• FBI Director: China No. 1 Counter-Intelligence Threat to the U.S.

    The FBI has more than 1,000 investigations of U.S. intellectual property theft in all 50 states with nearly all leading back to China, FBI Director Christopher Wray said, calling China the No. 1 counter-intelligence threat to the United States. Wray described the threat as “more deep, more diverse, more vexing, more challenging, more comprehensive and more concerning than any counter-intelligence threat that I can think of.”

  • Huawei Secretly Built North Korea’s Wireless Network

    On Monday, the Washington Post reported that Huawei had been secretly working in North Korea on various communication projects, including building and maintaining the country’s wireless network. Huawei’s work has been in direct violation of the sanctions imposed on North Korea because of its nuclear weapons activity. The revelations are going to increase worries in the West about the trustworthiness of the Chinese communication giant, and would provide more evidence to support the conclusions of Western intelligence services that Huawei serves the interests of the Chinese government and China’s intelligence services.

  • “A High Risk to Their Users”: An Analysis of Huawei Devices’ Security Vulnerabilities

    Western intelligence services have long suspected that the Chinese communication giant Huawei was a tool of China’s powerful intelligence services. An analysis of the state of security of Huawei’s gear and equipment has found serious security flaws and vulnerabilities. This is important, because even if we take Huawei’s implausible denials of any relationship to Chinese government at face value, the low quality of security of Huawei’s equipment would allow the Chinese government, and other state actors, to compromise the vulnerabilities of networks built with Huawei’s components. Our “analysis shows that Huawei devices quantitatively pose a high risk to their users,” the report says.

  • FaceApp Makes Today’s Privacy Laws Look Antiquated

    Cameras are everywhere, and data brokers are vacuuming up information on individuals. But regulations have not kept pace. You should stop using FaceApp, because there are few controls on how your data, including your face data, will be used. But the problems that FaceApp poses aren’t unique. Walking around anywhere can get your face included in facial-recognition databases. How that information can be mined, manipulated, bought, or sold is minimally regulated—in the United States and elsewhere.

  • China Cyber Attacks on AFSPC Contractors ‘Stealing Us Blind’

    “Cyber keeps me up at night,” says Brig. Gen. DeAnna Burt, director of Air Force Space Command (AFSPC) operations and communications, because China’s cyber warriors are routinely breaching defense and space contractor networks and stealing data on a regular basis. “For every defense contractor in this room, the thing that keeps me up at night is how we manage data on your systems or your sub’s systems,” she warned. “We have had breaches … the Chinese and others stealing things from cleared defense contractors.”

  • FBI, FTC asked to examine whether FaceApp is a Kremlin’s data-collection tool

    FaceApp is a selfie app designed by a Russian programmer, which uses AI-like techniques to apply various changes to faces, making them look older or younger, adding accessories and even changing their race. On Wednesday, Senate Minority Leader Chuck Schumer (D-New York) sent a letter to the FBI and Federal Trade Commission to investigate the data-collecting and data-retention mechanisms of the Russia-based app — and whether the “personal data uploaded by millions of Americans onto FaceApp may be finding its way into the hands of the Russian government.”

  • Four Ways Blockchain Could Make the Internet Safer, Fairer, and More Creative

    The internet is unique in that it has no central control, administration or authority, but in recent years internet services such as search engines and social media platforms have increasingly been provided by a small number of very large tech firms. The internet is slowly turning into something like the current financial system, which centrally monitors all transactions and uses that data to predict what people will buy in future. Bitcoin, which surfaced on the internet in 2008, sought to break the influence that large, private bodies have over what we do online. The researchers had finally solved one of the biggest concerns with digital currencies – that they need central control by the companies that operate them, in the same way traditional currencies are controlled by a bank. People researching Bitcoin – and blockchains which undergird it — may have overlooked one of its most useful applications – making the internet better for everyone who uses it.

  • Do Patents Protect National Security?

