-
Corporate Defenses Against Information Warfare
When asked about Russian election interference during his congressional testimony last month, Robert Mueller said: “They’re doing it as we sit here.” To defend the nation against information warfare, the U.S. government has adopted a policy—by default, not by design—of relying on the private sector to police itself, with limited behind-the-scenes government assistance. Facebook’s website says: “Our detection technology helps us block millions of attempts to create fake accounts every day and detect millions more often within minutes after creation.” These numbers sound impressive, but they do not tell the whole story. To assess the effectiveness of company defenses, we must distinguish among three types of fake accounts: bots, fictitious user accounts, and impostor accounts. Russian agents have created and operated all three types of accounts.
-
-
Risks Grow as Countries Share Electricity Across Borders
Increasing interconnection of electricity systems both within and between countries has much promise to help support clean energy power systems of the future. If the sun isn’t shining or wind isn’t blowing in one place, an electricity grid with high voltage transmission lines can move electricity to where it is needed. This shared infrastructure and increased trade can possibly serve as a basis for peace between neighbors in conflict, but it may also serve as a tool of coercion if the electricity can be cut off by one party.
-
-
Follow the Money: Thwarting Islamic State's Plans for a Comeback
With the end of its territorial caliphate, the Islamic State will almost certainly attempt a comeback. Such efforts will require money. A new RAND report examines the group as an insurgency and a self-styled caliphate, with a focus on how the group managed its finances. The report recommends that the U.S. government will need to stay involved with counter–Islamic State activities across several lines of effort, including counter-finance and potentially including military action.
-
-
Setting the Stage for U.S. Leadership in 6G
Every day there are more headlines about China’s rise in 5G, the next generation of wireless communications technologies, and the economic and national security risks to the United States that go along with these developing technologies. These concerns, particularly the threat of critical infrastructure disruptions, are valid—but the plight of the United States is in part self-inflicted. The U.S. government waited too long to tackle the difficult issues surrounding 5G. As a result, China has unprecedented clout on the global stage regarding the deployment and diffusion of advanced communications technologies. With decisive action today, the U.S. can ensure its status as the undisputed leader in wireless technology within 10 years. In doing so, it will lock in the ability to build secure 6G infrastructure with all the accompanying economic and national security benefits.
-
-
Data Leviathan: China’s Burgeoning Surveillance State
Classical totalitarianism, in which the state controls all institutions and most aspects of public life, largely died with the Soviet Union, apart from a few holdouts such as North Korea. The Chinese Communist Party retained a state monopoly in the political realm but allowed a significant private economy to flourish. Yet today, in Xinjiang, a region in China’s northwest, a new totalitarianism is emerging—one built not on state ownership of enterprises or property but on the state’s intrusive collection and analysis of information about the people there. Xinjiang shows us what a surveillance state looks like under a government that brooks no dissent and seeks to preclude the ability to fight back. And it demonstrates the power of personal information as a tool of social control.
-
-
Huawei Technicians Helped African Governments Spy on Political Opponents
Huawei Technologies Co., the world’s largest telecommunications company, dominates African markets, where it has sold security tools that governments use for digital surveillance and censorship. But Huawei employees have provided other services, not disclosed publicly. Technicians from the Chinese powerhouse have, in at least two cases, personally helped African governments spy on their political opponents, including intercepting their encrypted communications and social media, and using cell data to track their whereabouts. The incident in Uganda and another in Zambia, as detailed in a Wall Street Journal investigation, show how Huawei employees have used the company’s technology and other companies’ products to support the domestic spying of those governments.
-
-
It Matters If Americans Call Afghanistan a Defeat
The Trump administration appears poised to announce, within days or weeks, a deal with the Taliban that will involve a withdrawal of U.S. troops from Afghanistan. If that happens, the administration may soon find itself in a new battle over public opinion. The question then would be: Did the United States win or lose? The answer depends partly on the terms of a potential deal, but also on the public narrative that forms around it.Following the Vietnam War, a narrative developed among the U.S.-military officer corps that civilian leaders had stabbed military leaders in the back by cutting a deal to withdraw U.S. troops, rather than allowing them to win. The legacy of the Afghan War—now in its 18th year—will similarly depend on whether civilians, veterans, and current military personnel believe the United States won or lost.
-
-
Terrorists Turn to Bitcoin for Funding, and They’re Learning Fast
Terrorists have been slow to join other criminal elements that have been drawn to Bitcoin and have used it for everything from drug purchases to money laundering. But in recent months, government authorities and organizations that track terrorist financing have begun to raise alarms about an uptick in the number of Islamist terrorist organizations experimenting with Bitcoin and other digital coins.
-
-
How to Fight the New Domestic Terrorism
Pittsburgh, Tallahassee, Poway, Jeffersontown and now El Paso—these American communities have been the scene since 2018 of the most lethal mass shootings connected to white supremacist ideology, but there have been many other lesser attacks and foiled plots. In the U.S., such terrorism has now eclipsed international jihadist terrorism in both frequency and severity. Clint Watts writes in the Wall Street Journal that the formula for responding to America’s white supremacist terrorism emergency is quite clear—in part because of the U.S. hard-won experience fighting jihadists from al Qaeda and its spawn, Islamic State. “We must swiftly and carefully apply the best practices of the two decades since Sept. 11, 2001, to counter this decade’s domestic terrorist threat—by passing new laws, increasing resources and enhancing investigative capabilities,” he writes.
