<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[The Kitchen Sync]]></title><description><![CDATA[Serious thoughts on technology and national security, from someone who doesn't take himself too seriously.]]></description><link>https://www.thekitchensync.tech</link><image><url>https://substackcdn.com/image/fetch/$s_!K7lp!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4a5e18da-b391-43b3-8db4-c5cab0426e9a_256x256.png</url><title>The Kitchen Sync</title><link>https://www.thekitchensync.tech</link></image><generator>Substack</generator><lastBuildDate>Tue, 28 Apr 2026 19:25:15 GMT</lastBuildDate><atom:link href="https://www.thekitchensync.tech/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Klon Kitchen]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[thekitchensync@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[thekitchensync@substack.com]]></itunes:email><itunes:name><![CDATA[Klon Kitchen]]></itunes:name></itunes:owner><itunes:author><![CDATA[Klon Kitchen]]></itunes:author><googleplay:owner><![CDATA[thekitchensync@substack.com]]></googleplay:owner><googleplay:email><![CDATA[thekitchensync@substack.com]]></googleplay:email><googleplay:author><![CDATA[Klon Kitchen]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[The Kitchen Sync on LinkedIn]]></title><description><![CDATA[We're back, baby!]]></description><link>https://www.thekitchensync.tech/p/the-kitchen-sync-on-linkedin</link><guid isPermaLink="false">https://www.thekitchensync.tech/p/the-kitchen-sync-on-linkedin</guid><dc:creator><![CDATA[Klon Kitchen]]></dc:creator><pubDate>Tue, 16 Jan 2024 11:30:14 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fda60edbc-bc00-451f-85e5-2d561aea1110_1149x766.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Hello everyone, it's been too long! </p><p>Having had time to find my footing as a Managing Director at <a href="https://bgsdc.com/team/klon-kitchen/">Beacon Global Strategies</a>, it's time to bring back the Kitchen Sync -- with some modifications. </p><p>The Sync will now be a <em>free</em> weekly commentary on <a href="https://www.linkedin.com/newsletters/7149402470811660288/">LinkedIn</a>, where I&#8217;ll continue to discuss the intersection of national security, technology, and global business. The tone and content will be very familiar to you, but the primary aim will be to provide these insights in a concise brief that busy readers can quickly digest and use.</p><p>I&#8217;ll still be publishing longer commentary and analysis at <a href="https://www.aei.org/profile/klon-kitchen/">The American Enterprise Institue</a> and in other publications. You can also <a href="https://twitter.com/klonkitchen">follow me on X</a> (formally Twitter) for day-to-day insights and observations.</p><p>If this sounds like your cup of tea (and if you&#8217;re on LinkedIn), you can signup for free using the button below.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.linkedin.com/newsletters/7149402470811660288/&quot;,&quot;text&quot;:&quot;Subscribe on LinkedIn&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.linkedin.com/newsletters/7149402470811660288/"><span>Subscribe on LinkedIn</span></a></p><p>This, of course, means I&#8217;ll be shutting down this Substack newsletter at the end of January but you&#8217;ll be able to sign up for the new free newsletter anytime.</p><p>I can&#8217;t wait to pick up our conversation!</p><p>Klon</p>]]></content:encoded></item><item><title><![CDATA[An Important Update]]></title><description><![CDATA[The Kitchen Sync is moving to The Dispatch!]]></description><link>https://www.thekitchensync.tech/p/an-important-update</link><guid isPermaLink="false">https://www.thekitchensync.tech/p/an-important-update</guid><dc:creator><![CDATA[Klon Kitchen]]></dc:creator><pubDate>Wed, 23 Feb 2022 02:19:33 GMT</pubDate><enclosure url="https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/4a5e18da-b391-43b3-8db4-c5cab0426e9a_256x256.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I&#8217;m excited to announce that The Kitchen Sync is moving to <a href="https://thedispatch.com/">The Dispatch</a>, a digital media company providing engaged citizens with fact-based reporting and commentary on politics, policy and culture&#8212;informed by conservative principles.</p><p><strong>Quick Facts:</strong></p><ul><li><p>There will be some re-branding of the newsletter but it will still focus on national security and technology issues.</p></li><li><p>The first edition of the new newsletter will be published next week on Thursday, March 3rd.</p></li><li><p>There will be no Kitchen Sync newsletter this week as I am neck-deep in the transition.</p></li><li><p>All paid subscribers to The Kitchen Sync will be given a 12-month paid subscription to The Dispatch, which includes nine <a href="https://thedispatch.com/about?sort=newsletter">newsletters</a> (you choose which ones you want to receive), five <a href="https://thedispatch.com/about?sort=podcast">podcasts</a>, and tons of other content (a $100 value).</p></li><li><p>All free subscribers will be automatically transitioned to The Dispatch&#8217;s free distribution list which also includes several newsletters and all of the podcasts. </p></li><li><p>Any subscriber not wanting to make the transition to The Dispatch can click &#8220;unsubscribe&#8221; at the bottom of this email by Friday and will be removed from the distribution list, with paid subscribers also receiving a prorated refund (but I really hope you&#8217;ll come with me because we have some very exciting plans).</p></li></ul><h2>Why The Change?</h2><p>It&#8217;s all about impact. </p><p>I write The Kitchen Sync because I believe technology is a decisive influence on our economic, social, and political lives and is especially important in matters of national security. And yet, many technologies and their policy implications can be highly-technical and confusing. The goal of this newsletter, therefore, is to raise public awareness of these issues while also making them more accessible. </p><p>That&#8217;s why this move makes sense.</p><p>By joining the <a href="https://thedispatch.com/about?sort=people">excellent team </a>at The Dispatch, I&#8217;ll be reaching tens of thousands of readers who want to be respected, told the truth, provided with expertise, and given an opportunity to join important conversations. In short: readers like you.</p><p>The Dispatch also has the experience and resources to ensure their offerings provide the best content in the most engaging mediums. Something I think you deserve.</p><p>Finally, I believe The Dispatch is doing something really important.</p><p>When Stephen Hayes and Jonah Goldberg started The Dispatch, they observed the following:</p><blockquote><p>The internet puts an unimaginable amount of information at our fingertips, but it makes knowledge and wisdom harder to grasp. Social media connects people in meaningful ways but also manages to make it more difficult for us to understand each other. It is less a World Wide Web linking us all together than an accelerant, quickening trends long in the works. Our confidence in the institutions that once anchored us was declining even before the internet became a fixture in our lives, but its arrival has only made us feel even less fixed to a common landscape.