The use of computers and the Internet in conducting warfare in cyberspace.
Cyberwarfare and Cybersecurity
Verizon is pledging to stop selling information on phone owners’ locations to data brokers, stepping back from a business practice that has drawn criticism for endangering privacy.
Some White House officials view next-generation 5G wireless service as a “key area of competition,” and they say that the threat from China, in particular, justifies a “moonshot” government effort like the construction of the interstate highway sy
The scale of Chinese state support for the Internet of Things (IoT) and 5G, the close supply chain integration between the United States and China, and China’s role as an economic and military competitor to the United States create enormous econom
Crypto Wars 2.0 has gone global. For five years, advocates for strong encryption have been locked in a debate with U.S. law enforcement officials over their demands that companies build encryption backdoors into their products. Yet both here and abroad, in countries like the U.K., France, and Australia, the focus has primarily been on whether it is feasible to build a secure backdoor. But what about the potential human costs of an encryption backdoor?
After unleashing widespread cyberattacks and disinformation warfare on the US during the 2016 presidential election, Russia’s trolls and hackers mostly appeared to have sat on the sidelines during the campaign ahead of the midterm elections.
The time has come for a new set of guardrails for information capitalism that protect citizens and promote marketplace competition. The framework for such policies already exists and is embedded in the principles of common law.
Officials in Beijing are providing governments around the world with technology and training that enable them to control their own citizens.
Special Counsel probes Roger Stone’s interactions with Trump campaign and timing of WikiLeaks release of Podesta emails
The special counsel investigation is pressing witnesses about longtime Trump ally Roger Stone’s private interactions with senior campaign officials and whether he had knowledge of politically explosive Democratic emails that were released in Octob
President Donald Trump’s reported refusal to give up his personal iPhone demonstrates the complications of keeping government officials secure at a time when they are increasingly tied to their phones by the time they take office.
A Q&A with Federal Communications Commission Chairman Ajit Pai.