Asia & the Pacific

64 Items

man wearing a shirt promoting TikTok

AP/Ng Han Guan

Analysis & Opinions - Project Syndicate

The Other Global Power Shift

| Aug. 06, 2020

Joseph Nye writes that the world is increasingly obsessed with the ongoing power struggle between the United States and China. But the technology-driven shift of power away from states to transnational actors and global forces brings a new and unfamiliar complexity to global affairs.

a guide is silhouetted in an exhibition promoting Huawei's 5G technologies

AP/Ng Han Guan

Analysis & Opinions - The New York Times

Every Part of the Supply Chain Can Be Attacked

| Sep. 25, 2019

Bruce Schneier writes that when it comes to 5G technology, a trustworthy system needs to be built out of untrustworthy parts.  It is not even really known how to build secure systems out of secure parts, let alone out of parts and processes that aren't trustworthy and that are almost certainly being subverted by governments and criminals around the world.

new MBTA Orange Line car produced by CRRC

Wikimedia CC/Edward Order

Analysis & Opinions - CNN

The Real Threat from China Isn't 'Spy Trains'

| Sep. 21, 2019

Bruce Schneier  explains that there is no escaping the technology of inevitable surveillance. Consumers have little choice but to rely on the companies that build their computers and write their software, whether in  smartphones,  5G wireless infrastructure, or subway cars.  China is more likely to try to get data from the U.S. communications infrastructure like the United States does rather than try to produce a subway car outfitted with surveillance apparatus.

Analysis & Opinions - Lawfare

Three Observations on China's Approach to State Action in Cyberspace

| Jan. 22, 2017

Cyber Security Project Director Michael Sulmeyer and Project Affiliate Amy Chang discuss their observations on China's Approach to cyber after a recent visit to Beijing. Sulmeyer and Chang were part of a small group of American academics and goernment representatives to meet with Chinese counterparts about contemporary issues in cybersecurity.