</p><p>Nowhere is this more true than in the world of journalism. Not only do we have too much noise and not enough signal, but the signals we should be heeding are often discounted as noise and the noise is marketed as prophecy.</p></blockquote><p>I think this is exactly right and I think technology and national security policy are too important to be lost in the noise. </p><p>I&#8217;m looking forward to this change and I can&#8217;t wait to share it with you!</p><p>With gratitude, </p><p>Klon</p><p></p>]]></content:encoded></item><item><title><![CDATA[Friday Brief for 18 February 2022]]></title><description><![CDATA[Drones & crypto in Ukraine; Tech legislation is moving; & Iran hacks the Red Cross]]></description><link>https://www.thekitchensync.tech/p/friday-brief-for-18-february-2022</link><guid isPermaLink="false">https://www.thekitchensync.tech/p/friday-brief-for-18-february-2022</guid><dc:creator><![CDATA[Klon Kitchen]]></dc:creator><pubDate>Fri, 18 Feb 2022 11:00:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!oo_j!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ff809aee4-3fbd-40d8-b866-0862f20689a0_1200x800.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Uh2b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 424w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 848w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1272w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png" width="737" height="121.605" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:165,&quot;width&quot;:1000,&quot;resizeWidth&quot;:737,&quot;bytes&quot;:12912,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 424w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 848w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1272w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><div><hr></div><h4>Tech Terms</h4><blockquote><p><strong><a href="https://www.preveil.com/blog/end-to-end-encryption/#:~:text=End%2Dto%2Dend%20encryption%20secures,nor%20on%20the%20user's%20device.">End to End Encryption (E2EE)</a> &#8212; </strong><em>End-to-end encryption secures data on the user's device and only ever decrypts it on the recipient's device. This means, the data can never be decrypted on the server nor in transit nor on the user's device.</em></p></blockquote><div><hr></div><h2>**Heads Up **</h2><p>First, I&#8217;m sorry there is no audio today. My mic decided to give up the ghost and the audio was just awful. I should be squared away soon.</p><p>If, however, you&#8217;re dying to hear the sultry sound of my voice, checkout the podcast below where I discuss cyber in Ukraine, the &#8220;New Right&#8217;s&#8221; old foreign policy, and flossing (the dance kind, not the dental kind).</p><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:48887111,&quot;url&quot;:&quot;https://podcast.thedispatch.com/p/ukraine-hit-by-cyberattacks&quot;,&quot;publication_id&quot;:27013,&quot;publication_name&quot;:&quot;The Dispatch Podcast&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/b0aa97af-fbae-4e8d-8272-ddfe5eb17910_1280x1280.png&quot;,&quot;title&quot;:&quot;Ukraine Hit By Cyberattacks&quot;,&quot;truncated_body_text&quot;:&quot;Listen now (50 min) | Today on the podcast, Sarah and Steve are joined by Klon Kitchen, senior fellow at the American Enterprise Institute, to discuss the latest in Ukraine after the country was hit by cyberattacks. Plus, how much is the Republican Party&#8217;s foreign policy views changing? And what exactly can the Chinese government do with all that TikTok data?&quot;,&quot;date&quot;:&quot;2022-02-16T23:30:40.263Z&quot;,&quot;like_count&quot;:18,&quot;comment_count&quot;:22,&quot;bylines&quot;:[{&quot;id&quot;:5849329,&quot;name&quot;:&quot;Sarah Isgur&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/098cc9a1-4e51-4767-a896-0b16c5bc45c0_400x400.jpeg&quot;,&quot;bio&quot;:&quot;A staff writer for The Dispatch. With experience on three presidential campaigns and all three branches, she knows how decisions in Washington get made.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-05-06T20:54:31.716Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:242795,&quot;user_id&quot;:5849329,&quot;publication_id&quot;:72300,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:72300,&quot;name&quot;:&quot;The Sweep&quot;,&quot;subdomain&quot;:&quot;thesweep&quot;,&quot;custom_domain&quot;:&quot;sweep.thedispatch.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Sarah Isgur, a veteran of national campaigns and the hard-knocks world of political communications, covers elections, providing insight into strategy and mechanics of political campaigns with some behind-the-scenes flavor along the way.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/9a8d4bb1-7d4f-44b4-b615-9b8845314d99_146x146.png&quot;,&quot;author_id&quot;:5849329,&quot;theme_var_background_pop&quot;:&quot;#2A3579&quot;,&quot;created_at&quot;:&quot;2020-07-24T17:17:46.609Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Chris Stirewalt&quot;,&quot;copyright&quot;:&quot;The Dispatch&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}},{&quot;id&quot;:6,&quot;user_id&quot;:5849329,&quot;publication_id&quot;:17455,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:17455,&quot;name&quot;:&quot;The Dispatch&quot;,&quot;subdomain&quot;:&quot;thedispatch&quot;,&quot;custom_domain&quot;:&quot;thedispatch.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Fact-based reporting and commentary on politics, policy and culture &#8211; informed by conservative principles&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/631ce259-4b95-4f90-928e-ccc471a9fb27_256x256.png&quot;,&quot;author_id&quot;:8450245,&quot;theme_var_background_pop&quot;:&quot;#2A3579&quot;,&quot;created_at&quot;:&quot;2019-09-16T20:59:42.820Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;The Dispatch&quot;,&quot;copyright&quot;:&quot;The Dispatch&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}},{&quot;id&quot;:24,&quot;user_id&quot;:5849329,&quot;publication_id&quot;:21765,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:21765,&quot;name&quot;:&quot;The French Press&quot;,&quot;subdomain&quot;:&quot;frenchpress&quot;,&quot;custom_domain&quot;:&quot;frenchpress.thedispatch.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;The French Press is a newsletter published three times per week by David French, author, attorney, and Iraq veteran. French writes about law, politics, faith, culture, and the superiority of DC over Marvel.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/0587547a-6402-4559-9fb5-6da781bfd1aa_600x600.png&quot;,&quot;author_id&quot;:5849328,&quot;theme_var_background_pop&quot;:&quot;#2A3579&quot;,&quot;created_at&quot;:&quot;2019-11-19T00:26:35.409Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;David French&quot;,&quot;copyright&quot;:&quot;The Dispatch&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}},{&quot;id&quot;:33,&quot;user_id&quot;:5849329,&quot;publication_id&quot;:17819,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:17819,&quot;name&quot;:&quot;The G-File&quot;,&quot;subdomain&quot;:&quot;gfile&quot;,&quot;custom_domain&quot;:&quot;gfile.thedispatch.