-
-
Lawmakers Seek Probe of Controversial Bioweapons Defense System
The Trump administration’s attempt to deploy a scientifically disputed system for detecting airborne anthrax or other infectious agents in terrorist attacks is facing increased scrutiny from a bipartisan group of House members. in a three-page letter, four Democrats and Republicans on the House Energy and Commerce Committee asked the Government Accountability Office to conduct an in-depth scientific evaluation of the new system, called BioDetection 21. Officials from the GAO, the investigative arm of Congress, signaled that they plan to open the inquiry.
-
-
How Does USAMRIID Shut Down Impact Nation’s Bioterrorism Laboratory Response Network?
The Laboratory Response Network (LRN) is a collaborative federal effort run by the U.S. Centers for Disease Control and Prevention in cooperation with other federal agency and public health partners. The U.S. Army Research Institute of Infectious Diseases (USAMRIID) Special Pathogens Laboratory at Fort Detrick is one of only three National Laboratories at the top of the protective umbrella of the LRN structure, along with those operated by the CDC and the Naval Medical Research Center (NMRC), responsible for specialized characterization of organisms, bioforensics, select agent activity, and handling highly infectious biological agents. It begs the question then, what happens when an important component of the nation’s biopreparedness infrastructure fails to meet CDC biosafety requirements and has its Federal Select Agent certification pulled?
-
-
Shoppers Targeted by Face‑Recognition Cameras in “Epidemic” of Surveillance
There is an “epidemic” of facial recognition surveillance technology at privately owned sites in Britain, campaigners say. Big Brother Watch, a civil liberties group, found shopping centers, museums, conference centers and casinos had all used the software that compares faces captured by CCTV to those of people on watch lists, such as suspected terrorists or shoplifters. Privacy campaigners have criticized trials of the technology by police in London and Wales, questioning their legal basis.
-
-
Drone Rangers and GPS for Fish: The Tech Weapons U.K. Could Deploy to Stop European Rivals Plundering U.K. Seas Post-Brexit
Figures from the Pew Research Centre, a U.S. think tank, suggest that one in five fish are caught by breaking the law and the illegal fishing industry is now worth $23.5 billion. As the U.K. prepares to leave the EU’s fishing regime, illegal trawling in British territorial waters is expected to increase. Some think technology can solve the problem of illegal activity, with new solutions in the form of satellites, drones, facial recognition and autonomous boats emerging to tackle the issue of illegal fishing head on. These technologies will need to be deployed quickly.
-
-
U.K. Commission Releases Studies on the Causes, Prevalence, Responses to Extremism
The independent U.K. Commission for Countering Extremism is earlier this month published eight peer-reviewed academic papers on the causes of extremism, extremism online, and approaches to countering extremism. The papers cover the arguments on the causes of extremism, the complex relationship between social media and extremism, as well as discussions on how to best counter extremism.
-
-
Obama Administration’s Countering Violent Extremism Initiative “Deeply Flawed”
The Obama administration’s program to prevent individuals from embracing violent extremism was deeply flawed, according to a new report. The Countering Violent Extremism (CVE) Initiative was plagued by vague goals, the lack of a budget or administrative structure, and the failure to address all forms of violent extremism, particularly white supremacy. In addition, the initiative was opposed by many Muslim-Americans, the report says.
-
More headlines
The long view
What Does Netflix’s Drama “Adolescence” Tell Us About Incels and the Manosphere?
While Netflix’s psychological crime drama ‘Adolescence’ is a work of fiction, its themes offer insight into the very real and troubling rise of the incel and manosphere culture online.
A Shining Star in a Contentious Legacy: Could Marty Makary Be the Saving Grace of a Divisive Presidency?
While much of the Trump administration has sparked controversy, the FDA’s consumer-first reforms may be remembered as its brightest legacy. From AI-driven drug reviews to bans on artificial dyes, the FDA’s agenda resonates with the public in ways few Trump-era policies have.
The Center Can Hold — States’ Rights and Local Privilege in a Climate of Federal Overreach
As American institutions weather the storms of executive disruption, legal ambiguity, and polarized governance, we must reexamine what it means for “the center” to hold.
How to Reverse Nation’s Declining Birth Rate
Health experts urge policies that buoy families: lower living costs, affordable childcare, help for older parents who want more kids
Foundation for U.S. Breakthroughs Feels Shakier to Researchers
With each dollar of its grants, the National Institutes of Health —the world’s largest funder of biomedical research —generates, on average, $2.56 worth of economic activity across all 50 states. NIH grants also support more than 400,000 U.S. jobs, and have been a central force in establishing the country’s dominance in medical research. Waves of funding cuts and grant terminations under the second Trump administration are a threat to the U.S. status as driver of scientific progress, and to the nation’s economy.
The True Cost of Abandoning Science
“We now face a choice: to remain at the vanguard of scientific inquiry through sound investment, or to cede our leadership and watch others answer the big questions that have confounded humanity for millennia —and reap the rewards.”