26 May 2021

China’s Cyber-Influence Operations

Defining China’s Intelligentized Warfare and Role of Artificial Intelligence

Taliban control in Afghanistan expands significantly since 2018

How a Rising China Has Remade Global Politics

The Wuhan Lab and the Virus: The Dr. Fauci, Rand Paul Debate Fact-Checked and Explained

The Iran Threat Network (ITN)

How partisan polarization drives the spread of fake news

Hamas tries to seize the day

Israel is winning battles, Hamas is winning the war - analysis

Israel Faces Rockets from Gaza, Lebanon, Syria as Conflict Threatens to Spread

Bringing Assistance to Israel in Line With Rights and U.S. Laws

Battle between Israel and Hamas is an unwelcome surprise for Biden

Why Japan’s plan for Fukushima wastewater lacks public trust

In Wake Of Pipeline Hack, Biden Signs Executive Order On Cybersecurity

Why the SolarWinds Hack Is a Wake-Up Call

The COVID-19 vaccines are here: What comes next?

Pipeline Attack Yields Urgent Lessons About U.S. Cybersecurity

Reckoning With the Pandemic’s Second-Order Impacts

These are the lessons of the US Colonial oil pipeline cyber attack

The best defense? An alternative to all-out war or nothing

Africa Is a Continent of Contradictions

Why the U.S. Needs a Space Czar

Striking a deal to strengthen broadband access for all

Three Myths About the Laws of War and the Israel-Hamas Conflict

Unconventional Supply Network Operations: A New Frontier in Global Competition

How the Military Might Expand Its Cyber Skills

Applying a Framework to Assess Deterrence of Gray Zone Aggression

Cyberspace Is Neither Just an Intelligence Contest, nor a Domain of Military Conflict; SolarWinds Shows Us Why It’s Both

The TSA Should Regulate Pipeline Cybersecurity

We need to leave the firewall in the ’90s