Cyberwarfare and Cybersecurity

The use of computers and the Internet in conducting warfare in cyberspace.

Verizon to end location data sales to brokers

Verizon is pledging to stop selling information on phone owners’ locations to data brokers, stepping back from a business practice that has drawn criticism for endangering privacy.

Trump Administration Weighs Building US 5G Network to Counter China

Some White House officials view next-generation 5G wireless service as a “key area of competition,” and they say that the threat from China, in particular, justifies a “moonshot” government effort like the construction of the interstate highway sy

2018 Report to Congress from the US-China Economic and Security Review Commission

The scale of Chinese state support for the Internet of Things (IoT) and 5G, the close supply chain integration between the United States and China, and China’s role as an economic and military competitor to the United States create enormous econom

Sponsor: 

New America

Date: 
Tue, 11/27/2018 - 12:00 to 17:30

Crypto Wars 2.0 has gone global. For five years, advocates for strong encryption have been locked in a debate with U.S. law enforcement officials over their demands that companies build encryption backdoors into their products. Yet both here and abroad, in countries like the U.K., France, and Australia, the focus has primarily been on whether it is feasible to build a secure backdoor. But what about the potential human costs of an encryption backdoor?



Russian Hackers Largely Skipped the Midterms, and No One Really Knows Why

After unleashing widespread cyberattacks and disinformation warfare on the US during the 2016 presidential election, Russia’s trolls and hackers mostly appeared to have sat on the sidelines during the campaign ahead of the midterm elections.

The Root of the Matter: Data and Duty

The time has come for a new set of guardrails for information capitalism that protect citizens and promote marketplace competition. The framework for such policies already exists and is embedded in the principles of common law.

The global threat of China’s digital authoritarianism

Officials in Beijing are providing governments around the world with technology and training that enable them to control their own citizens.

Special Counsel probes Roger Stone’s interactions with Trump campaign and timing of WikiLeaks release of Podesta emails

The special counsel investigation is pressing witnesses about longtime Trump ally Roger Stone’s private interactions with senior campaign officials and whether he had knowledge of politically explosive Democratic emails that were released in Octob

President Trump's refusal to give up his iPhone sets dangerous precedent

President Donald Trump’s reported refusal to give up his personal iPhone demonstrates the complications of keeping government officials secure at a time when they are increasingly tied to their phones by the time they take office.

FCC Chairman Pai: ‘Level playing field for old regulations and new tech a challenge’

A Q&A with Federal Communications Commission Chairman Ajit Pai.