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Jonah Goldberg&#8217;s &#8220;news&#8221; letter built around his deep understanding of American history, his passion for conservative ideas and his, um, unique sensibility, it&#8217;s a must-read every Friday &#8211; and now with additional mid-week mini G-Files for members only.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/bf81c195-0d0e-42a1-83aa-681b469df07d_146x146.png&quot;,&quot;author_id&quot;:4350832,&quot;theme_var_background_pop&quot;:&quot;#2A3579&quot;,&quot;created_at&quot;:&quot;2019-09-23T22:22:29.767Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Jonah Goldberg&quot;,&quot;copyright&quot;:&quot;The Dispatch&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}},{&quot;id&quot;:44,&quot;user_id&quot;:5849329,&quot;publication_id&quot;:24388,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:24388,&quot;name&quot;:&quot;The Remnant&quot;,&quot;subdomain&quot;:&quot;remnant&quot;,&quot;custom_domain&quot;:&quot;remnant.thedispatch.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Hosted by editor-in-chief Jonah Goldberg, the twice-weekly, hourlong podcast features one-on-one interviews. Jonah pushes his guests beyond talking points and platitudes to engage in deep, thoughtful, conversations about a variety of topics.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/883da02e-fdad-41ef-a459-6062b4e084ff_1280x1280.png&quot;,&quot;author_id&quot;:4350832,&quot;theme_var_background_pop&quot;:&quot;#2A3579&quot;,&quot;created_at&quot;:&quot;2019-12-27T17:20:58.110Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Jonah Goldberg&quot;,&quot;copyright&quot;:&quot;Jonah Goldberg&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}},{&quot;id&quot;:52,&quot;user_id&quot;:5849329,&quot;publication_id&quot;:25519,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:25519,&quot;name&quot;:&quot;The Morning Dispatch&quot;,&quot;subdomain&quot;:&quot;morningdispatch&quot;,&quot;custom_domain&quot;:&quot;morning.thedispatch.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;An essential daily news roundup, TMD includes a brief look at important stories of the day and original reporting and analysis from The Dispatch team, along with recommendations for deeper reading and some much-needed humor in these often fraught times.\n&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/57302133-5ec8-4099-b281-85497f19fa4e_146x146.png&quot;,&quot;author_id&quot;:8450245,&quot;theme_var_background_pop&quot;:&quot;#2A3579&quot;,&quot;created_at&quot;:&quot;2020-01-06T22:34:14.436Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;The Dispatch&quot;,&quot;copyright&quot;:&quot;The Dispatch&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}},{&quot;id&quot;:92,&quot;user_id&quot;:5849329,&quot;publication_id&quot;:25515,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:25515,&quot;name&quot;:&quot;Advisory Opinions&quot;,&quot;subdomain&quot;:&quot;advisoryopinions&quot;,&quot;custom_domain&quot;:&quot;advisoryopinions.thedispatch.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Hosted by Sarah Isgur and David French, two well-read and highly approachable Harvard Law graduates who discuss law, culture, religion, and society in a sober and elevated manner. \n&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/06d1e4a7-4e41-4302-a6d0-620bd0112490_1280x1280.png&quot;,&quot;author_id&quot;:8553684,&quot;theme_var_background_pop&quot;:&quot;#2A3579&quot;,&quot;created_at&quot;:&quot;2020-01-06T22:14:22.410Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:null,&quot;copyright&quot;:&quot;David French&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}},{&quot;id&quot;:1117,&quot;user_id&quot;:5849329,&quot;publication_id&quot;:27013,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:27013,&quot;name&quot;:&quot;The Dispatch Podcast&quot;,&quot;subdomain&quot;:&quot;dispatchpodcast&quot;,&quot;custom_domain&quot;:&quot;podcast.thedispatch.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Hosted by Sarah Isgur&#8212;with a roundtable featuring David French, Jonah Goldberg and Steve Hayes&#8212;The Dispatch Podcast is a weekly discussion of news and current events that sets aside the trivial and the mundane in favor of substantive conversation.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/b0aa97af-fbae-4e8d-8272-ddfe5eb17910_1280x1280.png&quot;,&quot;author_id&quot;:8450245,&quot;theme_var_background_pop&quot;:&quot;#2A3579&quot;,&quot;created_at&quot;:&quot;2020-01-18T00:53:42.741Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;The Dispatch Podcast&quot;,&quot;copyright&quot;:&quot;The Dispatch&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}}],&quot;is_guest&quot;:false},{&quot;id&quot;:4006958,&quot;name&quot;:&quot;Steve Hayes&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/ab81ae58-db74-4f80-8137-8d3dbd3bfdca_400x400.jpeg&quot;,&quot;bio&quot;:&quot;CEO, co-founder, and editor of The Dispatch. He is also the author of two New York Times best sellers and a Fox News contributor.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-05-08T18:43:13.957Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:19,&quot;user_id&quot;:4006958,&quot;publication_id&quot;:21765,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:21765,&quot;name&quot;:&quot;The French Press&quot;,&quot;subdomain&quot;:&quot;frenchpress&quot;,&quot;custom_domain&quot;:&quot;frenchpress.thedispatch.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;The French Press is a newsletter published three times per week by David French, author, attorney, and Iraq veteran. French writes about law, politics, faith, culture, and the superiority of DC over Marvel.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/0587547a-6402-4559-9fb5-6da781bfd1aa_600x600.png&quot;,&quot;author_id&quot;:5849328,&quot;theme_var_background_pop&quot;:&quot;#2A3579&quot;,&quot;created_at&quot;:&quot;2019-11-19T00:26:35.409Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;David French&quot;,&quot;copyright&quot;:&quot;The Dispatch&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}},{&quot;id&quot;:28,&quot;user_id&quot;:4006958,&quot;publication_id&quot;:17819,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:17819,&quot;name&quot;:&quot;The G-File&quot;,&quot;subdomain&quot;:&quot;gfile&quot;,&quot;custom_domain&quot;:&quot;gfile.thedispatch.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Jonah Goldberg&#8217;s &#8220;news&#8221; letter built around his deep understanding of American history, his passion for conservative ideas and his, um, unique sensibility, it&#8217;s a must-read every Friday &#8211; and now with additional mid-week mini G-Files for members only.