SecurityCommentary
China’s Land Purchases in US Spark Outcry for Federal Solution
Over the past two years, nearly half the states in America acted to scrutinize purchases of land linked to China and other foreign adversaries. Concerns… Read More
SecurityCommentary
Over the past two years, nearly half the states in America acted to scrutinize purchases of land linked to China and other foreign adversaries. Concerns… Read More
SecurityCommentary
“The cyberthreat posed by the Chinese government is massive.” That was FBI Director Christopher Wray, speaking at a recent security conference in Munich, warning of… Read More
SecurityCommentary
Microsoft flagged yet another active threat to U.S. critical infrastructure Wednesday afternoon. The warning lights have been blinking red for some time, and they have… Read More
SecurityNews
FBI Director Christopher Wray is re-upping concerns over how “non-Chinese companies operating in China” are treated, specifically noting that “the Chinese government takes advantage of… Read More
SecurityAnalysis
The Chinese Communist Party’s system of mass surveillance is like something out of a dystopian sci-fi novel, destroying any semblance of privacy in the country… Read More
SecurityNews
Thousands of fake pro-China accounts used dozens of social media platforms to mobilize Asian American protesters in the United States, according to a report by… Read More
SecurityNews
Hackers responsible for a May ransomware attack on a key East Coast oil pipeline stole personal data, including Social Security numbers and health insurance information,… Read More
EconomyCommentary
Sen. Rob Portman, R-Ohio, introduced a measure into the infrastructure bill last week intended to increase financial surveillance that could backfire and simply drive an… Read More
SecurityCommentary
The Chinese telecom giant Huawei has initiated a charm campaign in recent weeks to convince the Biden administration to be more accommodating toward the company…. Read More
SecurityCommentary
As cybersecurity technology becomes more powerful, so has the technology that is used to hack phones, computers, and other devices. When this technology falls into… Read More