Ripple may change the calculus in Huawei fiasco caught in the US-China trade crossfire

Ripple may change the calculus in Huawei fiasco caught in the US-China trade crossfire Horace C.…

Taiwan’s Emerging Push for “Cyber Autonomy”

Taiwan’s Emerging Push for “Cyber Autonomy” Publication: China Brief By: Philip Hsu The Jamestown Foundation On…

United States tech companies failing to heave Trump’s stance on China 

United States tech companies failing to heave Trump’s stance on China Horace C. White Modern Tokyo…

UK, Japan Companies Help China to Counter US’s Tech Leverage

UK, Japan Companies Help China to Counter US’s Tech Leverage By: Matt Schrader The Jamestown Foundation…

China, Israel, and non-interference: Heavy investments and high technology

China, Israel, and non-interference: Heavy investments and high technology Boutros Hussein and Lee Jay Walker Modern…

Disruption Under the Radar: Chinese Advances in Quantum Sensing

Disruption Under the Radar: Chinese Advances in Quantum Sensing Publication: China Brief By: Elsa Kania, Stephen…

Apple abiding by the Authoritarianism of the Chinese Communist Party: VPN Services

Apple abiding by the Authoritarianism of the Chinese Communist Party: VPN Services Noriko Watanabe and Lee…

Swarms at War: Chinese Advances in Swarm Intelligence

Swarms at War: Chinese Advances in Swarm Intelligence Publication: China Brief Volume: 17 Issue: 9 By:…

Israel and Cyber Defence: Mossad, Technology, and Libertad

Israel and Cyber Defence: Mossad, Technology, and Libertad Murad Makhumdov and Lee Jay Walker  Modern Tokyo…

Mexico, NSO Group, Israel, and Spying via Pegasus: The New Enemies of the State?

Mexico, NSO Group, Israel, and Spying via Pegasus: The New Enemies of the State? Chika Mori…

FBI to Hack any Computer by Utilizing Rule 41: Fear of Manipulation and Areas of Understanding

FBI to Hack any Computer by Utilizing Rule 41: Fear of Manipulation and Areas of Understanding…

CIA and Apple: iPhones and MacBooks Infiltrated for 8 Years but Sincerity or Duplicity?

CIA and Apple: iPhones and MacBooks Infiltrated for 8 Years but Sincerity or Duplicity? Sawako Uchida…

Serious Cyber Attack Allegedly hits the Japanese Ministry of Defense: Government now Denies

Serious Cyber Attack Allegedly hits the Japanese Ministry of Defense: Government now Denies Sawako Uchida and…

Germany Seeks to Silence Social Media: Immigration and the GDR Mirror

Germany Seeks to Silence Social Media: Immigration and the GDR Mirror Helmut Joachim Schmidt, Amina Qamar,…

Softbank of Japan in Mega Fund with Saudi Arabia where Women Persecuted and Buddhism is Illegal

Softbank of Japan in Mega Fund with Saudi Arabia where Women Persecuted and Buddhism is Illegal…

Yahoo Complies with NSA in Obama’s America: Messages Searched for US Intelligence

Yahoo Complies with NSA in Obama’s America: Messages Searched for US Intelligence Murad Makhmudov and Lee…

Merkel and Political Correct Coercion in Germany: Trojan Spyware and Merkel’s GDR Mirror

Merkel and Political Correct Coercion in Germany: Trojan Spyware and Merkel’s GDR Mirror Noriko Watanabe and…

China’s Draft Cybersecurity Law

China’s Draft Cybersecurity Law Publication: China Brief Volume: 15 Issue: 24 By: Zunyou Zhou The Jamestown…

Snowden says GCHQ in the UK can Obtain Total Control Over Smartphones: UK and Terrorist Ratlines

Snowden says GCHQ in the UK can Obtain Total Control Over Smartphones: UK and Terrorist Ratlines…

Anonymous takes on Saudi Arabia in Order to Help Ali Mohammed al-Nimr

Anonymous takes on Saudi Arabia in Order to Help Ali Mohammed al-Nimr Ramazan Khalidov, Takeshi Hasegawa…