-
“A High Risk to Their Users”: An Analysis of Huawei Devices’ Security Vulnerabilities
Western intelligence services have long suspected that the Chinese communication giant Huawei was a tool of China’s powerful intelligence services. An analysis of the state of security of Huawei’s gear and equipment has found serious security flaws and vulnerabilities. This is important, because even if we take Huawei’s implausible denials of any relationship to Chinese government at face value, the low quality of security of Huawei’s equipment would allow the Chinese government, and other state actors, to compromise the vulnerabilities of networks built with Huawei’s components. Our “analysis shows that Huawei devices quantitatively pose a high risk to their users,” the report says.
-
-
A Framework for a Fair, Humane, and Workable Immigration Policy
The immigration debate in America today is nearly as broken as the country’s immigration system itself. The other day, the Center for American Progress released a new report which provides a framework to fix both. CAP notes that for many years, conversations about immigration have been predicated on a false choice that says America can either honor its identity as a nation of immigrants or live up to its ideals as a nation of laws by enforcing the current broken immigration system. Tom Jawetz, the report’s author, argues that by accepting these terms of the debate, supporters of sensible immigration policy have ceded powerful rhetorical ground to immigration restrictionists.
-
-
Why the Ghost Keys ‘Solution’ to Encryption is No Solution
The use of applications such as Signal, WhatsApp, iMessage, and Facebook Messenger for communications secured by end-to-end encryption has exploded over the past few years. Today, regular users of these and similar services number in the billions around the world. The U.S. Justice Department and the FBI have claimed repeatedly that the extensive use of such services hampers their ability to conduct investigations, because they cannot access encrypted communications. Officials in other countries have put forward a proposal they say would provide the needed access. But due to the fundamentals of public key encryption, this regime would end up raising most of the same concerns as other encryption back-door proposals floated in recent years.
-
-
Climate Change Will Strain Federal Finances
The federal government is ill-prepared to shoulder what could be a trillion-dollar fiscal crisis associated with extreme weather, floods, wildfires and other climate disasters through 2100, federal investigators have found. In the latest of a series of reports, the Government Accountability Office says that costs of disaster assistance to taxpayers since 2005 have swelled to nearly $500 billion—and they keep getting higher.
-
-
Trump’s New Favorite Channel Employs Kremlin-Paid Journalist
If the stories broadcast by the Trump-endorsed One America News Network sometimes look like outtakes from a Kremlin trolling operation, there may be a reason. One of the on-air reporters at the 24-hour network is a Russian national on the payroll of the Kremlin’s official propaganda outlet, Sputnik.
-
-
Private Surveillance Is a Lethal Weapon Anybody Can Buy
High-tech surveillance technology, once the purview of sophisticated spy services in wealthy countries, is now being offered by private contractors around the world as part of a highly secretive multibillion-dollar industry. While other kinds of weapons are subjected to stringent international regimes and norms — even if these are often broken — the trade in spy technology is barely regulated.
-
-
FaceApp Makes Today’s Privacy Laws Look Antiquated
Cameras are everywhere, and data brokers are vacuuming up information on individuals. But regulations have not kept pace. You should stop using FaceApp, because there are few controls on how your data, including your face data, will be used. But the problems that FaceApp poses aren’t unique. Walking around anywhere can get your face included in facial-recognition databases. How that information can be mined, manipulated, bought, or sold is minimally regulated—in the United States and elsewhere.
-
-
To Fight Terrorists, Follow the Money
Prosecuting money launderers is the best way to stamp out terrorism and corruption. For too long, counterterrorism operations have focused narrowly on disrupting attacks. Without aggressive prosecution of those who carry out the groups’ financial transactions, the illicit networks that provide financial and logistical support for Hezbollah are likely to remain intact.
-
-
Managing and Mitigating Foreign Election Interference
President Donald Trump has repeatedly shown that he does not take the issue of Russian interference in elections seriously, most recently at the G-20 summit in Japan when he issued a “wink-wink” warning to Russian President Vladimir Putin when pressed on the issue by reporters. This is no laughing matter. While much of the media coverage has focused on Russian interference in U.S. elections, this is not just an American problem. As our new report on online foreign influence efforts (FIEs) demonstrates, this is a global problem. Since 2013, Russia has conducted at least 38 distinct influence campaigns targeting 19 different countries—and Russia isn’t alone: 53 distinct online FIEs were launched by Russia and other countries between 2013 and the end of 2018, and several remain ongoing today. Russia is by far the most active state conducting FIEs. About 72 percent of the campaigns were conducted solely by Russia, which had 29 distinct operations ongoing in 2017.
-
-
DHS Warns of Russian Efforts to Divide America over Pineapple Pizza -- Sort of
The U.S. Department of Homeland Security (DHS) is warning that Russian agents could seek to further divide Americans by exploiting U.S. passions over whether pineapple belongs on pizza. It’s a cheesy, playful warning — but it’s trying to deliver a serious message. Posted online Wednesday by the department’s Cybersecurity and Infrastructure Security Agency, the tongue-in-cheek warning aims to help Americans identify and protect against propaganda campaigns from Russia and other foreign adversaries.
