
Autonomous Vehicles Join the List of US National Security Threats
Lawmakers are growing concerned about a flood of data-hungry cars from China taking over American streets.
Autonomous Vehicles Join the List of US National Security Threats Read MoreLawmakers are growing concerned about a flood of data-hungry cars from China taking over American streets.
Autonomous Vehicles Join the List of US National Security Threats Read MoreIn 2011, Chinese spies stole the crown jewels of cybersecurity—stripping protections from firms and government agencies worldwide. Here’s how it happened.
The Full Story of the Stunning RSA Hack Can Finally Be Told Read MorePosts that glorify war and those that criticize Russia are getting quietly deleted, as platforms are pressured to walk a thin line.
The War in Ukraine Is Keeping Chinese Social Media Censors Busy Read MoreA decade-long quest to become a cyber superpower is paying off for China.
How China built a one-of-a-kind cyber-espionage behemoth to last Read MoreChina has increasingly relied on contractors for its hacking, which opens the door to all kinds of criminal behavior.
How China’s Hacking Entered a Reckless New Phase Read MoreA single group appears to have infiltrated tens of thousands of Microsoft Exchange servers in an ongoing onslaught.
Chinese Hacking Spree Hit an ‘Astronomical’ Number of Victims Read MoreThe full extent of the SolarWinds hack and Hafnium’s attack on Microsoft Exchange Server may never be known.
China’s and Russia’s Spying Sprees Will Take Years to Unpack Read More“After two decades of Internet development under the Communist Party’s firm leadership, [China’s Internet czar, Lu Wei] said, his country had struck the correct balance between ‘freedom and order’ and between ‘openness and autonomy.’” – BEHIND THE FIREWALL: How China tamed the Internet | This is part 1 of 6 of a series examining the impact of China’s Great Firewall, a mechanism of Internet censorship and surveillance that affects nearly 700 million users.
China’s scary lesson to the world: Censoring the Internet works Read More“I hope one day I’ll live in a country where I have the freedom to write any code I like without fearing.” – BEHIND THE FIREWALL: How China tamed the Internet | This is part 2 of 6 of a series examining the impact of China’s Great Firewall, a mechanism of Internet censorship and surveillance that affects nearly 700 million users.
Internet activists are finding ways around China’s Great Firewall Read More“I just want freedom of speech without fear.” – BEHIND THE FIREWALL: How China tamed the Internet | This is part 3 of 6 of a series examining the impact of China’s Great Firewall, a mechanism of Internet censorship and surveillance that affects nearly 700 million users.
The Internet was supposed to foster democracy. China has different ideas. Read More“The truth is that behind the Great Firewall — the system of censorship designed to block content that could challenge the Chinese Communist Party — China’s tech scene is flourishing in a parallel universe.” – BEHIND THE FIREWALL: How China tamed the Internet | This is part 4 of 6 of a series examining the impact of China’s Great Firewall, a mechanism of Internet censorship and surveillance that affects nearly 700 million users.
America wants to believe China can’t innovate. Tech tells a different story. Read More“This is what China calls “Internet Plus,” but critics call a 21st-century police state.” – BEHIND THE FIREWALL: How China tamed the Internet | This is part 5 of 6 of a series examining the impact of China’s Great Firewall, a mechanism of Internet censorship and surveillance that affects nearly 700 million users.
China’s plan to organize its society relies on ‘big data’ to rate everyone Read More“For some highflying U.S. Internet businesses, the China dream is fading; for others, it looks radically different from what they had hoped.” – BEHIND THE FIREWALL: How China tamed the Internet | This is part 6 of 6 of a series examining the impact of China’s Great Firewall, a mechanism of Internet censorship and surveillance that affects nearly 700 million users.
U.S. companies want to play China’s game. They just can’t win it. Read MoreIn law and in practice, China is creating the world’s largest online thought prison. It turns the idea of the Internet as a force for freedom on its head, and as China goes, so go other tyrants. From Vietnam to Saudi Arabia, from Russia to Turkey, the age of Internet repression has blossomed.
China’s vast Internet prison Read MoreThe country’s cyber forces have raked in billions of dollars for the regime by pulling off schemes ranging from A.T.M. heists to cryptocurrency thefts. Can they be stopped?
The Incredible Rise of North Korea’s Hacking Army Read More“Censorship, Surveillance and Profits: A Hard Bargain for Apple in China” The New York Times, May 17, 2021 (Updated June 17, 2021) Technology By Jack Nicas, Raymond Zhong and Daisuke Wakabayashi “Apple built the world’s most valuable business on top of …
Censorship, Surveillance and Profits: A Hard Bargain for Apple in China Read MoreWe learned that we cannot afford to wait for cyber attacks to affect our military networks. We learned that defending our military networks requires executing operations outside our military networks. The threat evolved, and we evolved to meet it.
How to Compete in Cyberspace Read MoreTo be sure, China did eventually take extraordinary and painful steps to quell its domestic outbreak. But it has also taken extreme measures to curate the information that has emerged from ground zero of the pandemic.
Inside the Early Days of China’s Coronavirus Coverup Read MoreFew national-security threats are as potent—or as nebulous—as cyber attacks. Ben Buchanan reveals how hackers are transforming spycraft and statecraft, catching us all in the crossfire, whether we know it or not.
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Read MoreAn oral history of a devastating strike that hasn’t happened yet.
Imagine the US was just hit with a cyberattack. What happens next? Read More