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/bf81c195-0d0e-42a1-83aa-681b469df07d_146x146.png&quot;,&quot;author_id&quot;:4350832,&quot;theme_var_background_pop&quot;:&quot;#2A3579&quot;,&quot;created_at&quot;:&quot;2019-09-23T22:22:29.767Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Jonah Goldberg&quot;,&quot;copyright&quot;:&quot;The Dispatch&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}},{&quot;id&quot;:1,&quot;user_id&quot;:4006958,&quot;publication_id&quot;:17455,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:17455,&quot;name&quot;:&quot;The Dispatch&quot;,&quot;subdomain&quot;:&quot;thedispatch&quot;,&quot;custom_domain&quot;:&quot;thedispatch.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Fact-based reporting and commentary on politics, policy and culture &#8211; informed by conservative principles&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/631ce259-4b95-4f90-928e-ccc471a9fb27_256x256.png&quot;,&quot;author_id&quot;:8450245,&quot;theme_var_background_pop&quot;:&quot;#2A3579&quot;,&quot;created_at&quot;:&quot;2019-09-16T20:59:42.820Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;The Dispatch&quot;,&quot;copyright&quot;:&quot;The Dispatch&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}},{&quot;id&quot;:10,&quot;user_id&quot;:4006958,&quot;publication_id&quot;:22063,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:22063,&quot;name&quot;:&quot;The Dispatch Fact Check&quot;,&quot;subdomain&quot;:&quot;factcheck&quot;,&quot;custom_domain&quot;:&quot;factcheck.thedispatch.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;With the frantic pace of the news-cycle and the ever-increasing flow of dubious information, we look carefully at claims from elected officials, reports from the media, and disinformation on social media to help you understand what&#8217;s true and what's not.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/38c02d6c-6fbb-4995-9926-edc2d0336b59_146x146.png&quot;,&quot;author_id&quot;:7365934,&quot;theme_var_background_pop&quot;:&quot;#2A3579&quot;,&quot;created_at&quot;:&quot;2019-11-22T17:17:27.776Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;The Dispatch Fact Check&quot;,&quot;copyright&quot;:&quot;The Dispatch&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}},{&quot;id&quot;:38,&quot;user_id&quot;:4006958,&quot;publication_id&quot;:24388,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:24388,&quot;name&quot;:&quot;The Remnant&quot;,&quot;subdomain&quot;:&quot;remnant&quot;,&quot;custom_domain&quot;:&quot;remnant.thedispatch.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Hosted by editor-in-chief Jonah Goldberg, the twice-weekly, hourlong podcast features one-on-one interviews. Jonah pushes his guests beyond talking points and platitudes to engage in deep, thoughtful, conversations about a variety of topics.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/883da02e-fdad-41ef-a459-6062b4e084ff_1280x1280.png&quot;,&quot;author_id&quot;:4350832,&quot;theme_var_background_pop&quot;:&quot;#2A3579&quot;,&quot;created_at&quot;:&quot;2019-12-27T17:20:58.110Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Jonah Goldberg&quot;,&quot;copyright&quot;:&quot;Jonah Goldberg&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}},{&quot;id&quot;:47,&quot;user_id&quot;:4006958,&quot;publication_id&quot;:25519,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:25519,&quot;name&quot;:&quot;The Morning Dispatch&quot;,&quot;subdomain&quot;:&quot;morningdispatch&quot;,&quot;custom_domain&quot;:&quot;morning.thedispatch.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;An essential daily news roundup, TMD includes a brief look at important stories of the day and original reporting and analysis from The Dispatch team, along with recommendations for deeper reading and some much-needed humor in these often fraught times.\n&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/57302133-5ec8-4099-b281-85497f19fa4e_146x146.png&quot;,&quot;author_id&quot;:8450245,&quot;theme_var_background_pop&quot;:&quot;#2A3579&quot;,&quot;created_at&quot;:&quot;2020-01-06T22:34:14.436Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;The Dispatch&quot;,&quot;copyright&quot;:&quot;The Dispatch&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}},{&quot;id&quot;:1062,&quot;user_id&quot;:4006958,&quot;publication_id&quot;:25537,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:25537,&quot;name&quot;:&quot;Vital Interests&quot;,&quot;subdomain&quot;:&quot;vitalinterests&quot;,&quot;custom_domain&quot;:&quot;vitalinterests.thedispatch.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Once each week, Thomas Joscelyn, who is sought out by the nation&#8217;s top foreign policy and national security policymakers, sends a deeply researched but highly readable analysis of American power on the world stage. &quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/d25e48f2-3c4b-41ed-a778-4ceafc965ac2_146x146.png&quot;,&quot;author_id&quot;:6021604,&quot;theme_var_background_pop&quot;:&quot;#2A3579&quot;,&quot;created_at&quot;:&quot;2020-01-07T00:54:44.080Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:null,&quot;copyright&quot;:&quot;The Dispatch&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}},{&quot;id&quot;:1063,&quot;user_id&quot;:4006958,&quot;publication_id&quot;:27013,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:27013,&quot;name&quot;:&quot;The Dispatch Podcast&quot;,&quot;subdomain&quot;:&quot;dispatchpodcast&quot;,&quot;custom_domain&quot;:&quot;podcast.thedispatch.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Hosted by Sarah Isgur&#8212;with a roundtable featuring David French, Jonah Goldberg and Steve Hayes&#8212;The Dispatch Podcast is a weekly discussion of news and current events that sets aside the trivial and the mundane in favor of substantive conversation.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/b0aa97af-fbae-4e8d-8272-ddfe5eb17910_1280x1280.png&quot;,&quot;author_id&quot;:8450245,&quot;theme_var_background_pop&quot;:&quot;#2A3579&quot;,&quot;created_at&quot;:&quot;2020-01-18T00:53:42.741Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;The Dispatch Podcast&quot;,&quot;copyright&quot;:&quot;The Dispatch&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}}],&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:false,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://podcast.thedispatch.com/p/ukraine-hit-by-cyberattacks?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!x-dz!