• White House Launches Broader Scrutiny of Foreign Tech

    An executive order signed by President Joe Biden earlier this month dropped a Trump-era measure that barred Americans from downloading TikTok and several other Chinese smartphone apps. But analysts say the order also broadens the scrutiny of foreign-controlled technology.

  • New Federal Agency Needed to Help U.S. Compete with China in Advanced Industries, Technologies: Report

    To compete effectively with China, the United States must develop and implement a national advanced industry and technology strategy that is explicitly focused on the commercial competitiveness of select sectors that are most critical to the economy—and the U.S. government needs a new, free-standing agency that is solely dedicated to carrying out that mission.

  • Developing Research Model to Fight Deepfakes

    Detecting “deepfakes,” or when an existing image or video of a person is manipulated and replaced with someone else’s likeness, presents a massive cybersecurity challenge: What could happen when deepfakes are created with malicious intent? Artificial intelligence experts are working on a new reverse-engineering research method to detect and attribute deepfakes.

  • Think Small: Why the Intelligence Community Should Do Less about New Threats

    A week into his administration, President Joe Biden announced that he was “putting the climate crisis at the center of United States foreign policy and national security. Joshua Rovner writes that, in so doing, the president injected new urgency into an old question: What counts as a national security threat?

  • Poisoning of Russian Writer Bykov Linked with FSB Agents Suspected in Navalny Case

    Investigative journalists say a detailed investigation shows Russian writer and poet Dmitry Bykov, a critic of the government, suffered a poisoning attack two years ago at the hands of the same agents suspected of being involved in the poisoning of opposition figures Aleksei Navalny and Vladimir Kara-Murza Jr.

  • China's Internet Trolls Go Global

    Chinese trolls are beginning to pose serious threats to economic security, political stability, and personal safety worldwide. The CCP-backed trolls have become more than a nuisance, and the magnitude and frequency of their attacks will likely continue to increase. Formulating an effective response will require understanding their size, tactics, and mission as the CCP widens the scope of its public opinion war to include foreign audiences.

  • Study Shows AI-Generated Fake Reports Fool Experts

    AIs can generate fake reports that are convincing enough to trick cybersecurity experts. If widely used, these AIs could hinder efforts to defend against cyberattacks. These systems could set off an AI arms race between misinformation generators and detectors.

  • The Weaponized Web: The National Security Implications of Data

    Open societies have encouraged and promoted rapid technological advancement and market innovation —but both have outpaced democratic governance. Authoritarian powers have noticed the underlying opportunity to exploit the open standards of the democratically regulated digital information environment and undermine democratic values and institutions while shoring up their own regimes. This poses a novel challenge for democracies, which must adapt to compete in this conflict over the data, architecture, and governance framework of the information space without compromising their democratic principles.

  • U.S. to Make Intelligence on COVID-19 Origins Public

    The United States will share the results of a new deep-dive by its top intelligence agencies into the origins of the coronavirus pandemic that has killed millions of people across the globe. Top U.S. intelligence agencies said last year that their information supported “the wide scientific consensus that the COVID-19 virus was not man-made or genetically modified” but that they would “continue to rigorously examine emerging information and intelligence” to determine whether the outbreak began after the virus was transmitted to humans from animals in nature or as the result of a laboratory accident.

  • China’s Determined Effort to Build an S&T Infrastructure

    For half a century, China, with dogged determination, has pursued its effort to build an S&T infrastructure. A new report from the Center for Security and Emerging Technology (CSET) notes that foreign technology acquisition continues to play a large role in this effort, with commercial technology products becoming increasingly attractive targets. Beijing’s “hybrid innovation system” blends forms of academic collaboration, industry partnerships, cyber espionage, direct investment, and influence operations to enhance China’s comprehensive national power.

  • Evil Eye Gazes Beyond China’s Borders: Troubling Trends in Chinese Cyber Campaigns

    On March 24, 2021, Facebook announced they had taken actions against an advanced persistent threat (APT) group located in China, previously monikered as Evil Eye. Evil Eye’s campaign was clearly motivated by a political goal that China frequently uses a blend of information operations (IO) and cyber means to accomplish: the disruption of dissidents, especially those who raise awareness of China’s human rights violations against its ethnic minorities.

  • Informant Motivation

    The effective recruitment and deployment of informants is critical to law enforcement and intelligence agencies being able to identify and manage threats. Accurately identifying a source’s motivation for providing information enables an informant handler to better influence the informant’s behavior. A new framework has been devised to help informant handlers better identify motivations.

  • Cyberspace Is Neither Just an Intelligence Contest, nor a Domain of Military Conflict; SolarWinds Shows Us Why It’s Both

    Operations in cyberspace—at least those perpetrated by nation-state actors and their proxies—reflect the geopolitical calculations of the actors who carry them out. Erica D. Borghard writes that cyberspace is sometimes an intelligence contest, and other times a domain of conflict, depending on the strategic approaches and priorities of particular actors at a given moment in time. The SolarWinds campaign shows that “Future conversation needs to move beyond the military versus intelligence contest binary construct to more meaningfully explore how states may seek to use cyberspace for multiple objectives, either in sequence or in parallel,” she writes.

  • Huawei’s Ability to Eavesdrop on Dutch Mobile Users Is a Wake-up Call for the Telecoms Industry

    Chinese technology provider Huawei was recently accused of being able to monitor all calls made using Dutch mobile operator KPN. While the full report on the issue has not been made public, journalists reporting on the story have outlined specific concerns that Huawei personnel in the Netherlands and China had access to security-essential parts of KPN’s network – including the call data of millions of Dutch citizens – and that a lack of records meant KPN couldn’t establish how often this happened.

  • Stoner’s Quantitative and Qualitative Assessment of Russia’s New Strength

    Understanding Russia’s power and the Russian leadership’s goals is a necessary task in formulating effective policy. Moreover, as Russia has become considerably more powerful over the last two decades, the stakes in accurately discerning the Kremlin’s motives have become commensurately higher.If Russia Resurrected approached these challenges with more care, discipline and nuance, it could have been an important work.