• Anonymizing Personal Data “Not Enough to Protect Privacy”: Study

    Current methods for anonymizing data leave individuals at risk of being re-identified, according to new research. Researchers demonstrated that allowing data to be used — to train AI algorithms, for example — while preserving people’s privacy, requires much more than simply adding noise, sampling datasets, and other de-identification techniques.

  • Women and the War on Terror: An Insider Account

    A new book by a former CIA analyst is an important contribution to our understanding of the intelligence wars that erupted in 2001 over Iraq’s alleged connections to the 9/11 attacks and the George W. Bush administration’s bungled efforts to stabilize Iraq after the 2003 invasion.

  • Cities Ban Government Use of Facial Recognition

    Oakland, Calif., last week became the third city in America to ban the use of facial recognition technology in local government, following prohibitions enacted earlier this year in San Francisco and Somerville, Mass. Berkeley, Calif., is also weighing a ban. The technology is often inaccurate, especially when identifying people who aren’t white men.

  • Huawei Secretly Built North Korea’s Wireless Network

    On Monday, the Washington Post reported that Huawei had been secretly working in North Korea on various communication projects, including building and maintaining the country’s wireless network. Huawei’s work has been in direct violation of the sanctions imposed on North Korea because of its nuclear weapons activity. The revelations are going to increase worries in the West about the trustworthiness of the Chinese communication giant, and would provide more evidence to support the conclusions of Western intelligence services that Huawei serves the interests of the Chinese government and China’s intelligence services.

  • “A High Risk to Their Users”: An Analysis of Huawei Devices’ Security Vulnerabilities

    Western intelligence services have long suspected that the Chinese communication giant Huawei was a tool of China’s powerful intelligence services. An analysis of the state of security of Huawei’s gear and equipment has found serious security flaws and vulnerabilities. This is important, because even if we take Huawei’s implausible denials of any relationship to Chinese government at face value, the low quality of security of Huawei’s equipment would allow the Chinese government, and other state actors, to compromise the vulnerabilities of networks built with Huawei’s components. Our “analysis shows that Huawei devices quantitatively pose a high risk to their users,” the report says.

  • A Framework for a Fair, Humane, and Workable Immigration Policy

    The immigration debate in America today is nearly as broken as the country’s immigration system itself. The other day, the Center for American Progress released a new report which provides a framework to fix both. CAP notes that for many years, conversations about immigration have been predicated on a false choice that says America can either honor its identity as a nation of immigrants or live up to its ideals as a nation of laws by enforcing the current broken immigration system. Tom Jawetz, the report’s author, argues that by accepting these terms of the debate, supporters of sensible immigration policy have ceded powerful rhetorical ground to immigration restrictionists.

  • Why the Ghost Keys ‘Solution’ to Encryption is No Solution

    The use of applications such as Signal, WhatsApp, iMessage, and Facebook Messenger for communications secured by end-to-end encryption has exploded over the past few years. Today, regular users of these and similar services number in the billions around the world. The U.S. Justice Department and the FBI have claimed repeatedly that the extensive use of such services hampers their ability to conduct investigations, because they cannot access encrypted communications. Officials in other countries have put forward a proposal they say would provide the needed access. But due to the fundamentals of public key encryption, this regime would end up raising most of the same concerns as other encryption back-door proposals floated in recent years.

  • Climate Change Will Strain Federal Finances

    The federal government is ill-prepared to shoulder what could be a trillion-dollar fiscal crisis associated with extreme weather, floods, wildfires and other climate disasters through 2100, federal investigators have found. In the latest of a series of reports, the Government Accountability Office says that costs of disaster assistance to taxpayers since 2005 have swelled to nearly $500 billion—and they keep getting higher.

  • Trump’s New Favorite Channel Employs Kremlin-Paid Journalist

    If the stories broadcast by the Trump-endorsed One America News Network sometimes look like outtakes from a Kremlin trolling operation, there may be a reason. One of the on-air reporters at the 24-hour network is a Russian national on the payroll of the Kremlin’s official propaganda outlet, Sputnik.

  • Private Surveillance Is a Lethal Weapon Anybody Can Buy

    High-tech surveillance technology, once the purview of sophisticated spy services in wealthy countries, is now being offered by private contractors around the world as part of a highly secretive multibillion-dollar industry. While other kinds of weapons are subjected to stringent international regimes and norms — even if these are often broken — the trade in spy technology is barely regulated.

  • FaceApp Makes Today’s Privacy Laws Look Antiquated

    Cameras are everywhere, and data brokers are vacuuming up information on individuals. But regulations have not kept pace. You should stop using FaceApp, because there are few controls on how your data, including your face data, will be used. But the problems that FaceApp poses aren’t unique. Walking around anywhere can get your face included in facial-recognition databases. How that information can be mined, manipulated, bought, or sold is minimally regulated—in the United States and elsewhere.

  • To Fight Terrorists, Follow the Money

    Prosecuting money launderers is the best way to stamp out terrorism and corruption. For too long, counterterrorism operations have focused narrowly on disrupting attacks. Without aggressive prosecution of those who carry out the groups’ financial transactions, the illicit networks that provide financial and logistical support for Hezbollah are likely to remain intact.

  • Managing and Mitigating Foreign Election Interference

    President Donald Trump has repeatedly shown that he does not take the issue of Russian interference in elections seriously, most recently at the G-20 summit in Japan when he issued a “wink-wink” warning to Russian President Vladimir Putin when pressed on the issue by reporters. This is no laughing matter. While much of the media coverage has focused on Russian interference in U.S. elections, this is not just an American problem. As our new report on online foreign influence efforts (FIEs) demonstrates, this is a global problem. Since 2013, Russia has conducted at least 38 distinct influence campaigns targeting 19 different countries—and Russia isn’t alone: 53 distinct online FIEs were launched by Russia and other countries between 2013 and the end of 2018, and several remain ongoing today. Russia is by far the most active state conducting FIEs. About 72 percent of the campaigns were conducted solely by Russia, which had 29 distinct operations ongoing in 2017.

  • DHS Warns of Russian Efforts to Divide America over Pineapple Pizza -- Sort of

    The U.S. Department of Homeland Security (DHS) is warning that Russian agents could seek to further divide Americans by exploiting U.S. passions over whether pineapple belongs on pizza. It’s a cheesy, playful warning — but it’s trying to deliver a serious message. Posted online Wednesday by the department’s Cybersecurity and Infrastructure Security Agency, the tongue-in-cheek warning aims to help Americans identify and protect against propaganda campaigns from Russia and other foreign adversaries.

  • Dear Dems: Make Mueller’s Testimony About 2020, Not 2016

    If Congressional Democrats focus their questions of Robert Mueller on the past would be a big mistake. Democrats should make the 2020 election, not the 2016 election, the emphasis of their questions to Mueller and thus of his testimony. Democrats should focus in particular on two sets of questions that remain unaddressed by Mueller’s written report—and remain urgently important. First is the possible counterintelligence threat that Donald Trump represents. Mueller’s work addressed only one aspect of Trump’s Russia connection: possible criminal activity. But his report notes that his “investigation could identify foreign intelligence and counterintelligence information relevant to the FBI’s broader national security mission,” and further indicates that Mueller in fact uncovered such “information derived from the investigation, not all of which is contained in this Volume.” The second set of questions revolves around the threat to America’s 2020 election. Mueller’s investigation and assessment of a wide range of election-related issues surely yielded for him a detailed sense of the gaps in U.S. law and policy that were exploited by the Russians in 2016 and that remain ripe for exploitation by Moscow—and other hostile foreign actors—in the run-up to 2020.