In Chinese online discussions, many people are using the expression “one sword throat-slashing strike.” [一剑封喉] This forbidding term refers to the United States’ seven-year export ban on China’s second-largest telecom supplier, ZTE, which threatens its very existence and has put the company “in a state of shock.” In the Chinese...
“Martha: Truth or illusion, George; you don't know the difference. George: No, but we must carry on as though we did. Martha: Amen.” Edward Albee, Who’s Afraid of Virginia Woolf? Since February, the prominent security reporter Brian Krebs has been writing on his widely-read blog, Krebs on Security, that...
States are stuck in a “cybersecurity dilemma”. They can’t reliably distinguish between other states’ offensive and defensive activities. E.g., surveillance or probing being used by a state for defense might look like offensive measures to those states being surveilled or probed. As a result, cyber powers engage in a never...
I remember one of my first conversations about ICANN and WHOIS General Data Protection Regulation compliance with the ICANN CEO. The CEO told me (as he repeatedly told others) that ICANN should consult with the Data Protection Authorities about how to comply with GDPR. I agreed. The boundaries of WHOIS...
Last week, a 3-day conference was held at Harvard University’s Belfer center focused on fortifying election security and digital democracy. IGP contributors Karim Farhat and Karl Grindal competed in an Information Operations hackathon, winning first place in the policy category. The panel of judges was comprised of former Secretary of...
At the International Studies Association convention in San Francisco, at an especially interesting panel on cybersecurity, we were privileged to hear excerpts from a forthcoming book by Michael Warner, Historian for the United States Cyber Command, and John Childress. Warner examined the last 20 years of U.S. Russia relationships in...