It’s no secret that Taiwanese factories produce much of the world’s computer chip and semi-conductor supplies used in a variety of products from smartphones to medical equipment. That alone may not seem cause for concern, but when you layer in an increasingly hostile geopolitical environment, a better picture of national ...

The Cipher Brief recently published an article by expert Tim Willasey-Wilsey asking “Why would China not invade Taiwan now with expert insights from a range of national security experts like General Martin Dempsey, Admiral James Stavridis (Ret.), Ambassador Joseph DeTrani and author and Global Policy Program Director at the Johns ...

Two years ago, Chinese President Xi Jinping made clear that he wanted China to make progress toward reunification with Taiwan.  This year, China has taken a more aggressive military stand toward Taiwan and has shown that it will not stop short of military pressure to move closer to its goal.  ...

Thousands of people are virtually gathering this week as the Association of the United States Army (AUSA) kicks off its annual conference focused on the future mission. The pandemic has forced the event to go all-virtual for the first time this year and presenters are expected to discuss a number ...

A CIPHER BRIEF THREAT CONFERENCE CONVERSATION -- The Cipher Brief Threat Conference brings together thought leaders and experts from the public and private sectors to address the world’s most pressing security issues, and every year for the past four years, the U.S.’ relationship with China has been at the top ...

Understanding expert perspective on where the US stands in the world with regards to national security is a key component of how The Cipher Brief keeps the security community connected.  Michael Morell and Cipher Brief Expert Mike Vickers  recently sat down to talk with each other about the challenges facing ...

Eric Shiraev, Political Psychologist, George Mason University Dr. Eric Shiraev is a political psychologist from George Mason University, USA, where he heads a lab on reputational politics. He is author of more than twenty books including International Relations (Oxford), Russian Government and Politics (Macmillan), and Character Assassination Throughout the Ages. Dr. Holger ...

The US State Department recently named career diplomat James DeHart as the US’ first coordinator for the Arctic region.  DeHart’s job is to coordinate US efforts in the region, which includes “repelling China’s advances and capitalizing on commercial opportunities,” according to the Wall Street Journal.  What exactly are China’s ambitions ...

The author  of this piece, Adam L. Silverman, PhD is a senior subject matter expert and consultant at Helios Global, Inc specializing in low intensity warfare and cultural considerations for strategy, policy, and operations. He served as a Senior Fellow in the Center for Special Operations Studies and Research at ...

Last week, the Justice Department brought an indictment against two individuals accused of working with China’s Ministry of State Security to conduct a decade-long cyber intrusion campaign. The Justice Department says the two individuals were targeting the private sector some of which included research institutions working on coronavirus treatments.  But ...

Counterintelligence in a Time of Crisis Mark Kelton is a former senior Central Intelligence Agency executive who retired in 2015 with 34 years of experience in intelligence operations. Before retiring, he served as CIA’s Deputy Director for Counterintelligence.  “All my little duckies, swimming on the pond…heads deep in the water, ...

Iran and China are reportedly moving forward with an economic and security agreement that could pose a significant challenge to US efforts to isolate and sanction Tehran over its nuclear program.  The proposed agreement, reported last week by The New York Times “would vastly expand Chinese presence in banking, telecommunication, ...

Secretary of State Mike Pompeo called out China’s claims in the South China Sea this week, saying they are “completely unlawful.”   It was a distinctive public show of US support for a 2016 ruling by The Hague that found China’s actions in the South China Sea were in violation of ...

An attempted cyberattack on Israel’s water system in late April, just months after the global pandemic hit, prompted fears that cyber adversaries are getting even more bold in their efforts to cause harm. Israel’s national cyber chief, Yigal Unna, officially acknowledged the plot, calling it a ‘synchronized and organized attack’ ...

OPINION -- “Black swans” are events that arrive as unwelcome surprises and have significant effects on nations and societies.  They can upend the status quo in politics, economics, or national security. Black swans are even more dangerous when superimposed on other black swans. It’s always worth trying to anticipate potential ...

China is on a multi-year mission to reduce its reliance on foreign technology and as a result, Beijing is investing heavily in its own technological developments. Premier Li Keqiang announced the Made in China 2025 (MIC 2025) initiative in 2015 as a bid to significantly advance the country’s economy and ...

