Cybersecurity and Cyberwarfare

The use of computers and the Internet in conducting warfare in cyberspace.

Ivanka Trump used a personal email account to send hundreds of emails about government business

In 2017, Ivanka Trump sent hundreds of emails to White House aides, Cabinet officials and her assistants using a personal account, many of them in violation of federal records rules. White House ethics officials learned of Trump’s repeated use of personal email when reviewing emails gathered by five Cabinet agencies to respond to a public records lawsuit.

Review of Controls for Certain Emerging Technologies

The Department of Commerce's Bureau of Industry and Security (BIS) controls the export of dual-use and less sensitive military items through the Export Administration Regulations (EAR), including the Commerce Control List (CCL). As controls on exports of technology are a key component of the effort to protect sensitive U.S. technology, many sensitive technologies are listed on the CCL, often consistent with the lists maintained by the multilateral export control regimes of which the United States is a member.

2018 Report to Congress from the US-China Economic and Security Review Commission

The scale of Chinese state support for the Internet of Things (IoT) and 5G, the close supply chain integration between the United States and China, and China’s role as an economic and military competitor to the United States create enormous economic, security, supply chain, and data privacy risks for the United States.

Sponsor: 

New America

Date: 
Tue, 11/27/2018 - 18:00 to 23:30

Crypto Wars 2.0 has gone global. For five years, advocates for strong encryption have been locked in a debate with U.S. law enforcement officials over their demands that companies build encryption backdoors into their products. Yet both here and abroad, in countries like the U.K., France, and Australia, the focus has primarily been on whether it is feasible to build a secure backdoor. But what about the potential human costs of an encryption backdoor?



Russian Hackers Largely Skipped the Midterms, and No One Really Knows Why

After unleashing widespread cyberattacks and disinformation warfare on the US during the 2016 presidential election, Russia’s trolls and hackers mostly appeared to have sat on the sidelines during the campaign ahead of the midterm elections. No one is sure why.  Several factors may have reduced Moscow’s impact. Clint Watts, a senior fellow with the Foreign Policy Research Institute, said the diffuse nature of congressional and state races makes them a harder target than a single presidential election.

The Root of the Matter: Data and Duty

The time has come for a new set of guardrails for information capitalism that protect citizens and promote marketplace competition. The framework for such policies already exists and is embedded in the principles of common law. Companies have responsibilities: a “duty of care” to not cause harm, and a “duty to deal” to prevent monopoly bottlenecks. The harvesting of personal information – often without the individual’s knowledge – infringes on the sovereignty of the individual and their personal privacy.

The global threat of China’s digital authoritarianism

Officials in Beijing are providing governments around the world with technology and training that enable them to control their own citizens. As Chinese companies compete with their international counterparts in crucial fields such as artificial intelligence and 5G mobile service, the democratic norms that long governed the global Internet are falling by the wayside. When it comes to Internet freedom, many governments are eager to buy the restrictive model that China is selling.

Special Counsel probes Roger Stone’s interactions with Trump campaign and timing of WikiLeaks release of Podesta emails

The special counsel investigation is pressing witnesses about longtime Trump ally Roger Stone’s private interactions with senior campaign officials and whether he had knowledge of politically explosive Democratic emails that were released in October 2016. As part of his investigation into Russia’s interference in the 2016 campaign, special counsel Robert S. Mueller III appears to be focused on the question of whether WikiLeaks coordinated its activities with Stone and the campaign.

President Trump's refusal to give up his iPhone sets dangerous precedent

President Donald Trump’s reported refusal to give up his personal iPhone demonstrates the complications of keeping government officials secure at a time when they are increasingly tied to their phones by the time they take office.

FCC Chairman Pai: ‘Level playing field for old regulations and new tech a challenge’

A Q&A with Federal Communications Commission Chairman Ajit Pai.