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0aa97af-fbae-4e8d-8272-ddfe5eb17910_1280x1280.png"><span class="embedded-post-publication-name">The Dispatch Podcast</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Ukraine Hit By Cyberattacks</div></div><div class="embedded-post-body">Listen now (50 min) | Today on the podcast, Sarah and Steve are joined by Klon Kitchen, senior fellow at the American Enterprise Institute, to discuss the latest in Ukraine after the country was hit by cyberattacks. Plus, how much is the Republican Party&#8217;s foreign policy views changing? And what exactly can the Chinese government do with all that TikTok data&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">4 years ago &#183; 18 likes &#183; 22 comments &#183; Sarah Isgur and Steve Hayes</div></a></div><div><hr></div><h2>Drones &amp; Crypto May Feature in Ukraine Conflict</h2><p><strong>What&#8217;s New: </strong>Ukraine is turning to armed drones and cryptocurrency as it prepares to repel a possible Russian invasion. </p><p><strong>Why This Matters: </strong>Kyiv hopes armed drones will offset Moscow&#8217;s military advantages and Ukrainian resistance groups are crowd-funding their potential rebellion.</p><p><strong>Key Points:</strong></p><ul><li><p>Over the last year, Ukraine has employed armed drones &#8212; like the Turkish-made Bayraktar TB2 &#8212; to target Russian artillery and other forces, <a href="https://www.wsj.com/articles/ukraines-use-of-armed-drones-could-offset-some-of-russias-enormous-military-advantage-11644676305?st=rq647299a2apb1x&amp;reflink=desktopwebshare_twitter">according to the Wall Street Journal.</a> </p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://commons.wikimedia.org/wiki/File:Bayraktar_TB2_of_UAF,_2019,_02.jpg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oo_j!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ff809aee4-3fbd-40d8-b866-0862f20689a0_1200x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!oo_j!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ff809aee4-3fbd-40d8-b866-0862f20689a0_1200x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!oo_j!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ff809aee4-3fbd-40d8-b866-0862f20689a0_1200x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!oo_j!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ff809aee4-3fbd-40d8-b866-0862f20689a0_1200x800.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oo_j!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ff809aee4-3fbd-40d8-b866-0862f20689a0_1200x800.jpeg" width="1200" height="800" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/f809aee4-3fbd-40d8-b866-0862f20689a0_1200x800.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:800,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:80687,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://commons.wikimedia.org/wiki/File:Bayraktar_TB2_of_UAF,_2019,_02.jpg&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!oo_j!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ff809aee4-3fbd-40d8-b866-0862f20689a0_1200x800.jpeg 424w, https://substackcdn.com/image/fetch/$s_!oo_j!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ff809aee4-3fbd-40d8-b866-0862f20689a0_1200x800.jpeg 848w, https://substackcdn.com/image/fetch/$s_!oo_j!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ff809aee4-3fbd-40d8-b866-0862f20689a0_1200x800.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!oo_j!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Ff809aee4-3fbd-40d8-b866-0862f20689a0_1200x800.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">TB2 Drone (Source: Wikimedia Commons)</figcaption></figure></div><ul><li><p>The weapons have been effective enough to make Russia complain that the provision of these systems by NATO countries is a threat to Russia&#8217;s security. (boo-hoo)</p></li><li><p>The TB2 is popular around the world because it falls just short of American and other weapons export restrictions, but can still laser-designate targets from 12 miles away.</p></li></ul><blockquote><p>&#8220;Russian antiaircraft systems can&#8217;t see the TB2 at this distance,&#8221; said Yuriy Butusov, a Kyiv-based defense writer. &#8220;Ukraine has connected its camera to the battle management system and can observe at big distances with Russia being unable to take it down.&#8221;</p></blockquote><ul><li><p>Separately, cryptocurrency donations to Ukrainian militias and hackers opposing Russia spiked last year, <a href="https://www.wired.com/story/ukraine-russia-cryptocurrency-donations-hacktivism/">reports Wired.</a></p></li><li><p>According to crypto tracing and blockchain analysis firm Elliptic, &#8220;Crowdfunded payments to those organizations in bitcoin, litecoin, ether, and other cryptocurrencies the company tracks reached a total value of around $550,000 last year, compared with just $6,000 or so in 2020.&#8221;</p></li><li><p>One pro-Ukraine hacker collective &#8212; called the Ukrainian Cyber Alliance &#8212; has used more than $100K in crypto donations to conduct numerous hack-and-leak and web defacement ops. </p></li></ul><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>Drones won&#8217;t be decisive, but they&#8217;re good to have around.</strong> The TB2 isn&#8217;t that sophisticated and it certainly doesn&#8217;t offer Ukraine a military advantage over Russia&#8217;s larger, more modern, more lethal military. It can, however, be used to harass Putin&#8217;s army and to inject a little &#8220;friction&#8221; into its operations &#8212; and who knows what opportunities that might generate. </p></li><li><p><strong>Crypto crowdfunding will likely become normal from here on out.</strong> There are at least two reasons this trend is likely to continue: (1) global and social media are increasingly being used to raise awareness and support among populations far beyond the battlefield; (2) cryptocurrency payments aren&#8217;t necessarily illegal, are barely regulated, are easily transacted, and are increasingly easy to spend. It&#8217;s not hard to imagine freedom fighters and even terrorists groups (no, they are not the same) starting the equivalent of &#8220;go fund me&#8221; websites where supporters can make donations or even provide other material support, without ever needing to leave the couch.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-18-february-2022/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-18-february-2022/comments"><span>Leave a comment</span></a></p><div><hr></div><h2>Tech Dances as Legislation Advances</h2><p><strong>What&#8217;s New: </strong>Senators have passed the EARN IT Act out of the Judiciary Committee, adding it to a growing list of tech-focused legislation that could upend the industry. </p><p><strong>Why This Matters: </strong>While some of the largest tech companies have opposed the new measures, they have failed to address the grievances and concerns animating these bills and could soon be surprised by sweeping changes in how they do business.</p><p><strong>Key Points:</strong></p><ul><li><p><a href="https://www.congress.gov/bill/117th-congress/senate-bill/3538">EARN IT</a>, passed out of committee this week with no &#8220;no&#8221; votes, would constrain Section 230 protections for any company that fails to limit child exploitation materials.