• “A High Risk to Their Users”: An Analysis of Huawei Devices’ Security Vulnerabilities

    Western intelligence services have long suspected that the Chinese communication giant Huawei was a tool of China’s powerful intelligence services. An analysis of the state of security of Huawei’s gear and equipment has found serious security flaws and vulnerabilities. This is important, because even if we take Huawei’s implausible denials of any relationship to Chinese government at face value, the low quality of security of Huawei’s equipment would allow the Chinese government, and other state actors, to compromise the vulnerabilities of networks built with Huawei’s components. Our “analysis shows that Huawei devices quantitatively pose a high risk to their users,” the report says.

  • A Framework for a Fair, Humane, and Workable Immigration Policy

    The immigration debate in America today is nearly as broken as the country’s immigration system itself. The other day, the Center for American Progress released a new report which provides a framework to fix both. CAP notes that for many years, conversations about immigration have been predicated on a false choice that says America can either honor its identity as a nation of immigrants or live up to its ideals as a nation of laws by enforcing the current broken immigration system. Tom Jawetz, the report’s author, argues that by accepting these terms of the debate, supporters of sensible immigration policy have ceded powerful rhetorical ground to immigration restrictionists.

  • Why the Ghost Keys ‘Solution’ to Encryption is No Solution

    The use of applications such as Signal, WhatsApp, iMessage, and Facebook Messenger for communications secured by end-to-end encryption has exploded over the past few years. Today, regular users of these and similar services number in the billions around the world. The U.S. Justice Department and the FBI have claimed repeatedly that the extensive use of such services hampers their ability to conduct investigations, because they cannot access encrypted communications. Officials in other countries have put forward a proposal they say would provide the needed access. But due to the fundamentals of public key encryption, this regime would end up raising most of the same concerns as other encryption back-door proposals floated in recent years.

  • Climate Change Will Strain Federal Finances

    The federal government is ill-prepared to shoulder what could be a trillion-dollar fiscal crisis associated with extreme weather, floods, wildfires and other climate disasters through 2100, federal investigators have found. In the latest of a series of reports, the Government Accountability Office says that costs of disaster assistance to taxpayers since 2005 have swelled to nearly $500 billion—and they keep getting higher.

  • Trump’s New Favorite Channel Employs Kremlin-Paid Journalist

    If the stories broadcast by the Trump-endorsed One America News Network sometimes look like outtakes from a Kremlin trolling operation, there may be a reason. One of the on-air reporters at the 24-hour network is a Russian national on the payroll of the Kremlin’s official propaganda outlet, Sputnik.

  • Private Surveillance Is a Lethal Weapon Anybody Can Buy

    High-tech surveillance technology, once the purview of sophisticated spy services in wealthy countries, is now being offered by private contractors around the world as part of a highly secretive multibillion-dollar industry. While other kinds of weapons are subjected to stringent international regimes and norms — even if these are often broken — the trade in spy technology is barely regulated.

  • FaceApp Makes Today’s Privacy Laws Look Antiquated

    Cameras are everywhere, and data brokers are vacuuming up information on individuals. But regulations have not kept pace. You should stop using FaceApp, because there are few controls on how your data, including your face data, will be used. But the problems that FaceApp poses aren’t unique. Walking around anywhere can get your face included in facial-recognition databases. How that information can be mined, manipulated, bought, or sold is minimally regulated—in the United States and elsewhere.

  • To Fight Terrorists, Follow the Money

    Prosecuting money launderers is the best way to stamp out terrorism and corruption. For too long, counterterrorism operations have focused narrowly on disrupting attacks. Without aggressive prosecution of those who carry out the groups’ financial transactions, the illicit networks that provide financial and logistical support for Hezbollah are likely to remain intact.