(Editor’s Note:  Understanding the life of a spy is often difficult, especially understanding the experiences of those who spend much of their careers working undercover. In this rare commencement address delivered to the Valley Forge graduating class of 2020, Former CIA Deputy Director for Counterintelligence Mark Kelton shares fascinating insight ...

India says 20 of its soldiers were killed in a clash with Chinese troops along a disputed border in the Himalayas. Tensions have been escalating over the past several weeks as both sides sent additional troops to the region, though senior military leaders had begun talks to deescalate the situation ...

CIPHER BRIEF EXPERT VIEW -- Mark Kelton is a retired senior Central Intelligence Agency executive who retired in 2015 with 34 years of experience in intelligence operations. Before retiring, he served as CIA's Deputy Director for Counterintelligence.  He is the Senior Vice President for National Security Solution at DynCorp International; and ...

A whirlwind of actions and statements regarding Hong Kong over the past week has increased tensions between the US and China.  Even before Beijing passed legislation last week to move in the direction of imposing new national security restrictions on Hong Kong, the US was contemplating a bold response.   It's ...

We know that corporate boards can no longer afford to leave cyber to the IT team. In the future, (which is now) they need to be actively engaged in cybersecurity and they need to know how to do it from a strategic level. Particularly in a time when many companies ...

The Cipher Brief’s Open Source Trend Line Report utilizes open source data  to track trends around the world that impact national and global security.  We break the world down by region and provide you with a recent timeline to help understand the pace at which events were developing and provide expert insight on ...

The Cipher Brief’s Open Source Trend Line Report utilizes open source data on a quarterly basis to track trends around the world that impact national and global security.  We break the world down by region and provide you with a recent timeline to help understand the pace at which events were developing and ...

Cipher Brief Expert Carmen Medina is a former CIA Deputy Director of Intelligence and a 32-year veteran of the Intelligence Community.  Medina is also author of the book, Rebels at Work: A Handbook for Leading Change from Within. Thinking in the Time of Coronavirus - Part One  discussed three important thinking ...

Cipher Brief Expert Carmen Medina is a former CIA Deputy Director of Intelligence and a 32-year veteran of the Intelligence Community.  Medina is also author of the book, Rebels at Work: A Handbook for Leading Change from Within. I’ve been wanting to comment on all the examples of bad thinking ...

As of this writing, Johns Hopkins, is reporting more than 432,438 confirmed cases of coronavirus in the US, and nearly 1.5m confirmed cases worldwide.  While the battle to save lives is expected to continue until a vaccine is developed (which experts say could still be 12-18 months out), national security ...

"America is no longer protected by vast oceans. We are protected from attack only by vigorous action abroad, and increased vigilance at home." - President George W. Bush, State of the Union Address, January 29, 2002. The COVID-19 outbreak will likely prove to be the most consequential event since the ...

Things weren't great between the US and China even before COVID-19. Bloomberg is now citing three anonymous US officials as saying that the US Intelligence Community has come to the classified conclusion that China intentionally concealed the full extent of the coronavirus outbreak by under-reporting the total number of cases ...

‘Quantum computing’ is a phrase used more frequently in national security conversations these days. What does it mean?  In its simplest definition, quantum computing involves the behavior of sub-atomic particles in computing, which translates into a fundamentally different way computers can solve problems.  Quantum computing is part of an emerging ...

Norman T. Roule served for 34-years in the Central Intelligence Agency, managing numerous programs relating to Iran and the Middle East.   He served as the National Intelligence Manager for Iran (NIM-I) at the Office of the Director of National Intelligence from November 2008 until September 2017.  As NIM-I, he was ...

Dr. Kenneth Dekleva served as a Regional Medical Officer/Psychiatrist, including 5 years at the U.S. Embassy Moscow, with the U.S. Dept. of State from 2002-2016.  He is currently Associate Professor of Psychiatry and Director, Psychiatry-Medicine Integration, UT Southwestern Medical Center, Dallas, TX.  OPINION — In 2000, Xi Jinping, a relatively ...

Angela Lewis, Manager of Global Intelligence and Threat Analysis Team at The Walt Disney Company Angela Lewis is the Manager of the Global Intelligence and Threat Analysis Team at The Walt Disney Company. Prior to joining the private sector, Ms. Lewis served as a Senior Counterterrorism Targeting Officer in the CIA’s Directorate of Operations, ...

