On Wednesday, President Donald Trump signed the following executive order, entitled “Securing the Information and Communications Technology and Services Supply Chain.”
Latest in Cyber & Technology
U.S. Treasury Secretary Steven Mnuchin and U.S. Trade Representative Robert Lighthizer concluded another round of trade talks with their Chinese counterparts last week in Beijing. Much of this round centered on how to handle key structural issues surrounding technology transfer and data storage.
The global regulation of cybersecurity is one of the most contentious topics on the international legal plane.
The United States, Canada and Mexico recently completed negotiations on a new trade agreement, the United States-Mexico-Canada Agreement (USMCA), to supersede NAFTA. While the treaty is pending ratification in the legislative bodies of the respective countries, the digital trade portion of the agreement has already garnered a positive response from U.S. technology trade associations.
Lately, Huawei has been a recurrent flashpoint in U.S.-China relations. The arrest in Canada of Meng Wanzhou, Huawei’s chief financial officer and daughter of its founder, Ren Zhengfei, over allegations of bank fraud and sanctions violations has provoked intense controversy since early December.
The new U.S. Cyber Command (USCYBERCOM) vision and the Department of Defense Cyber Strategy embody a fundamental reorientation in strategic thinking.
This article proposes the creation of an international organization modeled after the International Committee of the Red Cross (ICRC) to provide assistance and relief to vulnerable citizens and enterprises affected by serious cyberattacks. Companies that have signed onto the Tech Accord principles would form the core of the organization, thereby filling an important gap in an increasingly volatile geopolitical environment.
In February 2018, the German government’s network was attacked. Germany did not specify what kind of information was accessed by the foreign hackers, but it is publicly known that the hackers successfully attacked the IT system of the Ministry of Foreign Affairs.
In this news-only episode, Nick Weaver and I muse over the outing of a GRU colonel for the nerve agent killings in the United Kingdom. I ask the question that is surely being debated inside MI6 today: Now that he’s been identified, should British intelligence make it their business to execute Col. Chepiga?
In the first part of this series on the counterintelligence implications of artificial intelligence (AI), I discussed AI and counterintelligence at a high level and described some features of each that I think are particularly relevant to understanding the intersection between the two fields. That general discussion leads naturally to one particular counterintelligence question related to AI: How do we identify, understand and protect our most valuable AI assets?