• Legislation Introduced to Ban TikTok from Government Devices

    U.S. Senators Marco Rubio (R-FL), Josh Hawley (R-MO), and Rick Scott (R-FL) have introduced legislation that would ban all federal employees from using TikTok on government devices. The U.S. State Department, the Department of Homeland Security, the Department of Defense, and TSA have already banned TikTok on federal devices due to cybersecurity concerns and the potential for spying by the Chinese government.

  • U.S. Expels Russian Diplomats, Imposes New Sanctions on Russia in Retaliation for Hacking, “harmful activities”

    The U.S. has imposed a new round of sanctions against Russia targeting what it calls the “harmful” foreign activities of Moscow. U.S. intelligence officials have pointed the finger at Russia for a massive hack known as SolarWinds that hit large swaths of the U.S. public and private sectors last year. Widely used software is believed to have been infected with malicious code, enabling hackers to access at least nine U.S. agencies, dozens of corporations.

  • U.S. Treasury Provides Missing Link: Manafort’s Partner Gave Campaign Polling Data to Kremlin in 2016

    The U.S. Treasury Department said Thursday that Konstantin Kilimnik, an associate and ex-employee of Paul Manafort, “provided the Russian Intelligence Services with sensitive information on polling and campaign strategy,” during the 2016 election. Justin Hendrix writes that this is an apparently definitive statement that neither Special Counsel Robert Mueller nor the Senate Intelligence Committee investigation made in their final reports.

  • Messaging Authoritarianism: China’s Four Messaging Pillars and How ‘Wolf Warrior’ Tactics Undermine Them

    A messaging strategy is only as good as the goal it serves; as Xi Jinping has made clear, China is seeking to make the world safer for its brand of authoritarianism by reshaping the world order. An analysis of messaging from China’s diplomats, state-backed media, and leaders of the Chinese Communist Party (CCP) demonstrates that Beijing repeatedly uses narratives, angles, and comparisons that serve to change perceptions about China’s autocracy and the United States’ democracy—to China’s advantage.

  • Global Security Trends

    The National Intelligence Council (NIC) on Thursday released the seventh edition of its quadrennial Global Trends report. Global Trends 2040: A More Contested World is an unclassified assessment of the forces and dynamics that the NIC anticipates are likely to shape the national security environment over the next twenty years. Global competition for influence will intensify. “During the next two decades, the intensity of competition for global influence is likely to reach its highest level since the Cold War,” the report notes.

  • Lawmakers Back 5G Alternatives to China-Made Equipment

    Senate Select Committee on Intelligence Chairman Sen. Mark R. Warner (D-VA) led a bipartisan group of Senators in urging President Joe Biden to request at least $3 billion as part of his budget request to Congress for the adoption of 5G alternatives to Chinese-made equipment. Specifically, the Senators urged Biden to request at least $1.5 billion each for two funds established by Congress to encourage the adoption of Open Radio Access Network (Open RAN) equipment, which would allow additional vendors to enter the 5G market and compete with manufacturers like Huawei, which is heavily subsidized by the Chinese government.

  • Shining Light on China’s Secretive International Lending Program

    A new study and dataset reveal previously unknown details about China—the world’s largest official creditor—and its lending practices to developing countries. A cache of documents shows that Chinese loan contracts have unusual secrecy provisions, collateral requirements, and debt renegotiation restrictions.

  • What Would Happen If States Started Looking at Cyber Operations as a “Threat” to Use Force?

    How are threats of force conveyed in cyberspace? Duncan B. Hollis and Tsvetelina van Benthem write that when, in the spring of 2020, hackers compromised the SolarWinds Orion software by “trojanizing” the so-called Sunburst backdoor, they raised a question: “If the presence of backdoors in a victim’s network allows for future exploits capable of causing functionality losses generating destruction (or even deaths), could their presence be seen as threatening such results? More broadly, when does a cyber operation that does not itself constitute a use of force threaten force?”