The Cipher Brief’s Open Source Trend Line Report utilizes open source data on a quarterly basis to track trends around the world that impact national and global security.  We break the world down by region and provide you with a recent timeline to help understand the pace at which events ...

Thomas Donahue is a Cipher Brief expert and former Senior Director for Cyber Operations on the U.S. National Security Council Staff.  His article was originally published by National Defense University Press PRISM.  In case you missed it, you can read The Worst Possible Day: US Telecommunication and Huawei – Pt. 1 here  ...

Thomas Donahue is a Cipher Brief expert and former Senior Director for Cyber Operations on the U.S. National Security Council Staff.  His article was originally published by National Defense University Press PRISM. As a global power, the United States must be able to sustain military forces and project power anywhere ...

The Gray Zone is that place between war and peace where actors use a range of elements at their disposal to effect outcome.  We see it in everyday operations like disinformation and election interference or in using economic means to coerce an outcome.  China and Russia have been big fans ...

The Cipher Brief’s NEW Open Source Collection Report (OSINT) uses open source data to track trends around the world that impact national and global security. We break the world down by region and provide you with a recent timeline to help understand the pace at which events are developing and ...

China and South Korea quietly agreed this week to engage in a joint effort to denuclearize the Korean Peninsula.  The announcement came on the sidelines of the Xiangshan Forum, a conference focused on Asia-Pacific security.  The two countries have resumed bilateral defense talks that were suspended in 2014, signaling a ...

The National Geospatial-Intelligence Agency has long relied on a range of technological tools to provide geospatial intelligence (GEOINT) like commercial imaging, remote sensing and human geography to help warfighters, first responders, policymakers and spies navigate the world. Due to its unique mission and vantage point, NGA serves both as an ...

The development of artificial intelligence (AI) technologies provides great potential to businesses that are able to harness the opportunities it presents, but AI also poses great risks to national security.  Within the pages of the 2019 Worldwide Threat Report, presented in January of this year by former Director of National ...

The director of the Hong Kong and Macau Affairs office says the city is experiencing its worst crisis since the colony returned to China from British rule in 1997 after weeks of protests prompted by legislation that protestors believe was eroding their freedoms. Thousands of protestors have been disrupting travel ...

U.S. Acting Defense Secretary Patrick Shanahan recently warned that the U.S. "is not moving fast enough to stay ahead” of its rivals in space, specifically citing the technology and development of hypersonic weapons.  Shanahan specifically mentions China and Russia when he talks about U.S. rivals, both of which have made ...

Ripped straight from the headlines, there are a number of current, inter-related political and security issues that could have a significant impact on the U.S.’ future security posture, including NATO’s future capabilities, exploration and control of the Arctic, Huawei and a race for dominance in space.   The Cipher Brief ...

A number of U.S. companies including Google, Intel, Qualcomm and others are limiting business with Chinese telecommunications firm Huawei after the White House issued an Executive Order last week aimed at tightening security on the supply chain for information and communications technology.  While the EO didn’t specifically call out Huawei, ...

The Department of Defense is seeking a significant budget increase for further development of lethal autonomous weapons programs (LAWS).  While technology and the use of weapons technology is advancing rapidly, policy makers are grappling with the questions of just which decisions machines should be making on their own.  Should an autonomous ...

A lot has happened since China expert and Harvard Professor Graham Allison’s best-selling book on China, Destined for War: Can America and China Escape Thucydides Trap was published in 2017. Thucydides was a Greek historian who chronicled close to three decades of war between Athens and Sparta and documented patterns ...

When DHS was established shortly after 9/11, terrorism was the focus. But in the 16 years since the Agency’s creation, the threat landscape has changed dramatically and cyber now plays a leading role in overall threats. Four months ago, President Trump signed the Cyber Security and Infrastructure Security Agency Act, ...

Cipher Brief Expert and former Senior Director for Cyber Operations at the National Security Council, Thomas Donahue, provides critical perspective on the strategy needed to protect the sovereignty of the U.S. telecommunications backbone. The U.S. Government - by blocking the sale of U.S. high technology firms to foreign companies for ...

General Michael Hayden, the co-host of The Cipher Brief’s Annual Threat Conference for the past two years, has famously said that the world has been more dangerous in the past, but it has never been more complicated.  He has also said that if the U.S. doesn’t get China right, nothing ...