-
Cryptocurrency and National Insecurity
A recent exercise at Harvard’s Kennedy School explored the dangers of large sums of money being secretly sent to hostile nations. The exercise brought together administration veterans, career diplomats, and academics to dramatize a very real prospect — the rise of an encrypted digital currency that would upend the U.S. dollar’s dominance and effectively render ineffective economic sanctions, like those currently applied to North Korea.
-
-
Switching to Renewable Energy May Save Thousands of Lives in Africa
With economies and populations surging, an industrial revolution is inevitable on the African continent. The question is, what’s going to power it? With renewable energy cheaper and more efficient than ever, countries in Africa have the unique opportunity to harness abundant renewable sources like wind, solar and geothermal to leapfrog the dependence on fossil fuels that has poisoned the air and environment in Europe, the U.S., India and China. But will they?
-
-
Beijing Will Give You Cold War Nostalgia
America’s twenty-first-century competition with China is likely to be more dangerous and more complex than the U.S. Cold War with the Soviet Union. Walter Russell Mean writes that this is the result of two factors: First, China’s economic power makes it a much more formidable and resourceful opponent than the Soviet Union was., and, second, the technological environment has changed dramatically in the past generation.
-
-
Vulnerabilities Affecting Billions of Computer Chips Discovered
Security researchers discovered serious security vulnerabilities in computer chips made by Intel Corp. and STMicroelectronics. The flaws affect billions of laptop, server, tablet, and desktop users around the world. The security flaws could be used to steal or alter data on billions of devices.
-
-
Saudi “Twitter Spies” Broke No Federal Privacy Laws -- Because There Are None
Privacy expert Mike Chapple of the University of Notre Dame says that the Saudi “Twitter Spies,” who were charged last week by the Justice Department for spying on behalf of Saudi Arabia, committed espionage — but broke no federal privacy laws because there are no such laws. Chapple says that Twitter failed to live up to industry-standard cybersecurity practices.
-
-
The Trolls Are Everywhere. Now What Are We Supposed to Do?
Forget the decline of gatekeepers. Imagine a world bereft of gates and uncrossable lines, with no discernible rules. Andrew Marantz’s just published book, Antisocial: Online Extremists, Techno-Utopians, and the Hijacking of the American Conversation, offers a detailed and disturbing study of how the social media platforms, rolled out over the last decade by a group of nerdy but naïve Silicon Valley entrepreneurs, have been hijacked by “edge lords” — another name for a collection of nihilists, right-wing nationalists, conspiracy purveyors, white supremacists, and more, whose goal is to downgrade the discourse in a way that would soon corrode the entire system. “The ranking algorithms on social media laid out clear incentives: provoke as many activating emotions as possible; lie, spin, dog-whistle; drop red pill after red pill; step up to the line repeatedly, in creative new ways,” Marantz writes. Public discourse is being replaced by the dance of discord and enragement and noxiousness.
-
-
We’re Underestimating China’s Impact on Governance in Latin America: Three Persistent Myths
China’s growing engagement with Latin America and the Caribbean (LAC) in recent years has captured the attention of policymakers, business leaders and foreign policy observers across the region. Jessica Ludwig writes that much of this discussion has focused on the economic dimensions of the relationship. “But largely absent from the conversation has been a serious, dedicated look at the normative impact of relations with Beijing on governance—and, in particular, on whether closer relationships with China’s party-state authorities will affect prospects for democracy in a region that has—at least theoretically—adopted a consensus around democratic values,” Ludwig writes. “Without a firm, well-rounded foundation of knowledge about China and the priorities of its political leadership, LAC countries are starting from a significantly disadvantaged position when negotiating the terms of the relationship.”
-
-
Are Facebook and Google State Actors?
In 1924, concerned about monopolization in the radio industry, the secretary of commerce said something prescient: “It cannot be thought that any single person or group shall ever have the right to determine what communication may be made to the American people. … We cannot allow any single person or group to place themselves in a position where they can censor the material which shall be broadcasted to the public.” Jed Rubenfeld writes that what Secretary Herbert Hoover warned against has now come to pass:
-
-
Inside the Microsoft Team Tracking the World’s Most Dangerous Hackers
When the Pentagon recently awarded Microsoft a $10 billion contract to transform and host the U.S. military’s cloud computing systems, the mountain of money came with an implicit challenge: Can Microsoft keep the Pentagon’s systems secure against some of the most well-resourced, persistent, and sophisticated hackers on earth?
