• China WatchChinese Force Labor Connections in Global Retail Brands’ Supply Chains

    More than 100 global retail brands could be at risk of using cotton that is produced by Uyghur forced labor according to new research. The findings suggest dozens of well-known international brands are at risk of using cotton that is produced or processed by forced labor in the Xinjiang Province in China.

  • Supply ChainHow to Fix Global Supply Chains for Good

    By Roger W. Ferguson Jr. and Upamanyu Lahiri

    Truck-driver shortages, “lean” inventories, and an overreliance on China plagued global supply chains long before the pandemic. Permanently addressing these and other issues will help the United States and rest of the world better cope with the next shock.

  • China WatchCongress Restarts Push for China Legislation by Year’s End

    By Katherine Gypson

    Lawmakers are renewing a push to pass legislation that would boost U.S. competition with China, amid rising concerns about the global supply chain. Addressing U.S. competition with China is one of the few areas of broad bipartisan support on Capitol Hill, although lawmakers differ on the approach.

  • Supply Chain SecuritySupply Chain Disruptions—the Risks and Consequences

    By Bradley Martin

    Supply chain disruptions cause general economic disruption and key commodity shortages, which then in turn can, in fact, drive aggressive national behavior and international instability. And ironically, this reactive aggressive national behavior can happen even if the health of a national economy itself depends upon continued international economic interdependence. Indeed, this very interdependence can create vulnerabilities.

  • Cyber ThreatsInterpol Unveils Emerging Cyberthreats

    The exceptional COVID-19 crisis has fueled the increase of cybercrime in all its forms, while grey infrastructure serves to facilitate the proliferation of crime.

  • China WatchGerman Engine Technology Used in Chinese Warships: Report

    By Amanda Rivkin

    Engines developed in Germany can evade export control bans due to their status as a so-called dual-use technology, a German media investigation has revealed.

  • Infrastructure ProtectionProtecting Infrastructure from Hackers

    Two Midwestern universities lead an effort to form a coalition of regional research centers to work together to develop the region’s cyber defense talent with an eye to bolstering the defense of the region’s infrastructure against hackers.

  • RansomwareU.S. Offers Reward for Information on Russian DarkSide Cybercrime Group

    The United States has announced a reward of up to $10 million for information leading to the identification or location of any individual holding a “key leadership” position in DarkSide, a cybercrime group believed to be tied to Russia.The DarkSide syndicate was behind the attack on Colonial Pipeline – the largest publicly disclosed cyberattack against critical infrastructure in the United States.

  • PrivacyFace Recognition Is So Toxic, Facebook Is Dumping It

    By Matthew Guariglia

    Facebook’s decision to end its face-recognition program comes at a time when face recognition technology is receiving push back, criticisms, and legislative bans across the United States, and the globe.

  • Hacking InsuranceGovernment Action Needed to Ensure Insurance Against Major Hacking of Driverless Vehicles: Experts

    Government action is needed so driverless vehicles can be insured against malicious hacks which could have potentially catastrophic consequences, experts say. Traditional vehicle insurance wouldn’t cover the mass hacking of driverless cars, and an incident like this could cost the industry tens of billions of pounds.

  • SpywareU.S. Sanctions NSO Group, Israeli Maker of Pegasus Spyware

    The U.S. authorities said the NSO Group’s spyware helped authoritarian governments “silence dissent.” The new measures will limit NSO Group’s access to U.S. components and technology.

  • Climate ChallengesThe Ripple Factor: Weather Extremes Amplify Economic Losses

    Weather extremes can cause economic ripples along our supply chains. A new study shows that if they occur at roughly the same time the ripples start interacting and can amplify even if they occur at completely different places around the world.

  • CybersecurityHackers-for-Hire Drive Evolution of Threat Landscape

    Cybersecurity threats are on the rise. The new edition of the ENISA Threat Landscape (ETL) highlights the surge in cybercriminality motivated by monetization using ransomware or cryptojacking. Supply-chains attacks also rank highly among prime threats because of the significant potential they have in inducing catastrophic cascading effects.

  • RansomwareTargeted: Masterminds of Global Ransomware Attacks Against Critical Infrastructure

    Twelve individuals who were wreaking havoc across the world with ransomware attacks against critical infrastructure have been targeted as the result of a law enforcement and judicial operation involving eight countries.

  • Energy SecurityWarning Issued Over the Unintended Consequences of Wind for Achieving Net Zero Targets

    By John Underhill

    In the run-up to the COP26 global climate summit in Glasgow, an expert on geoengineering and energy transition highlights the need for joined up thinking if the U.K. is going to find the optimal use of the North Sea to achieve Net Zero targets.