Science & Technology

335 Items

Sri Lankan port workers hold a Chinese national flag to welcome Chinese research ship

AP/Eranga Jayawardena, File

Analysis & Opinions - Project Syndicate

Peak China?

| Jan. 03, 2023

Joseph Nye writes: From an American perspective, it is just as dangerous to underestimate Chinese power as it is to overestimate it. While hysteria creates fear, discounting China's recent progress and future ambitions could lead the United States to squander its own long-term advantages.

A man looks at a destroyed Russian tank placed as a symbol of war in downtown Kyiv, Ukraine

AP/Natacha Pisarenko, File

Journal Article - Texas National Security Review

What's Old Is New Again: Cold War Lessons for Countering Disinformation

| Fall 2022

Hostile foreign states are using weaponized information to attack the United States. Russia and China are disseminating disinformation about domestic U.S. race relations and COVID-19 to undermine and discredit the U.S. government. These information warfare attacks, which threaten U.S. national security, may seem new, but they are not. Using an applied history methodology and a wealth of previously classified archival records, this article uses two case studies to reveal how and why a hostile foreign state, the Soviet Union, targeted America with similar disinformation in the past

3D rendering of cyber security and system crash

Adobe Stock

Analysis & Opinions - Harvard Business Review

The Cybersecurity Risks of an Escalating Russia-Ukraine Conflict

With the looming threat of increased conflict in Ukraine, businesses around the world should be preparing now, write Paul R. Kolbe, Maria Robson Morrow, and Lauren Zabierek. Corporate security and intelligence teams have said they’re seeing an increase in cyber probes, and the U.S. Cybersecurity and Infrastructure Security Agency and the European Central Bank have both issued warnings about potential Russian cyberattacks. At this point, companies should be taking the following steps: 1) Review business continuity plans; 2) Closely examine supply chains; 3) Actively engage peer networks, vendors, and law enforcement around cyber intrusions; 4) Instill a security mindset in employees; and 5) Make sure corporate intelligence and IT teams are working closely together on solutions.

Container Ship

AP/Steve Helber

Analysis & Opinions - The Security Times

Cracking China

| February 2022

Will China succeed in what some call its grand strategy of displacing American power? Whichever scenario emerges also depends on the strategy the US chooses in response, rites Joseph Nye.