-
Saudi “Twitter Spies” Broke No Federal Privacy Laws -- Because There Are None
Privacy expert Mike Chapple of the University of Notre Dame says that the Saudi “Twitter Spies,” who were charged last week by the Justice Department for spying on behalf of Saudi Arabia, committed espionage — but broke no federal privacy laws because there are no such laws. Chapple says that Twitter failed to live up to industry-standard cybersecurity practices.
-
-
Linking Formation of International Laws to Refugee Crisis
Geographers are linking the political and human rights issues at borders today to the legacies of foreign and domestic policy across the globe since the First World War. A new study examines more than 100 years of international laws that have led, perhaps unintentionally, to the existing hostile climate for refugees.
-
-
Can the United States Deter Election Meddling?
The 2020 election is still a year away, but law enforcement officials are already sounding the alarm about foreign interference in the election. Leaders of the U.S. intelligence and law enforcement communities warn that Moscow is preparing to launch a similar effort next year. Joshua Rovner writes that cyber-meddling is a challenge, but that we should not despair.
-
-
The Fractured Terrorism Threat to America
The Islamic State and its formerly held territory are no longer the incandescent bug lamp for the jihadist scene. “It is clear that the jihadist threat has become fractured, with new and old hazards facing the United States concurrently,” Seamus Hughes and Devorah Margolin write.
-
-
The Senate Examines Threats to the Homeland
On Tuesday, Nov. 5, the Senate Homeland Security and Governmental Affairs Committee held a hearing on the evolving threats facing the United States. In their written and opening remarks, the witnesses outlined a dizzyingly broad array of threats—from domestic and international terrorism to transnational organized crime, cyber and economic espionage, election interference, data insecurity, and potential chemical and biological attacks on the homeland. As the hearing wore on, senators’ questions and witness testimony narrowed in scope, focusing primarily on three aspects of America’s security challenges: how to optimize information sharing to combat domestic terrorism; how to counter Chinese cyber and counterintelligence operations; and how to address the growing problems posed by new technologies, namely, ransomware, cryptocurrency and unmanned aerial systems (UASs).
-
-
Disinformation Agents Are Targeting Veterans in Run-Up to 2020 Election
Disinformation campaigns are targeting U.S. veterans through social media, seeking to tap the group’s influential status in their communities and high voting turnout in order to influence elections and fuel discord. Katerina Patin writes that veterans present an ideal target for foreign actors. In addition to their social status and voting rate, veterans are also more likely to run for office and more likely to work in government than any other demographic.
-
-
Online Disinformation and Political Discourse: Applying a Human Rights Framework
The framers of the Universal Declaration of Human Rights (UDHR) saw human rights as a fundamental safeguard for all individuals against the power of authority. Although some digital platforms now have an impact on more people’s lives than does any one state authority, the international community has been slow to measure and hold to account these platforms’ activities by reference to human rights law. Kate Jones writes that “Although international human rights law does not impose binding obligations on digital platforms, it offers a normative structure of appropriate standards by which digital platforms should be held to account. Because of the impact that social media can have, a failure to hold digital platforms to human rights standards is a failure to provide individuals with the safeguards against the power of authority that human rights law was created to provide.”
-
-
We’re Underestimating China’s Impact on Governance in Latin America: Three Persistent Myths
China’s growing engagement with Latin America and the Caribbean (LAC) in recent years has captured the attention of policymakers, business leaders and foreign policy observers across the region. Jessica Ludwig writes that much of this discussion has focused on the economic dimensions of the relationship. “But largely absent from the conversation has been a serious, dedicated look at the normative impact of relations with Beijing on governance—and, in particular, on whether closer relationships with China’s party-state authorities will affect prospects for democracy in a region that has—at least theoretically—adopted a consensus around democratic values,” Ludwig writes. “Without a firm, well-rounded foundation of knowledge about China and the priorities of its political leadership, LAC countries are starting from a significantly disadvantaged position when negotiating the terms of the relationship.”
-
-
Why a 1972 Northern Ireland Murder Matters So Much to Historians
In a recent decision, a court in Northern Ireland ruled that evidence from an oral history project could not be considered in a 1972 murder case, clearing 82-year-old Ivor Bell of soliciting the killing of Jean McConville. Evidence from the Belfast Project, an oral history of Northern Ireland’s Troubles, indicated Bell and other members of the Provisional Irish Republican Army (IRA) kidnapped and murdered McConville because they incorrectly believed she had provided information to the British Army about IRA activity in Belfast. This evidence played an important role in Bell’s indictment and trial in the McConville case. This ordeal strained the relationship between legal justice and historical truth, Donald M. Beaudette and Laura Weinstein write. “Though in court, lawyers, judges and juries assess the guilt of alleged offenders according to well-honed rules of evidence and interpretations of the law, assessing historical truth is more complex,” they write. They argue that scholars “can and must write and speak more broadly about how historical interpretation works, so citizens are better equipped to understand that the dominant interpretation of history is not the only one, nor is it necessarily the correct one.”
