-
CHINA WATCHPentagon Bans Tech Vendors from Using China-Based Personnel After ProPublica Investigation
The Defense Department has tightened cybersecurity requirements for its cloud services providers. The changes come after ProPublica revealed how Microsoft’s use of China-based engineers left sensitive government data vulnerable to hacking.
-
-
CHINA WATCHPentagon Warns Microsoft: Company’s Use of China-Based Engineers Was a “Breach of Trust”
The Defense Department is opening an investigation to determine if the tech giant’s use of overseas engineers to maintain sensitive U.S. government computer systems compromised national security.
-
-
UNILTERAL DISRMAMENT What Just Happened? Dismantling the Intelligence Community’s Foreign Malign Influence Center
Director of National Intelligence Tulsi Gabbard announced that the functions of the intelligence community’s Foreign Malign Influence Center (FMIC) would be significantly reduced. Gabbard has thus dismantled the last remaining U.S. federal government organ dedicated to tracking and analyzing state-sponsored efforts to interfere in U.S. institutions, elections, and society – following the Trump administration’s shutting down of related units at the State Department, Department of Homeland Security, FBI, and Department of Justice earlier this year.
-
-
UNILTERAL DISRMAMENT Silencing America’s Voice
The Trump administration has taken a series of steps which have substantially weakened U.S. government-funded media outlets whose task it was to tell the American story and counter the global propaganda and disinformation efforts of U.S. adversaries. These moves greatly benefit the anti-American propaganda efforts of Russia and China, which will now go unchallenged.
-
-
DEEPFAKESAustralia’s Deepfake Dilemma and the Danish Solution
Countries need to move beyond simply pleading with internet platforms for better content moderation and instead implement new legal frameworks that empower citizens directly. For a model of how to achieve this, policymakers should look to the innovative legal thinking emerging from Denmark.
-
-
CHINA WATCHMicrosoft Failed to Disclose Key Details About Use of China-Based Engineers in U.S. Defense Work, Record Shows
The tech giant is required to regularly provide U.S. officials with its plan for keeping government data safe from hacking. Yet a copy of Microsoft’s security plan obtained by ProPublica makes no reference to the company’s China-based operations.
-
-
IRAN’S THREATIsrael Secretly Recruited Iranian Dissidents to Attack Their Country from Within
The Mossad made Iran its top priority in 1993 after Israelis and Palestinians signed the Oslo Accords on the White House lawn, seemingly ending decades of conflict. The main goal of Israel’s focus on Iran: To protect Israel’s nuclear monopoly in the region.
-
-
CHINA WATCHMicrosoft Used China-Based Engineers to Support Product Recently Hacked by China
Microsoft announced that Chinese state-sponsored hackers had exploited vulnerabilities in its popular SharePoint software but didn’t mention that it has long used China-based engineers to maintain the product.
-
-
CHINA WATCHThe Taiwan Scenarios 2: Warning Signs
At first, it may not be easy to see what’s afoot. The difference between China’s routine coercion of Taiwan and early signs of serious escalation to take control of the island may not be clear.
-
-
INTELLIGENCE COMMUNITYCongress Has a Chequered History of Overseeing U.S. Intelligence and National Security
The role of Congress is to conduct oversight. It is the role of the governing administration to keep Congress informed of intelligence matters, particularly covert operations. History shows this has often been hard to achieve.
-
-
TRUTH DECAYHow the QAnon Movement Entered Mainstream Politics – and Why the Silence on Epstein Files Matters
QAnon followers fervently believe that the United States is secretly controlled by a cabal of elites who are pedophiles, sex traffickers, and satanists, and that Trump is a mythological, heroic figure fighting this elite pedophile ring. The QAnon movement continues to evolve, even as its central figure hedges and hesitates, showing how potent myths can be in times of uncertainty. Understanding why this belief continues to gain traction is essential for understanding the current state of American democracy.
-
-
CYBERSECURITYA Little-Known Microsoft Program Could Expose the Defense Department to Chinese Hackers
Microsoft is using engineers in China to help maintain the Defense Department’s computer systems —with minimal supervision by U.S. personnel. Digital escorts often lack the technical expertise to police foreign engineers with far more advanced skills, leaving highly sensitive data vulnerable to hacking. Microsoft has been warned that the arrangement is inherently risky, but the company launched and expanded it anyway.
-
-
THE RUSSIA CONNECTIONRussian Imperial Movement: How a Far-Right Group Outlawed by the U.K. Is Spreading Terror Across Europe
The decision by the British government to proscribe the RIM indicates concern that the far-right group is increasing its operational capacity both in Ukraine and throughout Europe. With its extensive network, the movement will become an increasing threat to security if it is allowed to continue acting as a proxy for Putin’s foreign policy objectives.
-
-
THE RUSSIA CONNECTIONCountering Russia’s Cognitive Warfare Against the United States
China, Russia, Iran, and North Korea increasingly use cognitive warfare against the United States in order to shape U.S. decision-making.
-
-
DEEPFKESMarco Rubio Impersonator Contacted Officials Using AI Voice Deepfakes – Computer Security Experts Explain What They Are and How to Avoid Getting Fooled
Ongoing advances in deep-learning algorithms, audio editing and engineering, and synthetic voice generation have meant that it is increasingly possible to convincingly simulate a person’s voice. Even worse, chatbots like ChatGPT are capable of generating realistic scripts with adaptive real-time responses.
-