FIGHTING THE WAR CHINA STARTED: Time to Rid the World of China’s Trojan Horse Communications Gear.
For two decades we’ve had evidence that equipment manufactured by several Chinese corporations are potentially “dual use” systems.
At one level their equipment does what it’s supposed to do: connects communications systems like phones and computers. However, the systems have “backdoors” that give Chinese spies access to steal classified government secrets and your personal email.
Conceivably, the Chinese systems are offensive weapons: Trojan horses with intercontinental power. The CCP could use these pseudo-civilian systems to launch a cyber-Pearl Harbor attack on an adversary possessing them. The attack could damage the adversary’s economy (e.g., shut down banking). If executed quickly and pervasively, the sneak attack could disrupt military communications channels and disable high-tech sensors.
Articles and Columns for November 2022
- 10 fatal traps that explain why law firm strategic plans are DOA – Patrick J. McKenna is an internationally recognized author, lecturer, strategist and seasoned advisor to the leaders of premier law firms. McKenna’s deep dive into law firm strategic planning delivers a detailed guide on the major errors to circumvent to establish a winning competitive position going forward.
- For 2023, which tech tools might help your firm flourish? – Nicole L. Black’s actionable checklist begins with an end of year review of your law firm’s achievements and challenges to determine issues and new requirements moving forward. The review will include conducting an audit of your workflow and technology to identify process gaps and ensure efficiency and profitability in the new year. When the audit is completed, identify and implement technologies and service providers that will bridge the gaps identified and establish the foundation for success.
- The national library endowment vision must evolve – The LibraryEndowment.org started around nine years ago. A national library endowment would reduce the inequalities of the U.S. library world, especially those tied to geography, class, and race. David H. Rothmanshares his personal views on topline issues this project faces moving forward: how libraries could accept money from the super-rich while retaining their independence, and the increasing desirability of national digital library systems funded by the endowment, among other sources.
- 55 Select Books on Longevity and Productive Aging – Author, Editor, Speaker, Blogger Bruce Rosensteinshares recommendations on a selected list of literature about an increasingly impactful topic – longevity and productive aging. Rothstein references one book per author and in some cases it is their most recent book.
- Elon Musk’s ‘hardcore’ management style: a case study in what not to do – Professor Libby Sander explains why as a case study in how to implement organisational change, Elon Musk’s actions at Twitter will go down as the gold standard in what not to do.
- Red flag laws and the Colorado LGBTQ club shooting – questions over whether state’s protection order could have prevented tragedy – Professor Alex McCourt, an expert on gun laws at Johns Hopkins University, explains how red flag laws are supposed to work – and why they weren’t triggered in this case.
- No, an indictment wouldn’t end Trump’s run for the presidency – he could even campaign or serve from a jail cell – Stefanie Lindquist, Foundation Professor of Law and Political Science, Arizona State University, answers critical questions including: does an indictment – or even a felony conviction – prevent a presidential candidate from running or serving in office?
- Pete Recommends – Weekly highlights on cyber security issues, November 26, 2022 – Four highlights from this week: A Broken Twitter Means Broken Disaster Response; Third-party data brokers give police warrantless access to 250 million devices; House Dems say facial recognition company misrepresented its help to consumers; and Do’s and don’ts of data de-identification.
- Pete Recommends – Weekly highlights on cyber security issues, November 19, 2022 – Four highlights from this week: Google Settles 40 States’ Location Data Suit for $392 Million; FBI Alert: Watch Out for Subscription Renewal Scams; GAO Science & Tech Spotlight: Zero Trust Architecture; and Employee tracking: From your keystrokes to your emails, here’s what your employer can see.
- Pete Recommends – Weekly highlights on cyber security issues, November 12, 2022 – Four highlights from this week: Google Settles 40 States’ Location Data Suit for $392 Million; FBI Alert: Watch Out for Subscription Renewal Scams; GAO Science & Tech Spotlight: Zero Trust Architecture; and Employee tracking: From your keystrokes to your emails, here’s what your employer can see.
- Pete Recommends – Weekly highlights on cyber security issues, November 5, 2022 – Four highlights from this week: Four highlights from this week: 2023 Privacy Guide; TikTok allows employees in China to access European data; Public Entities in Nearly Every State Use Federally-Banned Foreign Tech, Report Says; and Malicious App Developer Remains on Google Play.