Full Description
An expertly written guide to the regulatory maze governing the intersection of technology and national security
In Navigating Technology and National Security: The Intersection of CFIUS, Team Telecom, AI Controls, and Other Regulations, cybersecurity and technology policy researcher, consultant, and professor Justin Sherman delivers a comprehensive explanation of US tech and national security regulations and review programs. The book is an accessible and thoroughly researched analysis of important regulatory regimes that govern sensitive and emerging technologies and data used in the United States and around the world, including:
Committee on Foreign Investment in the US
Export Controls
Team Telecom
ICT Supply Chain Program
Cloud Know-Your-Customer Program
Bulk Data Transfer Review Program
Outbound Investment Screening
The author concisely describes the history of each program before explaining its legal basis (like the IEEPA) and covering relevant case studies on public enforcement actions and investigations. He also offers insightful and original analysis on the major strengths and weaknesses of each program.
The book also includes:
Emerging issues and concrete takeaways for attorneys, technologists, investors, policymakers, and other stakeholders
Discussions of the fast-moving threat space
Potential ways that the United States might stumble - or succeed - in the implementation of new tech review programs and regulations moving forward
An incisive and up-to-date exploration of an increasingly important area, Navigating Technology and National Security is a must-read for lawyers, policymakers, threat analysts, hedge fund and venture capital professionals, technologists, and anyone else required to navigate the regulatory maze that governs the intersection of national security and tech.
Contents
Introduction vii
Part I U.S. Regulations on Technology and National Security 1
Chapter 1 Export Controls 3
Chapter 2 CFIUS 43
Chapter 3 Team Telecom 75
Chapter 4 ICTS Program 107
Chapter 5 Cloud KYC Program 131
Chapter 6 Bulk Data Transfer Program 157
Chapter 7 Outbound Investment Screening 187
Part II Threat Shifts and Collision Points: Where We're
Headed Next 215
Chapter 8 Fast-Moving Threats 217
Chapter 9 How the United States Can Get It Wrong—and Right 253
Acknowledgments 265
About the Author 267
Index 269



