Lawyers and privacy advocates alike should pay careful attention to the “priority actions” in the National Cyber Strategy related to surveillance and criminal law reform.
Bloomberg reports that the Chinese People’s Liberation Army has quietly been corrupting a key computer chip. The technical implications are frightening.
The attack by Chinese spies reached almost 30 U.S. companies, including Amazon and Apple, by compromising America’s technology supply chain, according to extensive interviews with government and corporate sources.
Cooperation between banks and the U.S. government can help shore up a critical sector of the U.S. economy.
Disobedient acts by President Trump’s advisers represent an erosion of his legitimacy, fueled by Russian election interference, that threatens to reach a breaking point.
On a related note and the manual concept in general, apparently not every one RFTM or follows it. I am not being totally Scalianish or Freudian; that fierce independence thing has some Western frontier child play component or … roots 🙂
Among the additions to the manual is a new section on “Disclosure of Foreign Influence Operations.”
The military has a new doctrinal approach to cyber.
Great-power strategic competition, defend forward, and prepare for war: These are the three central tenets of the newly released summary of the 2018