58 Results for:

December 6, 2018

China
A New Old Threat

China is once again conducting cyber-enabled theft of U.S. intellectual property to advance its technological capabilities. To combat the problem, the United States should build a multinational coali…

Trump, Bolton, and Xi at G20

October 16, 2017

China
Chinese Investment in Critical U.S. Technology: Risks to U.S. Security Interests

To counter security threats of Chinese investment in U.S. critical technology, policymakers should boost innovation in the U.S. economy as a way to maintain a technological edge rather than seek to block or restrict Chinese investment or to limit the export of certain technologies.

A man programs an iPal Companion Robot by Nanjing Avatar Mind Robot Technology at the 2017 World Robot conference in Beijing, on August 22, 2017. (Thomas Peter/Reuters)

October 16, 2018

Cybersecurity
Disinformation on Steroids

Deep fakes—highly realistic and difficult-to-detect depictions of real people doing or saying things they never said or did—are a profoundly serious problem for democratic governments and the world order. A combination of technology, education, and public policy can reduce their effectiveness.

An image from a fake video of former President Barack Obama, demonstrating facial-mapping technology.

September 19, 2016

Cybersecurity
Using Incentives to Shape the Zero-Day Market

In early 2016, the Federal Bureau of Investigation reportedly paid more than $1.3 million for a software flaw that allowed it to unlock an iPhone without Apple’s assistance. The purchase was possible…

Segal-Cyber-Brief-image_lg.jpg

July 27, 2020

United Nations
From Norm-Takers to Norm-Makers

African UN member states should act as unifiers and conveners rather than dividers. More coordination could help them overcome the structural challenges they face at the United Nations.

From a zoomed-out, interior perspective, a man walks out of the UN headquarters.