</p></li><li><p>The committee also recently passed the <a href="https://www.congress.gov/bill/117th-congress/senate-bill/2710/text?q=%7B%22search%22%3A%5B%22senate+app+stores%22%5D%7D&amp;r=1&amp;s=2">Open App Markets Act</a> &#8212; legislation that would force Apple and Google to fundamentally change their app business by allowing users to download apps outside of their stores and by giving app developers the freedom to use other in-app payment services. </p></li><li><p>Finally, last month, the committee passed the <a href="https://www.congress.gov/bill/117th-congress/senate-bill/2992">American Innovation and Choice Online Act</a> &#8212; a massive antitrust bill aimed squarely at breaking up and punishing &#8220;big tech&#8221; over their perceived political bias and &#8220;anti-competitive&#8221; behavior.</p></li></ul><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>I don&#8217;t like any of these bills, but that&#8217;s not really my point.</strong> I think EARN IT undermines encryption. I think Open Apps hurts cybersecurity. And I think Choice Online abandons principle and imperils national security. But all of that is for a different day. My main concern right now is how tech companies seem to be tuning their fiddles while lawmakers are gathering gasoline and matches.</p></li><li><p><strong>Many of these companies think they&#8217;re untouchable, but they&#8217;re wrong.</strong> For years, Apple, Google, and others have dared Congress to take meaningful action against them, betting that negative economic impacts and frustrated users in their states and districts would force lawmakers to fold. And they did &#8212; for a while. Those political dynamics, however, have changed and now there is broad, bipartisan consensus on doing something, anything, to take &#8220;big tech&#8221; down a few notches. This is why the steady march of anti-tech legislation is likely to continue and may even become law.</p></li><li><p><strong>Arrogance is gas on the fire.</strong> During debate on the Open App Markets Act, Apple and Google centered their arguments on the idea that, if forced to open devices to third-party app stores, they could no longer protect users&#8217; data because they could no longer guarantee the cybersecurity practices of third-party app developers. This is actually a valid and compelling argument in my view. The problem, however, is that at the exact same time they were making these arguments, both companies were distributing China&#8217;s My2022 Olympics app &#8212; an app that <a href="https://citizenlab.ca/2022/01/cross-country-exposure-analysis-my2022-olympics-app/">cybersecurity researchers said was harvesting troves of data, exposing communications, and enabling spying by the Chinese government.</a> Even after these concerns were raised, both app stores kept My2022 where it could be downloaded by Americans and millions of others. This decision, all by itself, decisively undermined these companies&#8217; complaints about the Open App Markets Act and explains how this bill passed out of committee with nary a whisper. Now maybe executives console themselves by reasoning that laws like these have advanced out of committee before but never advanced to a full floor vote or to the President&#8217;s desk, and therefore, there&#8217;s nothing to worry about. I&#8217;m here to tell you, that&#8217;s no longer a safe bet.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-18-february-2022/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-18-february-2022/comments"><span>Leave a comment</span></a></p><div><hr></div><h2>Iran Suspected in Red Cross Hack</h2><p><strong>What&#8217;s New: </strong>Last month, it was discovered that the personal information from more than 500K people was stolen from the International Committee for the Red Cross (ICRC), <a href="https://krebsonsecurity.com/2022/02/red-cross-hack-linked-to-iranian-influence-operation/">according to Krebs on Security</a>.</p><p><strong>Why This Matters: </strong>Forensic evidence suggest the hack was done by Iranian operatives and is tied to a large influence operation.</p><p><strong>Key Points:</strong></p><ul><li><p>The intrusion occurred last November and resulted in the loss of data associated with half a million people receiving aid from the non-profit organization. </p></li><li><p>Part of the evidence tying the attack to Iran includes an email that was used to offer the stolen data to would-be buyers, that the FBI says is linked to an ongoing Iranian government influence effort.</p></li><li><p>That same email was used to purchase and register several domains associated with the Liberty Front Press, a network of fake news sites assessed to be run out of Iran.</p></li></ul><blockquote><p>&#8220;Right now,&#8221; <a href="https://www.icrc.org/en/document/cyber-attack-icrc-what-we-know">says an ICRC statement</a>, &#8220;we do not have any conclusive evidence that this information from the data breach has been published or is being traded. Our cybersecurity team has looked into any reported allegation of data being available on the dark web.&#8221;</p></blockquote><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>Liberty Front Press is not new.</strong> <a href="https://www.cyberscoop.com/more-domains-seized-iran-doj/">In 2020</a>, the U.S. Department of Justice took several actions against domains tied to Liberty Front Press and publicly accused Iran&#8217;s Islamic Revolutionary Guard Corps (IRGC) of using these domains for &#8220;covert influence.&#8221; Later that year, the U.S. Treasury Department sanctioned five Iran-linked organizations for spreading fake news and other efforts to sow discord in the U.S.</p></li><li><p><strong>It&#8217;s not clear why, but this hack had purpose.</strong> A lot of the details are still emerging and there&#8217;s quite a bit of confusion about aspects of the attack. But, there are reasons to believe this attack was sophisticated and targeted. (1) The bad guys used a set of tools that are often used by advance persistent threat groups (APTs) and that are not broadly available. (2) They were very skilled at hiding their tracks. (3) It looks like these black hats also designed some code that was tailor made for use on ICRC servers. (4) The attackers were very good at moving and removing files in a way that did not trip ICRC anti-malware and other security tools. So bottom line: this wasn&#8217;t random but we&#8217;re also not sure what the specific objectives of this operation were &#8212; stay tuned.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-18-february-2022/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-18-february-2022/comments"><span>Leave a comment</span></a></p><div><hr></div><h2>Let&#8217;s Get Visual</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.visualcapitalist.com/american-companies-that-failed-in-china/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-2p3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2414870e-779c-41b7-aeac-3be8c286e311_1200x1844.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-2p3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2414870e-779c-41b7-aeac-3be8c286e311_1200x1844.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-2p3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2414870e-779c-41b7-aeac-3be8c286e311_1200x1844.