-
-
Dear Dems: Make Mueller’s Testimony About 2020, Not 2016
If Congressional Democrats focus their questions of Robert Mueller on the past would be a big mistake. Democrats should make the 2020 election, not the 2016 election, the emphasis of their questions to Mueller and thus of his testimony. Democrats should focus in particular on two sets of questions that remain unaddressed by Mueller’s written report—and remain urgently important. First is the possible counterintelligence threat that Donald Trump represents. Mueller’s work addressed only one aspect of Trump’s Russia connection: possible criminal activity. But his report notes that his “investigation could identify foreign intelligence and counterintelligence information relevant to the FBI’s broader national security mission,” and further indicates that Mueller in fact uncovered such “information derived from the investigation, not all of which is contained in this Volume.” The second set of questions revolves around the threat to America’s 2020 election. Mueller’s investigation and assessment of a wide range of election-related issues surely yielded for him a detailed sense of the gaps in U.S. law and policy that were exploited by the Russians in 2016 and that remain ripe for exploitation by Moscow—and other hostile foreign actors—in the run-up to 2020.
-
-
Trump Administration Has Gutted Programs Aimed at Detecting Weapons of Mass Destruction
The Trump administration has quietly dismantled or cut back multiple programs that were created after the Sept. 11, 2001, attacks to help detect and prevent terrorism involving weapons of mass destruction, a Times investigation has found. The retreat has taken place over the last two years at the Department of Homeland Security, which has primary domestic responsibility for helping authorities identify and block potential chemical, biological, radiological and nuclear threats. A Los Angeles Times investigation found that the changes, not previously reported, were made without rigorous review of potential security vulnerabilities, the Times found, undermining government-wide efforts aimed at countering terrorist attacks involving unconventional weapons, known as weapons of mass destruction.
-
-
China Cyber Attacks on AFSPC Contractors ‘Stealing Us Blind’
“Cyber keeps me up at night,” says Brig. Gen. DeAnna Burt, director of Air Force Space Command (AFSPC) operations and communications, because China’s cyber warriors are routinely breaching defense and space contractor networks and stealing data on a regular basis. “For every defense contractor in this room, the thing that keeps me up at night is how we manage data on your systems or your sub’s systems,” she warned. “We have had breaches … the Chinese and others stealing things from cleared defense contractors.”
-
-
A New Red Scare Is Reshaping Washington
The Committee on the Present Danger, a long-defunct group that campaigned against the dangers of the Soviet Union in the 1970s and 1980s, has recently been revived with the help of Stephen K. Bannon, the president’s former chief strategist, to warn against the dangers of China. “These are two systems that are incompatible,” says Bannon. “One side is going to win, and one side is going to lose.”
-
-
Caught Red Handed: Russian Financing Scheme in Italy Highlights Europe’s Vulnerabilities
In February 2019, two Italian investigative journalists made an explosive revelation: Matteo Salvini, leader of the far-right party La Lega and Italian interior minister, had sought financing from the Kremlin to the tune of millions of euros. That claim has now been given a new lease on life by the release of the audio recording of a meeting in Moscow that corroborates the February story.
-
More headlines
The long view
Kinetic Operations Bring Authoritarian Violence to Democratic Streets
By Etienne Soula and Lea George
Foreign interference in democracies has a multifaceted toolkit. In addition to information manipulation, the tactical tools authoritarian actors use to undermine democracy include cyber operations, economic coercion, malign finance, and civil society subversion.
Patriots’ Day: How Far-Right Groups Hijack History and Patriotic Symbols to Advance Their Cause, According to an Expert on Extremism
By Art Jipson
Extremist groups have attempted to change the meaning of freedom and liberty embedded in Patriots’ Day — a commemoration of the battles of Lexington and Concord – to serve their far-right rhetoric, recruitment, and radicalization. Understanding how patriotic symbols can be exploited offers important insights into how historical narratives may be manipulated, potentially leading to harmful consequences in American society.
Trump Aims to Shut Down State Climate Policies
By Alex Brown
President Donald Trump has launched an all-out legal attack on states’ authority to set climate change policy. Climate-focused state leaders say his administration has no legal basis to unravel their efforts.
Vaccine Integrity Project Says New FDA Rules on COVID-19 Vaccines Show Lack of Consensus, Clarity
By Stephanie Soucheray
Sidestepping both the FDA’s own Vaccines and Related Biological Products Advisory Committee and the CDC’s Advisory Committee on Immunization Practices (ACIP), two Trump-appointed FDA leaders penned an opinion piece in the New England Journal of Medicine to announce new, more restrictive, COVID-19 vaccine recommendations. Critics say that not seeking broad input into the new policy, which would help FDA to understand its implications, feasibility, and the potential for unintended consequences, amounts to policy by proclamation.
Twenty-One Things That Are True in Los Angeles
To understand the dangers inherent in deploying the California National Guard – over the strenuous objections of the California governor – and active-duty Marines to deal with anti-ICE protesters, we should remind ourselves of a few elementary truths, writes Benjamin Wittes. Among these truths: “Not all lawful exercises of authority are wise, prudent, or smart”; “Not all crimes require a federal response”; “Avoiding tragic and unnecessary confrontations is generally desirable”; and “It is thus unwise, imprudent, and stupid to take actions for performative reasons that one might reasonably anticipate would increase the risks of such confrontations.”
Luigi Mangione and the Making of a ‘Terrorist’
Discretion is crucial to the American tradition of criminal law, Jacob Ware and Ania Zolyniak write, noting that “lawmakers enact broader statutes to empower prosecutors to pursue justice while entrusting that they will stay within the confines of their authority and screen out the inevitable “absurd” cases that may arise.” Discretion is also vital to maintaining the legitimacy of the legal system. In the prosecution’s case against Luigi Mangione, they charge, “That discretion was abused.”