Cybersecurity

AI, Encryption, and Data Flows: Policy Imperatives for U.S. Leadership
Editor’s note: In February, The National Interest organized a symposium on the U.S.-China technology race amidst the emergence of DeepSeek and ongoing legal battles over TikTok. We asked a variety of experts the following...

The Three Pillars of U.S. Technological Leadership
Editor’s note: In February, The National Interest organized a symposium on the U.S.-China technology race amidst the emergence of DeepSeek and ongoing legal battles over TikTok. We asked a variety of experts the...

To Combat Global Crime, Start By Including Taiwan
Taiwan is known for its low crime rates, partly due to the high standards of our law enforcement. Taiwan’s National Police Agency has much expertise to contribute to the fight...

How to Give Americans Back Control of Their Digital Identities
Our digital infrastructure is becoming more vulnerable. A single cyberattack on Ticketmaster exposed data from over 500 million customers. Chinese state-affiliated hackers secretly accessed email accounts at approximately twenty-five organizations,...

The U.S. Must Win the AI Race
With conflict currently present in almost every region of the world, speculation about “World War III” is difficult to avoid. If a calamity of such magnitude were to occur, it...

The Next Six Months Will Be Critical for Moldova
Moldova is a small, landlocked country in Eastern Europe that languished in obscurity until Russia launched its full-scale invasion of Moldova’s neighbor, Ukraine, two years ago. But while kinetic conflict...

Congress Must Act to Deter Chinese Cyberattacks
Recent Congressional testimony highlighted the takedown of a Chinese hacking syndicate exploiting critical infrastructure. The FBI director, the head of Cyber Command, the Director of the Cybersecurity and Infrastructure Security...

Understanding AI in an Era of Great Power Politics
As cyberattacks grow exponentially—an insecure computer can suffer 2,000 attacks per day—Artificial Intelligence (AI) is now imperative to deal with the massive volume of breaches. Yet, it seems that AI...

Saudi Arabia Has Become the Next Tech Battleground
Technological innovations have brought tectonic shifts in global geopolitical dynamics over the past decade. A technological competition between the two major powers, China and the United States, is now underway,...

If China Cracked U.S. Encryption, Why Would It Tell Us?
When Alan Turing cracked the Enigma code during the Second World War, neither the United Kingdom nor the United States immediately published a paper announcing the achievement. Instead, they kept...

Virtual Reality, Real Dangers: The Metaverse Poses Counterterrorism Challenges
The metaverse is on its way. As with other technical advancements, it presents both new potential and threats. The metaverse is a virtual reality internet where users can freely move...

Cyberspace: The New Battlefield of U.S.-China Competition
There are 2.8 billion active monthly users on Facebook, 1.3 billion on WeChat, and 1 billion on TikTok. During the Covid-19 pandemic, the netizen population grew rapidly when people and...