  • Managing and Mitigating Foreign Election Interference

    President Donald Trump has repeatedly shown that he does not take the issue of Russian interference in elections seriously, most recently at the G-20 summit in Japan when he issued a “wink-wink” warning to Russian President Vladimir Putin when pressed on the issue by reporters. This is no laughing matter. While much of the media coverage has focused on Russian interference in U.S. elections, this is not just an American problem. As our new report on online foreign influence efforts (FIEs) demonstrates, this is a global problem. Since 2013, Russia has conducted at least 38 distinct influence campaigns targeting 19 different countries—and Russia isn’t alone: 53 distinct online FIEs were launched by Russia and other countries between 2013 and the end of 2018, and several remain ongoing today. Russia is by far the most active state conducting FIEs. About 72 percent of the campaigns were conducted solely by Russia, which had 29 distinct operations ongoing in 2017.

  • DHS Warns of Russian Efforts to Divide America over Pineapple Pizza -- Sort of

    The U.S. Department of Homeland Security (DHS) is warning that Russian agents could seek to further divide Americans by exploiting U.S. passions over whether pineapple belongs on pizza. It’s a cheesy, playful warning — but it’s trying to deliver a serious message. Posted online Wednesday by the department’s Cybersecurity and Infrastructure Security Agency, the tongue-in-cheek warning aims to help Americans identify and protect against propaganda campaigns from Russia and other foreign adversaries.

  • Dear Dems: Make Mueller’s Testimony About 2020, Not 2016

    If Congressional Democrats focus their questions of Robert Mueller on the past would be a big mistake. Democrats should make the 2020 election, not the 2016 election, the emphasis of their questions to Mueller and thus of his testimony. Democrats should focus in particular on two sets of questions that remain unaddressed by Mueller’s written report—and remain urgently important. First is the possible counterintelligence threat that Donald Trump represents. Mueller’s work addressed only one aspect of Trump’s Russia connection: possible criminal activity. But his report notes that his “investigation could identify foreign intelligence and counterintelligence information relevant to the FBI’s broader national security mission,” and further indicates that Mueller in fact uncovered such “information derived from the investigation, not all of which is contained in this Volume.” The second set of questions revolves around the threat to America’s 2020 election. Mueller’s investigation and assessment of a wide range of election-related issues surely yielded for him a detailed sense of the gaps in U.S. law and policy that were exploited by the Russians in 2016 and that remain ripe for exploitation by Moscow—and other hostile foreign actors—in the run-up to 2020.

  • Trump Administration Has Gutted Programs Aimed at Detecting Weapons of Mass Destruction

    The Trump administration has quietly dismantled or cut back multiple programs that were created after the Sept. 11, 2001, attacks to help detect and prevent terrorism involving weapons of mass destruction, a Times investigation has found. The retreat has taken place over the last two years at the Department of Homeland Security, which has primary domestic responsibility for helping authorities identify and block potential chemical, biological, radiological and nuclear threats. A Los Angeles Times investigation found that the changes, not previously reported, were made without rigorous review of potential security vulnerabilities, the Times found, undermining government-wide efforts aimed at countering terrorist attacks involving unconventional weapons, known as weapons of mass destruction.

  • China Cyber Attacks on AFSPC Contractors ‘Stealing Us Blind’

    “Cyber keeps me up at night,” says Brig. Gen. DeAnna Burt, director of Air Force Space Command (AFSPC) operations and communications, because China’s cyber warriors are routinely breaching defense and space contractor networks and stealing data on a regular basis. “For every defense contractor in this room, the thing that keeps me up at night is how we manage data on your systems or your sub’s systems,” she warned. “We have had breaches … the Chinese and others stealing things from cleared defense contractors.”

  • A New Red Scare Is Reshaping Washington

    The Committee on the Present Danger, a long-defunct group that campaigned against the dangers of the Soviet Union in the 1970s and 1980s, has recently been revived with the help of Stephen K. Bannon, the president’s former chief strategist, to warn against the dangers of China. “These are two systems that are incompatible,” says Bannon. “One side is going to win, and one side is going to lose.”

  • Caught Red Handed: Russian Financing Scheme in Italy Highlights Europe’s Vulnerabilities

    In February 2019, two Italian investigative journalists made an explosive revelation: Matteo Salvini, leader of the far-right party La Lega and Italian interior minister, had sought financing from the Kremlin to the tune of millions of euros. That claim has now been given a new lease on life by the release of the audio recording of a meeting in Moscow that corroborates the February story.