• Should Santa Use a Drone to Deliver Gifts to Well-Behaved Children?

    Santa has always run a one-sleigh operation, but a new analysis could help him speed deliveries and save energy, if he ever decided to add a drone to his route. The new routing algorithm anticipates the day trucks and drones cooperate to drop packages at your doorstep quickly and efficiently.

  • FCC Bans Use of Federal Funds in Purchases of Chinese Telecom

    The Federal Communications Commission (FCC) on 22 November blocked U.S. telecommunications providers from using an $8.5 billion subsidy fund – the FCC’s Universal Service Fund (USF) — to buy Chinese-made telecommunications gear deemed a national security threat to critical infrastructure. The U.S. said that given Huawei and ZTE’s close relationship and legal obligations to the Chinese government, their gear poses a threat to telecommunications critical infrastructure, as well as to national security.

  • The Case That Could Hand the Future to China

    What would the future look like if China leads 5G technology? We should contemplate this question because, as Mercy Kuo writes, fifth-generation cellular network technology, or 5G, will transform our daily lives with such inventions as autonomous-driving vehicles, artificial intelligence, the Internet of Things, and smart cities. If we want to maintain U.S. technology leadership and protect our values, we should be clear-eyed about the perilous consequences that could come with losing our unique lead.”

  • Flaw in iVote System Used in Australian Election

    Flaws in the iVote internet and telephone voting system used in the 2019 New South Wales election could have made it vulnerable to undetectable voter fraud, a new report has revealed. A new report has shown how the iVote system suffers from an error in its verification process that could allow the verification of votes to be “tricked”, meaning some valid votes could be converted into invalid ones, and not counted.

  • Cryptocurrency and National Insecurity

    A recent exercise at Harvard’s Kennedy School explored the dangers of large sums of money being secretly sent to hostile nations. The exercise brought together administration veterans, career diplomats, and academics to dramatize a very real prospect — the rise of an encrypted digital currency that would upend the U.S. dollar’s dominance and effectively render ineffective economic sanctions, like those currently applied to North Korea.

  • Switching to Renewable Energy May Save Thousands of Lives in Africa

    With economies and populations surging, an industrial revolution is inevitable on the African continent. The question is, what’s going to power it? With renewable energy cheaper and more efficient than ever, countries in Africa have the unique opportunity to harness abundant renewable sources like wind, solar and geothermal to leapfrog the dependence on fossil fuels that has poisoned the air and environment in Europe, the U.S., India and China. But will they?

  • Beijing Will Give You Cold War Nostalgia

    America’s twenty-first-century competition with China is likely to be more dangerous and more complex than the U.S. Cold War with the Soviet Union. Walter Russell Mean writes that this is the result of two factors: First, China’s economic power makes it a much more formidable and resourceful opponent than the Soviet Union was., and, second, the technological environment has changed dramatically in the past generation.

  • Vulnerabilities Affecting Billions of Computer Chips Discovered

    Security researchers discovered serious security vulnerabilities in computer chips made by Intel Corp. and STMicroelectronics. The flaws affect billions of laptop, server, tablet, and desktop users around the world. The security flaws could be used to steal or alter data on billions of devices.

  • Saudi “Twitter Spies” Broke No Federal Privacy Laws -- Because There Are None

    Privacy expert Mike Chapple of the University of Notre Dame says that the Saudi “Twitter Spies,” who were charged last week by the Justice Department for spying on behalf of Saudi Arabia, committed espionage — but broke no federal privacy laws because there are no such laws. Chapple says that Twitter failed to live up to industry-standard cybersecurity practices.

  • The Trolls Are Everywhere. Now What Are We Supposed to Do?

    Forget the decline of gatekeepers. Imagine a world bereft of gates and uncrossable lines, with no discernible rules. Andrew Marantz’s just published book, Antisocial: Online Extremists, Techno-Utopians, and the Hijacking of the American Conversation, offers a detailed and disturbing study of how the social media platforms, rolled out over the last decade by a group of nerdy but naïve Silicon Valley entrepreneurs, have been hijacked by “edge lords” — another name for a collection of nihilists, right-wing nationalists, conspiracy purveyors, white supremacists, and more, whose goal is to downgrade the discourse in a way that would soon corrode the entire system. “The ranking algorithms on social media laid out clear incentives: provoke as many activating emotions as possible; lie, spin, dog-whistle; drop red pill after red pill; step up to the line repeatedly, in creative new ways,” Marantz writes. Public discourse is being replaced by the dance of discord and enragement and noxiousness.

  • We’re Underestimating China’s Impact on Governance in Latin America: Three Persistent Myths

    China’s growing engagement with Latin America and the Caribbean (LAC) in recent years has captured the attention of policymakers, business leaders and foreign policy observers across the region. Jessica Ludwig writes that much of this discussion has focused on the economic dimensions of the relationship. “But largely absent from the conversation has been a serious, dedicated look at the normative impact of relations with Beijing on governance—and, in particular, on whether closer relationships with China’s party-state authorities will affect prospects for democracy in a region that has—at least theoretically—adopted a consensus around democratic values,” Ludwig writes. “Without a firm, well-rounded foundation of knowledge about China and the priorities of its political leadership, LAC countries are starting from a significantly disadvantaged position when negotiating the terms of the relationship.”

  • Are Facebook and Google State Actors?

    In 1924, concerned about monopolization in the radio industry, the secretary of commerce said something prescient: “It cannot be thought that any single person or group shall ever have the right to determine what communication may be made to the American people. … We cannot allow any single person or group to place themselves in a position where they can censor the material which shall be broadcasted to the public.” Jed Rubenfeld writes that what Secretary Herbert Hoover warned against has now come to pass:

  • Inside the Microsoft Team Tracking the World’s Most Dangerous Hackers

    When the Pentagon recently awarded Microsoft a $10 billion contract to transform and host the U.S. military’s cloud computing systems, the mountain of money came with an implicit challenge: Can Microsoft keep the Pentagon’s systems secure against some of the most well-resourced, persistent, and sophisticated hackers on earth?

  • Foreign Money Flows into U.S. Politics

    Untold amounts of foreign donations are flowing into America’s political system, with little accountability or limits. Although election experts say it’s impossible to accurately estimate the extent of foreign financial influence over U.S. elections, many agree it has increased substantially since a landmark Supreme Court ruling nearly a decade ago opened the flood gates.

  • The WhatsApp-NSO Group Lawsuit and the Limits of Lawful Hacking

    On 29 October, WhatsApp sued the Israeli cybersecurity company NSO Group for installing surveillance malware on the phones of more than a thousand WhatsApp users, including journalists and human rights activists. (The WhatsApp vulnerability that NSO Group exploited was publicly reported in May 2019 and patched shortly thereafter.) WhatsApp sued primarily under the Computer Fraud and Abuse Act (CFAA), the main federal law criminalizing computer hacking, which also permits private lawsuits. Alan Z. Rozenshtein writes that the complaint is notable for what it doesn’t include: the identity of the “customers” on whose behalf NSO Group installed the malware. But it’s pretty easy to figure out.