication Networks Line of Effort 2: Further Common Understandings and Shared Principles for the Secure Use and Trustworthiness of Cloud Services, Data Centers, and Related Infrastructure Technologies Line of Effort 2: Further Common Understandings and Shared Principles for the Secure Use and Trustworthiness of Cloud Services, Data Centers, and Related Infrastructure Technologies Line of Effort 3: Enhance Security and Resilience of Undersea Cables Line of Effort 3: Enhance Security and Resilience of Undersea Cables Line of Effort 4: Pursue Shared Interests in the Development, Use, Resilience, and Security of Satellite Communication Networks Line of Effort 4: Pursue Shared Interests in the Development, Use, Resilience, and Security of Satellite Communication Networks Line of Effort 5: Enhance the International Telecommunication Union’s Effectiveness, Transparency, and Accountability Line of Effort 5: Enhance the International Telecommunication Union’s Effectiveness, Transparency, and Accountability ACTION AREA 2: Align Rights-Respecting Approaches to Digital and Data Governance with International Partners Line of Effort 1: Support the Trusted Flow of Data and Advocate for Multistakeholder, Risk-Based Approaches to Digital and Data Governance Line of Effort 2: Promote Common Understandings of Trust, Interoperable Standards, and Shared Values and Governance Principles for Critical and Emerging Technologies Line of Effort 3: Ensure International Standards Processes are Transparent, Open, Inclusive, and Impartial Line of Effort 4: Expand and Diversify Civil Society Participation in Multistakeholder Processes Line of Effort 5: Advance a Common, Rights-Respecting Vision for the Digital Future Line of Effort 6: Negotiate a Rights-Respecting Cybercrime Treaty Line of Effort 7: Defend Information Integrity ACTION AREA 2: Align Rights-Respecting Approaches to Digital and Data Governance with International Partners ACTION AREA 2: Align Rights-Respecting Approaches to Digital and Data Governance with International Partners Line of Effort 1: Support the Trusted Flow of Data and Advocate for Multistakeholder, Risk-Based Approaches to Digital and Data Governance Line of Effort 2: Promote Common Understandings of Trust, Interoperable Standards, and Shared Values and Governance Principles for Critical and Emerging Technologies Line of Effort 3: Ensure International Standards Processes are Transparent, Open, Inclusive, and Impartial Line of Effort 4: Expand and Diversify Civil Society Participation in Multistakeholder Processes Line of Effort 5: Advance a Common, Rights-Respecting Vision for the Digital Future Line of Effort 6: Negotiate a Rights-Respecting Cybercrime Treaty Line of Effort 7: Defend Information Integrity Line of Effort 1: Support the Trusted Flow of Data and Advocate for Multistakeholder, Risk-Based Approaches to Digital and Data Governance Line of Effort 1: Support the Trusted Flow of Data and Advocate for Multistakeholder, Risk-Based Approaches to Digital and Data Governance Line of Effort 2: Promote Common Understandings of Trust, Interoperable Standards, and Shared Values and Governance Principles for Critical and Emerging Technologies Line of Effort 2: Promote Common Understandings of Trust, Interoperable Standards, and Shared Values and Governance Principles for Critical and Emerging Technologies Line of Effort 3: Ensure International Standards Processes are Transparent, Open, Inclusive, and Impartial Line of Effort 3: Ensure International Standards Processes are Transparent, Open, Inclusive, and Impartial Line of Effort 4: Expand and Diversify Civil Society Participation in Multistakeholder Processes Line of Effort 4: Expand and Diversify Civil Society Participation in Multistakeholder Processes Line of Effort 5: Advance a Common, Rights-Respecting Vision for the Digital Future Line of Effort 5: Advance a Common, Rights-Respecting Vision for the Digital Future Line of Effort 6: Negotiate a Rights-Respecting Cybercrime Treaty Line of Effort 6: Negotiate a Rights-Respecting Cybercrime Treaty Line of Effort 7: Defend Information Integrity Line of Effort 7: Defend Information Integrity ACTION AREA 3: Advance Responsible State Behavior in Cyberspace and Counter Threats to Cyberspace and Critical Infrastructure by Building Coalitions and