-
-
Foreign Money Flows into U.S. Politics
Untold amounts of foreign donations are flowing into America’s political system, with little accountability or limits. Although election experts say it’s impossible to accurately estimate the extent of foreign financial influence over U.S. elections, many agree it has increased substantially since a landmark Supreme Court ruling nearly a decade ago opened the flood gates.
-
-
The WhatsApp-NSO Group Lawsuit and the Limits of Lawful Hacking
On 29 October, WhatsApp sued the Israeli cybersecurity company NSO Group for installing surveillance malware on the phones of more than a thousand WhatsApp users, including journalists and human rights activists. (The WhatsApp vulnerability that NSO Group exploited was publicly reported in May 2019 and patched shortly thereafter.) WhatsApp sued primarily under the Computer Fraud and Abuse Act (CFAA), the main federal law criminalizing computer hacking, which also permits private lawsuits. Alan Z. Rozenshtein writes that the complaint is notable for what it doesn’t include: the identity of the “customers” on whose behalf NSO Group installed the malware. But it’s pretty easy to figure out.
-
-
Why Did Microsoft Fund an Israeli Firm that Surveils West Bank Palestinians?
Microsoft has invested in AnyVision, an Israeli startup which has developed a facial recognition technology used by Israel’s military and intelligence services to surveil Palestinians throughout the West Bank, in spite of the tech giant’s public pledge to avoid using the technology if it encroaches on democratic freedoms. The surveillance technology lets customers identify individuals and objects in any live camera feed, such as a security camera or a smartphone, and then track targets as they move between different feeds. The Israeli surveillance project is similar to China’s surveillance of its Uighur minority population. China is using artificial intelligence and facial recognition technology for a pervasive, intrusive monitoring of the Uighurs, a Muslim group living in western China.
-
-
Are We Making Cyber Ransoms Worse?
Nobody intends to become a hostage. Rather than facing a masked gunman or mafioso hinting at misfortune, these days trouble begins with an email. The link may not work, or there may be a cryptic ransom note demanding an exorbitant payment in cryptocurrency. A frantic phone call from the IT department will follow. It is the call every business leader fears: Your computer system has been breached and data has been stolen or locked up with encryption that cannot be broken. This scenario is not far-fetched. It is not even uncommon.
-
-
How a Weaponized Dollar Could Backfire
United States foreign policy under President Donald Trump continues to run counter to America’s traditional post-war objectives. Should the U.S. carelessly relinquish leadership of the global multilateral order, the dollar might eventually lose its own long-standing primacy.
-
-
Thwarting Cybersecurity Attacks Depends on Strategic, Third-Party Investments
Companies interested in protecting themselves and their customers from cyber-attacks need to invest in themselves and the vendors that handle their data, according to new research. To mitigate risks, the researchers recommend companies that are typically competitors become allies in strengthening cyber security supply chains.
-
More headlines
The long view
Economic Cyberespionage: A Persistent and Invisible Threat
Economic cyber-espionage, state-sponsored theft of sensitive business information via cyber means for commercial gain, is an invisible yet persistent threat to national economies.
Nuclear Has Changed. Will the U.S. Change with It?
Fueled by artificial intelligence, cloud service providers, and ambitious new climate regulations, U.S. demand for carbon-free electricity is on the rise. In response, analysts and lawmakers are taking a fresh look at a controversial energy source: nuclear power.
Calls Grow for U.S. to Counter Chinese Control, Influence in Western Ports
Experts say Washington should consider buying back some ports, offer incentives to allies to decouple from China.
Exploring the New Nuclear Energy Landscape
In the last few years, the U.S. has seen a resurgence of interest in nuclear energy and its potential for helping meet the nation’s growing demands for clean electricity and energy security. Meanwhile, nuclear energy technologies themselves have advanced, opening up new possibilities for their use.