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-2p3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2414870e-779c-41b7-aeac-3be8c286e311_1200x1844.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-2p3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2414870e-779c-41b7-aeac-3be8c286e311_1200x1844.jpeg" width="1200" height="1844" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/2414870e-779c-41b7-aeac-3be8c286e311_1200x1844.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1844,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;American Companies That Failed in China&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:&quot;https://www.visualcapitalist.com/american-companies-that-failed-in-china/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="American Companies That Failed in China" title="American Companies That Failed in China" srcset="https://substackcdn.com/image/fetch/$s_!-2p3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2414870e-779c-41b7-aeac-3be8c286e311_1200x1844.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-2p3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2414870e-779c-41b7-aeac-3be8c286e311_1200x1844.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-2p3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2414870e-779c-41b7-aeac-3be8c286e311_1200x1844.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-2p3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2414870e-779c-41b7-aeac-3be8c286e311_1200x1844.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Visual Capitalist</figcaption></figure></div><div><hr></div><h2>Nerd Humor</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://twitter.com/nycartoons/status/1492521405564559361?s=20&amp;t=ipWm3NZlqZCkIrBcKMexcA" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!au8Y!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F263ebb41-6fda-40a8-a57a-10a6ff5af0fd_640x640.jpeg 424w, https://substackcdn.com/image/fetch/$s_!au8Y!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F263ebb41-6fda-40a8-a57a-10a6ff5af0fd_640x640.jpeg 848w, https://substackcdn.com/image/fetch/$s_!au8Y!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F263ebb41-6fda-40a8-a57a-10a6ff5af0fd_640x640.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!au8Y!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F263ebb41-6fda-40a8-a57a-10a6ff5af0fd_640x640.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!au8Y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F263ebb41-6fda-40a8-a57a-10a6ff5af0fd_640x640.jpeg" width="640" height="640" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/263ebb41-6fda-40a8-a57a-10a6ff5af0fd_640x640.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:640,&quot;width&quot;:640,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:&quot;https://twitter.com/nycartoons/status/1492521405564559361?s=20&amp;t=ipWm3NZlqZCkIrBcKMexcA&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Image" title="Image" srcset="https://substackcdn.com/image/fetch/$s_!au8Y!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F263ebb41-6fda-40a8-a57a-10a6ff5af0fd_640x640.jpeg 424w, https://substackcdn.com/image/fetch/$s_!au8Y!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F263ebb41-6fda-40a8-a57a-10a6ff5af0fd_640x640.jpeg 848w, https://substackcdn.com/image/fetch/$s_!au8Y!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F263ebb41-6fda-40a8-a57a-10a6ff5af0fd_640x640.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!au8Y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F263ebb41-6fda-40a8-a57a-10a6ff5af0fd_640x640.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: New Yorker Cartoons (Twitter)</figcaption></figure></div><div><hr></div><h2>Quick Clicks</h2><ul><li><p><a href="https://www.defenseone.com/technology/2022/02/ai-could-match-fingerprints-texts-their-authors-under-new-intelligence-program/361893/">New INTEL program has AI match texts to authors</a></p></li><li><p><a href="https://www.wired.com/story/irs-drops-facial-recognition-verification/">IRS drops facial recognition program</a></p></li><li><p><a href="https://www.nytimes.com/2022/02/16/technology/google-android-privacy.html">Google plans privacy changes</a></p></li><li><p><a href="https://www.wsj.com/articles/alibaba-tencent-e-commerce-sites-tagged-by-u-s-for-counterfeit-sales-11645113638?mod=rss_Technology">Alibaba, Tencent tagged by U.S. for counterfeit sales</a></p></li><li><p><a href="https://www.wsj.com/articles/indian-tax-authorities-raid-chinas-huawei-triggering-protest-from-beijing-11645106287?mod=rss_Technology">Indian tax authorities raid Huawei offices</a></p></li></ul><div><hr></div><p><em>That&#8217;s it for this Friday Brief. Thanks for reading, and if you think someone else would like this newsletter, please share it with your friends and followers. Have a great weekend!</em></p>]]></content:encoded></item><item><title><![CDATA[Friday Brief for 11 February 2022]]></title><description><![CDATA[News Corp. gets hacked; Defense contractors struggle with cybersecurity standards; and Skydio wins Army's drone contract]]></description><link>https://www.thekitchensync.tech/p/friday-brief-for-11-february-2022</link><guid isPermaLink="false">https://www.thekitchensync.tech/p/friday-brief-for-11-february-2022</guid><dc:creator><![CDATA[Klon Kitchen]]></dc:creator><pubDate>Fri, 11 Feb 2022 11:00:43 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/48469782/788cddadb71b33dccc79399c0d279074.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Uh2b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 424w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 848w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1272w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png" width="737" height="121.605" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:165,&quot;width&quot;:1000,&quot;resizeWidth&quot;:737,&quot;bytes&quot;:12912,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 424w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 848w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1272w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><div><hr></div><h4>Tech Terms</h4><blockquote><p><strong><a href="https://techterms.com/definition/sideload">Sideload</a> &#8212; </strong>The standard way to install an app on an <strong><a href="https://techterms.com/definition/ios">iOS</a></strong> or <strong><a href="https://techterms.com/definition/android">Android</a></strong> device is to download it from Apple's App Store or Google's Play Store. Sideloading an app bypasses the app store, installing the app directly from a local device.</p></blockquote><div><hr></div><h2>***Heads Up***</h2><p>Yesterday, I responded to <a href="https://www.nytimes.com/2022/02/05/opinion/republicans-national-conservatives-hawks.html">this essay</a> in the New York Times. You can read it by clicking the &#8220;card&#8221; below.</p><blockquote><p><em>Restraint advocates, and particularly those on the &#8220;new right,&#8221; speak eloquently of a United States awash in freedom and resources, but never explain how they intend to rid us of the inescapable foreign commitments and actions necessary to secure this domestic prosperity and tranquility.