Alas IRGC cronies and activities in Vancouver do not get exposed for influence activities because of our respect for partner sovereignty. On the brighter side, they also give US partners a lending hand in deep-sixing.
Iran is in possession of improved and dangerous weapons systems that give Tehran the ability to threaten some of the world’s most important waterways, according to the top American admiral in the Middle East.
Source: Top US Admiral in Mid-East warns of growing Iranian threat – CNNPolitics
Wow … how observant to notice this method in 2018-19. Those “Russians”!!!
A new filing by Special Counsel Robert Mueller shows how Russia uses the federal courts to go after its adversaries.
Source: Russia Is Attacking the U.S. System From Within
Reuters reveals how a UAE surveillance operation, staffed by former U.S. cyber-agents, spied on dissidents, rivals and Americans. Inside ‘Project Raven.’
Source: Exclusive: Ex-NSA cyberspies reveal how they helped hack foes of UAE
Announcing the latest edition of the Aegis Paper Series from the Hoover Institution.
Source: Who Do You Sue? State and Platform Hybrid Power Over Online Speech
Intelligence agencies extorting or leveraging criminal networks? Unheard of! And what a cheesy picture.
Besides which, whenever states think they can use criminals, they tend also to open themselves up to reciprocal exploitation. With corruption a serious problem for the Russian security and intelligence services, there has already been evidence of such blowback—from the use of state cyber assets for private gain to military intelligence assets being used to gather information on Russian gangsters abroad, according to Canadian police. Here and now, this crime-state nexus is clearly an additional security headache for the West, but in the longer term it may pose at least as serious a problem for Russia itself.
Source: Gangster Geopolitics: The Kremlin’s Use of Criminals as Assets Abroad | Russia Matters
In the wake of the USMCA’s promotion of the Cross Border Privacy Rules established in 2011 by APEC, a reexamination of the CBPR system is warranted.
Source: Cross-Border Privacy Rules in Asia: An Overview
Germany’s Network Enforcement Act (NEA) places strict requirements on “social network providers” to remove illegal content and respond to complaints.
Source: Social Media Content Moderation: The German Regulation Debate
Risk, probability and impact of networks and relationships: “Similarly, the size of a war has little to do with the triggering incident but instead depends on the network of political, social, and economic tensions that exist at the time. ”
A new study of wars over 600 years shows conflict following a universal mathematical law, suggesting that the current period of relative peace could be more fragile than many have thought.
Source: Data mining adds evidence that war is baked into the struwcture of society
The Paris Call is a step in the right direction in bringing stability and security to the borderless cyberspace through public and private sector cooperation. But the calls in this declaration must be met with strong enforcement of those norms to truly make a change.
Source: Closing the Global Cyber Enforcement Gap
An article in the latest issue of the Yale Law Journal tells the story of the outsized role that courts play in managing the global governance of the internet.
Source: Litigating Data Sovereignty