-
CHINA WATCHWondering Where China’s Cyber Effort Will Go Next? Just Read the Five-Year Plan
Adversaries sometimes declare strategic priorities, yet cyber incidents that align with them are not assessed accordingly. We should in fact be guarding against intrusions before they happen by taking note of foreign and industrial policies that indicate where they’re likely to concentrate.
-
-
CYBER-STRATEGYTrump’s Cyber Strategy Falls Short on China, Iran, and the Threats That Matter Most
Iranian cyber retaliation is escalating. Chinese operators remain embedded in U.S. infrastructure. Ransomware groups continue to disrupt hospitals, schools, and local governments. Trump’s recently released cyber strategy raises doubts the administration is prepared to address these threats.
-
-
DISINFORMATIONFrance Strikes to Address Misinformation Weakening Western Alliance
The key destabilizing feature of today’s information environment is no longer simply that democracies are targeted by adversaries’ misinformation and disinformation. Increasingly, the danger is coming from uninhibited partners in the allied ecosystem itself.
-
-
CHINA WATCHIf We Can’t Name China’s Cyberattacks, We Lose Trust in Ourselves
In the space of just a few days, two big US tech companies took different approaches to China’s cyberattacks. Palo Alto Networks generically referred to a global cyber espionage operation by unnamed actors while Google specifically named China as the globe’s leading cyber security threat. That inconsistency hurts everyone but China.
-
-
ESPIONAGEA Whiff of Espionage Around the Epstein Files Points to How Intelligence and Influence Interact
The Epstein papers have thrown up speculation about whether the late financier and sex offender might have performed services for one or another of the big intelligence agencies.
-
-
CHINA WATCHAllfare: China’s Whole-of-Nation Strategy
To analyze how states exert their influence, scholars often compartmentalize actions into rigid analytical frameworks, which obscures the holistic scope of the challenge.
-
-
SUSPICIONTrump Administration Orders USDA Employees to Investigate Foreign Researchers They Work With
The new directive asks workers to check the backgrounds of foreign nationals collaborating with the department’s scientists for evidence of “subversive or criminal activity.” Their names are being sent to national security experts at the agency.
-
-
CYBERSECURITYThe Sky is Full of Secrets: Glaring Vulnerabilities Discovered in Satellite Communications
With $800 of off-the-shelf equipment and months worth of patience, a team of U.S. computer scientists set out to find out how well geostationary satellite communications are encrypted. And what they found was shocking.
-
-
CHINA WATCH“DeepSeek Is in the Driver’s Seat. That’s a Big Security Problem”
Democratic countries have a smart-car problem. For those that don’t act quickly and decisively, it’s about to become a severe national security headache.
-
-
COMMON-SENSE NOTES // By Idris B. OdunewuDiversity as National Security: Why Retreating from DEI Risks Repeating Pre-9/11 Failures
One of often overlooked lessons of the 9/11 intelligence failure is that diversity — linguistic, cultural, experiential — was not simply a “nice to have” in intelligence work. It was essential infrastructure. The absence of diversity in America’s national security workforce thus represented more than a demographic imbalance; it represented a structural blind spot.
-
-
AI RISKS: UNSETTLING DEMONSTRATION AI-enabled Intrusions: What Anthropic’s Disclosure Really Means
Last week, AI company Anthropic reported with ‘high confidence’ that a Chinese state-sponsored hacking group had weaponized Anthropic’s own AI tools to run a largely automated cyberattack on several technology firms and government agencies. The September operation is the first publicly known case of an AI system conducting target reconnaissance with only minimal human direction.
-
-
DEMOCRACY WATCHFake survey Answers from AI Could Quietly Sway Election Predictions
Public opinion polls and other surveys rely on data to understand human behavior. New research reveals that artificial intelligence can now corrupt public opinion surveys at scale—passing every quality check, mimicking real humans, and manipulating results without leaving a trace.
-
-
TECH SECURITYBuilding Trust into Tech: A Framework for Sovereign Resilience
Governments are facing a critical question: who can be trusted to build and manage their countries’ most sensitive systems? Vendor choices, for everything from cloud infrastructure to identity platforms, are no longer just commercial; they are strategic.
-
-
CHINA WATCHU.S.–China Cyber Relations and the Weaponization of Microsoft Platforms
Cyber tensions between the United States and China show Microsoft’s central yet fragile role in global cybersecurity, where its platforms serve as both assets and targets. While both nations have exploited vulnerabilities within the platform to conduct cyber-espionage against each other, China has been particularly persistent in its operations.
-
-
CHINA WATCHReaction Isn’t Enough. Nexperia Case Shows We Must Pre-empt China’s Tech Grabs
The Dutch government’s decision on 30 September to impose a last-resort restraint order on China-owned Netherlands-based chipmaker Nexperia is more than a trade dispute. It’s the consequence of a belated realization that technology competition with China is real. Economic security in open and liberal democracies demands foresight, not last-minute intervention.
-
More headlines
The long view
CHINA WATCHAllfare: China’s Whole-of-Nation Strategy
By Michael Margolius
To analyze how states exert their influence, scholars often compartmentalize actions into rigid analytical frameworks, which obscures the holistic scope of the challenge.
DISINFORMATIONFrance Strikes to Address Misinformation Weakening Western Alliance
By Eric Frecon and Fitriani
The key destabilizing feature of today’s information environment is no longer simply that democracies are targeted by adversaries’ misinformation and disinformation. Increasingly, the danger is coming from uninhibited partners in the allied ecosystem itself.
