Cybersecurity and Cyberwarfare

The use of computers and the Internet in conducting warfare in cyberspace.

Tech on the Rocks Ep 9 | Rage Against the Machines: Is our Election Technology Safe and Secure? (Part I)

The 2020 election is less than two weeks away. One of the biggest questions that remain unanswered is whether or not our U.S. election infrastructure is prepared for any potential cyberattacks from hackers, both foreign and domestic. In part 1 of our two-part episode: Rage Against the Machines: Is our Election Technology Safe and Secure? Gigi chats with computer scientist and law professor Matt Blaze to assess the biggest challenges and threats to state and county election systems.

Remarks Of FCC Chairman Ajit Pai at CyFy 2020

We are gathering virtually at a pivotal moment in the evolution of communications technology. Across America and around the world, private companies are rolling out the next generation of wireless technology—commonly known as 5G. These networks will bring exponential increases in speed, responsiveness, and capacity—creating an incredible wireless experience for both consumers and enterprises. As we have pursued our own actions to address security threats, the United States has been working closely with our international partners.

Remarks of Commissioner Starks at 9th Annual Americas Spectrum Management Conference

The past few months have underscored a basic truth: full participation in civil society requires an internet connection. Wireless technologies, including emerging 5G technologies, have an important role to play here. That’s why we must do more to make high-quality, affordable broadband, including 5G wireless service, available to everyone. In planning and promoting the deployment of advanced wireless networks, we have an opportunity to promote digital inclusion and combat longstanding inequalities.

National Security: Additional Actions Needed to Ensure Effectiveness of 5G Strategy

The Trump Administration issued a National Strategy to Secure 5G, which we assessed against our 6 key characteristics for effective national strategies. The plan only partially addressed 5 of the 6 characteristics. For example, it didn't say what resources are needed to carry the plan out—which can make it hard to allocate and shift resources appropriately. We recommended that Administration officials ensure the strategy fully addresses all 6 characteristics.

Remarks By FCC Chairman Pai To The Prague 5G Security Conference

We’ve gathered to discuss 5G security, of course, but I think it’s important to say up front that we can’t let these challenges hold back our efforts to unlock the possibilities of 5G itself. Over the past few years, the Federal Communications Commission has aggressively executed what we call our 5G FAST plan. This strategy for promoting 5G innovation and investment features three key parts: freeing up commercial spectrum, promoting the installation of wireless infrastructure, and encouraging fiber deployment.

What Happens When Americans Join the Global Internet

For people who spend a lot of time on TikTok, the last few months have been surreal: a president with no presence on the platform has been agitating to ban it on the basis of national security.

The WeChat ban vs. the First Amendment

The Trump Administration said it would challenge a federal court ruling Sept 20 that temporarily blocked its attempt to curb the use of Chinese messaging and e-commerce app WeChat in the US. WeChat's ban has had a lower profile than TikTok's, but the fate of the app, widely used by Chinese people around the world to stay in touch with family and friends, is at least as consequential. The ruling suggests that WeChat's fate in the US could be decided not only on grounds of national security and commercial regulations but also around freedom of speech principles.

US Joins Global Bid to Carve Up the Internet With TikTok Move

The Trump administration’s campaign to make Chinese-owned video-sharing app TikTok relocate to the US is the latest example of the global fracturing of the internet. Treating user data as a matter of national security is a notion that has dictated many of the policies Beijing has put in place to control the internet in its country for the past decade. China operates what is called the “Great Firewall,” limiting the services people in the country can use and the information they receive.

TikTok says Oracle can review its source code, but deal won’t allow tech transfers

China's TikTok sought to tamp down domestic controversy over its deal with Oracle and Walmart, saying that there would be no technology transfer to Oracle, though the US company would be able to check its software for safety. The TikTok deal has been a vivid example of the Trump administration’s policy of reciprocity toward Chinese businesses. Supporters of the approach say it’s only fair to treat Chinese companies by the same standards to which US companies are held in China.

Commerce Department Prohibits WeChat and TikTok Transactions to Protect the National Security of the United States

In response to President Trump’s Executive Orders signed August 6, 2020, the Department of Commerce is prohibiting transactions relating to mobile applications WeChat and TikTok to safeguard the national security of the United States. The Chinese Communist Party (CCP) has demonstrated the means and motives to use these apps to threaten the national security, foreign policy, and the economy of the US.