-
-
U.S. Security Leaders Warn About Russian, Iranian Interference in 2020 Polls
Top U.S. intelligence and law enforcement officials have joined together to warn Americans about attempts by Russia, Iran, and other foreign “adversaries” to interfere with next year’s presidential election. “Our adversaries want to undermine our democratic institutions, influence public sentiment, and affect government policies,” the leaders of the Trump’s administration on security matters said in a joint statement released on 5 November. “Russia, China, Iran, and other foreign malicious actors all will seek to interfere in the voting process or influence voter perceptions,” they added.
-
-
Are Journalists Ready for Foreign Interference in 2020?
Last month, the U.S. Senate Select Committee on Intelligence released volume two of its investigation into Russian interference, which details an extensive campaign that aims to sow division and undermine American democracy via social media. One of Russia’s key strategies is to target journalists. As the report describes, “Information warfare, at its core, is a struggle over information and truth. A free and open press — a defining attribute of democratic society — is a principal strategic target for Russian disinformation.” By targeting journalists and news outlets in democratic countries, authoritarians weaken a key pillar of democratic societies.
-
-
West Has No Response to Iran’s Increasing Dominance of the Middle East
A new, detailed study says that over the past forty years Iran has built a network of nonstate alliances which has allowed it to turn the balance of “effective” power in the region “in its favor.” In a report released today (7 November), the London-based International Institute for Strategic Studies (IISS) says the United States and its regional allies retain superiority in conventional forces over Iran, but that Iran has been able to counter both the U.S. military superiority and the ever-more-severe economic sanctions imposed on Iran by building “networks of influence” with proxies which allow Tehran to have a major influence over the affairs of Syria, Lebanon, Iraq, and Yemen.
-
-
Salad Bars and Water Systems Are Easy Targets for Bioterrorists – and America’s Monitoring System Is Woefully Inadequate
I teach food and drug law at Saint Louis University’s Center for Health Law Studies. While monitoring pathogens likely to pose severe threats to public health, my colleagues and I spend a lot of time studying viruses and bacteria that are very hard to obtain, like anthrax or the plague. One less-known facet of bioterrorism, however, is that simpler pathogens like salmonella, a bacterium found in many types of food, can also be used to deliberately harm people. In fact, the largest bioterrorism attack in American history started at the salad bars of a handful of restaurants in the Pacific Northwest.
-
-
Are Facebook and Google State Actors?
In 1924, concerned about monopolization in the radio industry, the secretary of commerce said something prescient: “It cannot be thought that any single person or group shall ever have the right to determine what communication may be made to the American people. … We cannot allow any single person or group to place themselves in a position where they can censor the material which shall be broadcasted to the public.” Jed Rubenfeld writes that what Secretary Herbert Hoover warned against has now come to pass:
-
-
Inside the Microsoft Team Tracking the World’s Most Dangerous Hackers
When the Pentagon recently awarded Microsoft a $10 billion contract to transform and host the U.S. military’s cloud computing systems, the mountain of money came with an implicit challenge: Can Microsoft keep the Pentagon’s systems secure against some of the most well-resourced, persistent, and sophisticated hackers on earth?
-
More headlines
The long view
Kinetic Operations Bring Authoritarian Violence to Democratic Streets
Foreign interference in democracies has a multifaceted toolkit. In addition to information manipulation, the tactical tools authoritarian actors use to undermine democracy include cyber operations, economic coercion, malign finance, and civil society subversion.
Patriots’ Day: How Far-Right Groups Hijack History and Patriotic Symbols to Advance Their Cause, According to an Expert on Extremism
Extremist groups have attempted to change the meaning of freedom and liberty embedded in Patriots’ Day — a commemoration of the battles of Lexington and Concord – to serve their far-right rhetoric, recruitment, and radicalization. Understanding how patriotic symbols can be exploited offers important insights into how historical narratives may be manipulated, potentially leading to harmful consequences in American society.
Trump Aims to Shut Down State Climate Policies
President Donald Trump has launched an all-out legal attack on states’ authority to set climate change policy. Climate-focused state leaders say his administration has no legal basis to unravel their efforts.