    On 12 June, the Wall Street Journal broke the story that Chinese firm Huawei Technologies Co. had asserted more than 200 patents against Verizon Communications Inc., reportedly demanding more than $1 billion in licensing fees. On its face, this would seem to be a private patent dispute. But, in fact, it is an important turn of events for national security: The Verizon-Huawei dispute contradicts a view espoused by many experts, and even the Trump administration, about the relationship between national security and intellectual property rights such as patents.

  • The Chinese Influence Effort Hiding in Plain Sight

    The 80 Chinese student associations in Germany, which represent 60,000 students from the People’s Republic of China, are pieces of a Europe-wide puzzle of organizations. Perhaps numbering in the thousands, and meticulously fit together by Beijing, these associations support the Chinese Communist Party’s ideology and goals—and its narrative about China—among both Chinese and Europeans, and try to ensure that its overseas citizens, and others of ethnic Chinese descent, are loyal.

  • Former Heads of DHS and NSA Explain How the U.S. Can Keep Huawei at Bay

    On Wednesday, the FCC opened additional mid-band spectrum to support 5G mobile communications in the U.S., reducing reliance on short-range microwave spectrum that comes with high deployment costs. This move will help to ensure the U.S. doesn’t fall further behind other countries in the adoption of 5G, which is expected to spark $12 trillion in new economic activity by 2035, especially in enabling the internet of things.

  • A New Idea for Fighting Chinese Theft of American Defense Technology

    China is engaged in an organized effort to mass-produce counterfeit goods for resale abroad. This counterfeiting and copyright and trademark infringement harms America’s business owners, consumers, inventors, investors, and workers. China’s campaign of theft simultaneously seeks to obtain U.S. military technology to gain a decisive material advantage in a future armed conflict.

  • Italy’s Risky Realignment

    The Kremlin actively helped two Italian populist parties – The League and the Five Star movement – to reach power in Rome. The goal: Weaken the West and undermine the U.S.-created post-WWII international order. The Italian government is now repaying its supporters, formally endorsing China’s Belt and Road Initiative (BRI), which is meant to anchor an increasingly proselytizing authoritarian regime as the center of the global economy. Italy is thus helping the world’s most powerful authoritarian state establish a beachhead in southern Europe, threatening European strategic sectors, and publicly distancing itself from the EU’s efforts to respond to a “systemic rival.”

  • Truth decay People Who Spread Deepfakes Think Their Lies Reveal a Deeper Truth

    While photographic fakes have been around since the dawn of photography, the more recent use of deep learning artificial intelligence techniques (the “deep” in deepfakes) is leading to the creation of increasingly credible computer simulations. Because the problem seems to be a technological one, it’s tempting to cast about for technological, rather than social or political, solutions. The flaw of such solutions is they assume people and platforms circulating fake information will defer to the truth when confronted with it.

  • Huawei CVs Show Close Links with Military, Study Says

    A study of the employment information of thousands of Huawei staff has revealed deeper links with the Chinese military and intelligence apparatus than those previously acknowledged by China’s biggest telecom equipment maker. The findings are likely to add fuel to the debate among governments around the world over whether to block Huawei’s gear from the rollout of 5G telecoms networks for security reasons.

  • Transnational Organized Crime and National Security: Hezbollah, Hackers and Corruption

    American law enforcement efforts have become increasingly multifaceted as the government attempts to combat the continuing ingenuity and sophistication of transnational organized criminal groups. Eric Halliday writes in Lawfare that the U.S. government has announced several significant actions taken against transnational organized crime groups. The Treasury Department’s Office of Foreign Assets Control (OFAC) promulgated a slew of sanctions against the financial networks of both Hezbollah and Cártel de Jalisco Nueva Generación (CJNG). The Justice Department announced takedowns of drug trafficking rings spanning the U.S. and Mexico as well as a large-scale organized cybercrime ring composed of members from several Eastern European countries.