Engaging Partners Line of Effort 1: Pursue Action-Oriented Discussions Focused on Norm Implementation at the UN Line of Effort 2: Disrupt and Build Resilience to Malicious State Activity Line of Effort 3: Support Allies and Partners Amid Malicious Activity Line of Effort 4: Hold Irresponsible States Accountable Line of Effort 5: Affirm Application of Mutual Defense Treaties with Certain Allies to the Cyber Domain Line of Effort 6: Counter Criminal and Ransomware Actors Line of Effort 7: Safeguard Democratic Processes and Institutions Line of Effort 8: Combat the Proliferation and Misuse of Commercial Spyware ACTION AREA 3: Advance Responsible State Behavior in Cyberspace and Counter Threats to Cyberspace and Critical Infrastructure by Building Coalitions and Engaging Partners ACTION AREA 3: Advance Responsible State Behavior in Cyberspace and Counter Threats to Cyberspace and Critical Infrastructure by Building Coalitions and Engaging Partners Line of Effort 1: Pursue Action-Oriented Discussions Focused on Norm Implementation at the UN Line of Effort 2: Disrupt and Build Resilience to Malicious State Activity Line of Effort 3: Support Allies and Partners Amid Malicious Activity Line of Effort 4: Hold Irresponsible States Accountable Line of Effort 5: Affirm Application of Mutual Defense Treaties with Certain Allies to the Cyber Domain Line of Effort 6: Counter Criminal and Ransomware Actors Line of Effort 7: Safeguard Democratic Processes and Institutions Line of Effort 8: Combat the Proliferation and Misuse of Commercial Spyware Line of Effort 1: Pursue Action-Oriented Discussions Focused on Norm Implementation at the UN Line of Effort 1: Pursue Action-Oriented Discussions Focused on Norm Implementation at the UN Line of Effort 2: Disrupt and Build Resilience to Malicious State Activity Line of Effort 2: Disrupt and Build Resilience to Malicious State Activity Line of Effort 3: Support Allies and Partners Amid Malicious Activity Line of Effort 3: Support Allies and Partners Amid Malicious Activity Line of Effort 4: Hold Irresponsible States Accountable Line of Effort 4: Hold Irresponsible States Accountable Line of Effort 5: Affirm Application of Mutual Defense Treaties with Certain Allies to the Cyber Domain Line of Effort 5: Affirm Application of Mutual Defense Treaties with Certain Allies to the Cyber Domain Line of Effort 6: Counter Criminal and Ransomware Actors Line of Effort 6: Counter Criminal and Ransomware Actors Line of Effort 7: Safeguard Democratic Processes and Institutions Line of Effort 7: Safeguard Democratic Processes and Institutions Line of Effort 8: Combat the Proliferation and Misuse of Commercial Spyware Line of Effort 8: Combat the Proliferation and Misuse of Commercial Spyware ACTION AREA 4: Strengthen and Build International Partner Digital Policy and Cyber Capacity Line of Effort 1: Support and Expand Digital Policy, Legal, and Regulatory Capacity Building Efforts Line of Effort 2: Augment Partner Cyber Capacity Building Efforts Line of Effort 3: Develop New Tools to Deliver Digital and Cyber Assistance Quickly and Efficiently ACTION AREA 4: Strengthen and Build International Partner Digital Policy and Cyber Capacity ACTION AREA 4: Strengthen and Build International Partner Digital Policy and Cyber Capacity Line of Effort 1: Support and Expand Digital Policy, Legal, and Regulatory Capacity Building Efforts Line of Effort 2: Augment Partner Cyber Capacity Building Efforts Line of Effort 3: Develop New Tools to Deliver Digital and Cyber Assistance Quickly and Efficiently Line of Effort 1: Support and Expand Digital Policy, Legal, and Regulatory Capacity Building Efforts Line of Effort 1: Support and Expand Digital Policy, Legal, and Regulatory Capacity Building Efforts Line of Effort 2: Augment Partner Cyber Capacity Building Efforts Line of Effort 2: Augment Partner Cyber Capacity Building Efforts Line of Effort 3: Develop New Tools to Deliver Digital and Cyber Assistance Quickly and Efficiently Line of Effort 3: Develop New Tools to Deliver Digital and Cyber Assistance Quickly and Efficiently Conclusion Conclusion Conclusion This post was originally published on May 6, 2024, by the U.S Department of State This post was originally published on May 6, 2024, by the U.S Department of State by the U.S Department of State