To the Chinese Communist Party (CCP), amassing cyberpower is a matter of life and death. The tight control over affairs in cyberspace is essential to regime stability and longevity in China; the CCP stated, “If our party cannot traverse the hurdle represented by the Internet, it cannot traverse the hurdle of remaining in power for […]
Tag: cybersecurity
Interview with Jonathan Reiber, cybersecurity expert
Jonathan Reiber is a security expert currently serving as Senior Advisor at Technology for Global Security, a think-tank in Palo Alto, California, and a Visiting Scholar at UC Berkeley’s Center for Long-Term Cybersecurity. A frequent public speaker, his writing and work has been featured in Foreign Policy and Literary Hub and highlighted by the Atlantic and […]
Double-Edged Sword: The Weaponization of the Digital Landscape and its Impacts on American Democracy
By Alexander Casendino Breakthroughs typically arise from strange beginnings. In his early years as a student at Harvard, Mark Zuckerberg had no clue that he would forever change the world upon launching the “hot or not” website, FaceMash. The same concepts and software behind Zuckerberg’s sophomoric project would later be applied to the social media […]
Fake News is Real: The Rise of Computational Propaganda and Its Political Ramifications
“Fake News” — two words that have become synonymous with Donald Trump and his 2016 bid for the presidency. Some wholeheartedly believed it, some cast it aside as irrelevant, and others avidly denied it. Yet, President Trump was right. Fake news is real, but not necessarily in the way that most imagine. In the 2016 election, […]
Cyberwar with China
The U.S. has been hacked on over 700 occasions in just five years on fronts ranging from corporate to private to governmental. Over the past two years, the Office of Personnel Management (OPM) was hacked on two separate occasions; the hack this year was deemed the largest in U.S. history, with 5.6 million fingerprints and […]
The High Cost of Threats: Sino-Israeli Relations
Say “economic sanctions” and three countries come to mind: Russia, Iran, and North Korea. Sanctions are usually reserved for historically hostile regimes, not long-time allies. Yet Obama administration and other Western European nations are threatening to impose sanctions on Israel, with the assumption that Israel is so dependent on Western markets that it will have […]
The Great Game
Part 3 of a series on U.S. cybersecurity. Part1. Part2. Part 4. By 2010, the Iranian nuclear program was clearly behind schedule. Despite dire predictions from the world powers, Iran seemed little closer to acquiring the bomb. The reasons for the delay were somewhat puzzling: perhaps the IR-1 centrifuges used at the nuclear facility at […]
Suspicious Surveillance
Part 2 of a series on U.S. cybersecurity. Part 1. Part 3. Part 4. In June of last year, now-infamous National Security Agency contractor Edward Snowden began leaking classified documents to the media. Since then, the steady stream of revelatory documents has generated a firestorm of criticism against NSA practices. The NSA, which is at […]
Surfing the Darknet
Surfing the Darknet is part 1 of a series on U.S. cybersecurity. Part 2. Part 3. Part 4. Overshadowed in the past months by bombings in Syria and Iraq as well as Ebola in Texas was news of earth-shattering significance for the way we communicate around the globe. The much-discussed but little-understood Shellshock vulnerability has […]