  • How Should the United States Compete with China’s Belt and Road Initiative?

    China’s Belt and Road Initiative (BRI) is the country’s most ambitious foreign policy undertaking in modern times and is central to Chinese President Xi Jinping’s legacy. BRI, which dwarfs the Marshall Plan in scale, has funded and built roads, power plants, ports, railways, fifth-generation (5G) networks, and fiber-optic cables around the world. While BRI initially sought to connect countries in Central, South, and Southeast Asia with China, it has since transformed into a globe-spanning enterprise encompassing 139 countries.

  • Russian-Backed Hackers Target German Lawmakers

    Suspected Russian state-backed hackers with a history of running disinformation campaigns against NATO have targeted dozens of German lawmakers, German media reported on 26 March. The hackers used spear-phishing e-mails to target the private e-mail accounts of members of the German parliament and regional state assemblies, in the latest suspected Russian-backed effort against lawmakers in the country.

  • Covert Action, Espionage, and the Intelligence Contest in Cyberspace

    In recent months, the world learned that China carried out an indiscriminate hack against Microsoft Exchange, while Russia hacked U.S. information technology firm SolarWinds and used cyber capabilities in an attempt to influence the 2020 U.S. presidential election. Michael Poznansky writes that the attacks raise important questions about how best to characterize these and other kinds of disruptive cyber events. Cyber-enabled espionage and covert cyber operations both qualify as intelligence activities, but they are also distinct in key ways from one another. “Failing to appreciate these differences impedes our ability to understand the richness of cyber operations, underlying motivations, the prospect for signaling, and metrics of success,” he writes.

  • Russia, Iran Meddled in November's Election; China Did Not: U.S. Intelligence

    A just-released assessment by U.S. intelligence officials finds Russia and Iran did seek to influence the outcome of the November 2020 presidential election. But the assessment also concludes that, despite repeated warnings by a number of top Trump officials, China ultimately decided to sit it out. In the run-up to the November election, President Donald Trump, DNI John Ratcliffe, NSC Adviser Robert O’Brien, and AG William Barr. Among other Trump supporters, argued the Chinese interference in the election posed as much of a threat to the election as Russian interference, with Barr arguing that China posed an even greater threat. The intelligence community’s unanimous conclusions that “China did not deploy interference efforts and considered but did not deploy influence efforts intended to change the outcome of the U.S. Presidential election,” will likely lead to new questions about how the intelligence was presented to the public.

  • China Prepares New Era of 'Belt and Road' amid Pandemic Pressures

    After declaring victories over extreme poverty and the coronavirus, Chinese leader Xi Jinping, in a meeting of the National People’s Congress, has laid out a new path for China’s economic rise at home and abroad that could force Beijing to adapt to new difficulties caused by the pandemic. While the stagecraft of the conclave focused on China’s domestic goals, they remain deeply intertwined with Beijing’s global ambitions, particularly the Belt and Road Initiative (BRI) — a blanket term for the multibillion-dollar centerpiece of Xi’s foreign policy that builds influence through infrastructure, investment, and closer political ties.

  • America's Place in Cyberspace: The Biden Administration’s Cyber Strategy Takes Shape

    In cyber policy, the SolarWinds and Microsoft hacks have dominated the first weeks of President Joseph Biden’s administration. Even so, the administration has outlined its cyber strategy in speeches by President Biden and Secretary of State Antony Blinken and in the president’s Interim Strategic National Security Guidance [PDF]. The emerging strategy is anchored in, and is reflective of, the ideological, geopolitical, technological, and diplomatic pillars of Biden’s broader vision for U.S. foreign policy and national security.

  • China Speeding Up Plans to Overtake U.S. on World Stage, Says U.S. Commander

    The inability of the United States to adequately push back against China’s growing military might is spurring Beijing to accelerate its plans to remake the current international order in its image, a top U.S. military commander told lawmakers Tuesday.