-
Baltic Subsea Sabotage: China Gets Away with Non-cooperation
On Christmas Day, one of two cables connecting Finland’s electricity grid to Estonia, Latvia and Lithuania was cut. Four data cables—three linking Finland and Estonia and one between Finland and Germany—were broken at the same time. This and two earlier instances have heightened concerns about the vulnerability of Europe’s undersea infrastructure.
-
-
The World’s Most Bizarre Secret Weapons: How Pigeons, Cats, Whales and Even Robotic Catfish Have Acted as Spies Through the Ages
The death of a spy is rarely newsworthy, but when a white beluga whale suspected of spying for Moscow was found dead in Norwegian waters in September, the animal soon became a minor celebrity. The whale is one in a long line of animals which have been used by the intelligence services.
-
-
U.S. Slow to React to Pervasive Chinese Hacking: Experts
As new potential threats from Chinese hackers were identified this week, the federal government issued one of its strongest warnings to date about the need for Americans —and in particular government officials and other “highly targeted” individuals —to secure their communications against eavesdropping and interception.
-
-
China-Based Hacker Conspired to Develop and Deploy Malware That Exploited Tens of Thousands of Firewalls Worldwide
Chinese hacker and his co-conspirators worked at the offices of Sichuan Silence Information Technology Co. Ltd. to discover and exploit a previously-unknown vulnerability (an “0-day” vulnerability) in certain firewalls.
-
-
Interference Interrupted: The US Government’s Strides Defending Against Foreign Threats to the 2024 Election
Foreign interference in U.S. elections has undoubtedly evolved, becoming more sophisticated and extensive, since Russia’s sweeping operation in 2016. But so have the US government’s strategies to expose, counter, and mitigate these attacks.
-
-
Rep. Michael McCaul Calls Tulsi Gabbard a “baffling” Pick to Lead Intelligence Community
The Austin Republican leads the House Foreign Affairs Committee and predicted Gabbard’s nomination would fail in the Senate.
-
-
Former FBI Informant Pleads Guilty to Fabricating Biden Bribery Story
Alexander Smirnov, a former FBI informant, pleaded guilty Monday in Los Angeles federal court to faking the story about a phony bribery scheme involving President Joe Biden and his son Hunter. The fabricated story was the central element of a House impeachment inquiry.
-
-
What is Salt Typhoon? A Security Expert Explains the Chinese Hackers and Their Aattack on U.S. Telecommunications Networks
Lost in the noise of the story is that Salt Typhoon has proved that the decades of warnings by the internet security community were correct. No mandated secret or proprietary access to technology products is likely to remain undiscovered or used only by “the good guys” – and efforts to require them are likely to backfire.
-
-
Chinese Hackers Still Lurk in U.S. Telecommunications systems
Chinese hackers blamed for compromising U.S. telecommunications infrastructure and spying on American presidential campaigns and American officials are still entrenched in those systems.
-
-
Protecting U.S. Allies and Partners from Chinese Economic Coercion
China’s growing willingness to defy the international order, and its increasingly aggressive leadership, have led it to increasingly utilize economic coercion against countries it believes have defied China’s interests. This coercion can be powerful, and the United States and its partners have not been well-prepared for Beijing’s actions. The U.S. and others need to develop a response immediately.
-
-
Chinese Vessel Suspected of Severing Submarine Cables Still Anchored in Baltic Sea
European allies in the Baltic region are investigating how two fiber-optic data cables were severed earlier this week, with suspicion falling on a Chinese vessel in the area. Germany has said the incident was clearly sabotage.
-
-
Downsides of China’s Port Investments Go Beyond Immediate Security Risks
Chinese companies own or operate at least one port on every continent. These investments present more than immediate security concerns; they position China to fully exploit the economic potential of ports at the expense of other countries.
-
-
Suspected Chinese Hack of U.S. Telecoms Reveals Broader Plot
A hack of U.S. telecommunications systems linked to China that initially appeared to focus on the American presidential campaigns goes much deeper, according to investigators, and is likely part of a vast effort by Beijing to spy on the United States.
-
-
FBI: Bomb Threats Against U.S. Voting Locations Appear to Be Coming from Russia
A series of bomb threats sent to polling locations across the United States appears to be coming from Russia, according to new assessments from both federal and state officials.
-
-
Russian Disinformation Campaign Creates 'Climate of Chaos,' Say Experts
In the last two years, Russian agents have created fake websites which are employed in a “persistent” disinformation campaign. The Russian agents are creating false news websites that mimic reputable sources and posting fake stories to those phony sites. The websites may look like trusted European media outlets but in fact mislead readers with malicious stories and propaganda.
-
More headlines
The long view
Diversity as National Security: Why Retreating from DEI Risks Repeating Pre-9/11 Failures
One of often overlooked lessons of the 9/11 intelligence failure is that diversity — linguistic, cultural, experiential — was not simply a “nice to have” in intelligence work. It was essential infrastructure. The absence of diversity in America’s national security workforce thus represented more than a demographic imbalance; it represented a structural blind spot.
Fake survey Answers from AI Could Quietly Sway Election Predictions
Public opinion polls and other surveys rely on data to understand human behavior. New research reveals that artificial intelligence can now corrupt public opinion surveys at scale—passing every quality check, mimicking real humans, and manipulating results without leaving a trace.
Building Trust into Tech: A Framework for Sovereign Resilience
Governments are facing a critical question: who can be trusted to build and manage their countries’ most sensitive systems? Vendor choices, for everything from cloud infrastructure to identity platforms, are no longer just commercial; they are strategic.