</em></p></blockquote><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:48503914,&quot;url&quot;:&quot;https://thedispatch.com/p/the-oldand-incoherentforeign-policy&quot;,&quot;publication_id&quot;:17455,&quot;publication_name&quot;:&quot;The Dispatch&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/631ce259-4b95-4f90-928e-ccc471a9fb27_256x256.png&quot;,&quot;title&quot;:&quot;The Old&#8212;and Incoherent&#8212;Foreign Policy of the New Right&quot;,&quot;truncated_body_text&quot;:&quot;Last week, &#8220;national conservatives&#8221; Sohrab Ahmari, Patrick Deneen, and Gladden Pappin published a guest essay in the New York Times titled &#8220;Hawks Are Standing in the Way of a New Republican Party.&#8221; I have read this art&#8230;&quot;,&quot;date&quot;:&quot;2022-02-10T11:21:25.749Z&quot;,&quot;like_count&quot;:27,&quot;comment_count&quot;:14,&quot;bylines&quot;:[{&quot;id&quot;:51357445,&quot;name&quot;:&quot;Klon Kitchen&quot;,&quot;photo_url&quot;:null,&quot;bio&quot;:&quot;Klon Kitchen is a senior fellow at the American Enterprise Institute, a former national security adviser to Sen. Ben Sasse (R-Neb.), and a 15-year veteran of the United States Intelligence Community. Read his weekly technology and national security newsletter at thekitchensync.techand follow him on Twitter @klonkitchen.&quot;,&quot;profile_set_up_at&quot;:null,&quot;is_guest&quot;:true}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:false,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://thedispatch.com/p/the-oldand-incoherentforeign-policy?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!ZdOs!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F631ce259-4b95-4f90-928e-ccc471a9fb27_256x256.png"><span class="embedded-post-publication-name">The Dispatch</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">The Old&#8212;and Incoherent&#8212;Foreign Policy of the New Right</div></div><div class="embedded-post-body">Last week, &#8220;national conservatives&#8221; Sohrab Ahmari, Patrick Deneen, and Gladden Pappin published a guest essay in the New York Times titled &#8220;Hawks Are Standing in the Way of a New Republican Party.&#8221; I have read this art&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">4 years ago &#183; 27 likes &#183; 14 comments &#183; Klon Kitchen</div></a></div><div><hr></div><h2>News Corp. Hit by Cyberattack</h2><p><strong>What&#8217;s New: </strong>The American media and publishing company, News Corp., disclosed that it has been breached by suspected China-based hackers, according to <a href="https://www.wsj.com/articles/cyberattack-on-news-corp-believed-linked-to-china-targeted-emails-of-journalists-others-11643979328">the Wall Street Journal</a>. </p><p><strong>Why This Matters: </strong>News Corp. is massive and its assets include Dow Jones &amp; Company (publisher of the Wall Street Journal), News UK (publisher of The Sun and The Times), News Corp Australia, REA Group, Realtor.com, and HarperCollins.</p><p><strong>Key Points:</strong></p><ul><li><p>The breach was discovered on January 20th, but is now suspected to go back at least until February 2020.</p></li><li><p>News Corp. says it immediately notified law enforcement and then hired the Mandiant Inc. cybersecurity firm.</p></li></ul><blockquote><p>&#8220;Mandiant assesses that those behind this activity have a China nexus, and we believe they are likely involved in espionage activities to collect intelligence to benefit China&#8217;s interests,&#8221; said David Wong, vice president of incident response at Mandiant.</p></blockquote><ul><li><p>A spokesman for the Chinese Embassy, Liu Pengyu, said, &#8220;We hope that there can be a professional, responsible and evidence-based approach to identifying cyber-related incidents, rather than making allegations based on speculations.&#8221;</p></li><li><p>While the scope of the breach is still being determined, The Wall Street Journal quotes people briefed on the matter as confirming that the attackers gained access to reporters&#8217; draft articles, emails, and other data.</p></li></ul><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>Two years is a very long time.</strong> In cybersecurity, the time between when a breach occurs and when it is discovered is called the Breach Detection Gap (BDG) or dwell time. Over the last several years the average BDG has dropped significantly, with a current average of 146 days, <a href="https://www.fireeye.com/company/press-releases/2016/fireeye-releases-first-mandiant-mtrends-emea-report.html">according to FireEye</a>, while the <a href="https://www.ibm.com/au-en/security/data-breach">average cost of a data breach has risen to a 17-year-high of $4.2million</a>. The fact that this breach extends to more than 700 days means we&#8217;re looking at an attack with very large implications &#8212; most of which aren&#8217;t even known yet. Also, once a sophisticated attacker gains access to a victim&#8217;s network, they move &#8220;laterally&#8221; through that network while also &#8220;escalating&#8221; their &#8220;privileges&#8221; (i.e., expanding their access to the network, often by stealing the credentials of users with broad permissions). Counterintuitively, as an attacker expands their presence on a network &#8212; if they&#8217;re careful &#8212; they can hide their activity better by understanding and avoiding security measures and by masking their activities to look more like normal network traffic. This is why, according to <a href="https://www.computerworlduk.com/security/most-data-breaches-still-discovered-by-third-parties-3615783/">Trustwave</a>, 81% of &#8220;reported intrusions are not detected by internal security processes but rather by news reports, law enforcement notifications, or external fraud monitoring.&#8221;</p></li><li><p><strong>News Corp. is a sweet target.</strong> One of the best ways to maximize limited intelligence gathering resources is to choose targets with the most &#8220;bang for the buck&#8221; &#8212; and boy, this media conglomerate offers a lot of bang. Think about it: by popping News Corp. you get access, not only to all of their published materials, but also all of their unpublished research on virtually every news-worthy topic you can imagine. You get reporters&#8217; notes, sources, ideas, etc. You get their private communications from around the world as they report on world leaders, business tycoons, human rights advocates, and the foreign press. The attackers even get a detailed understanding of how a story is generated, reported, and published &#8212; giving them even more insight into how they can shape and manipulate this process for their own purposes. Now put this capability in the hands of the Chinese government&#8217;s hacking enterprise, an enterprise the <a href="https://www.fbi.gov/news/speeches/countering-threats-posed-by-the-chinese-government-inside-the-us-wray-013122">FBI Director says</a> is &#8220;bigger than those of every other major nation combined,&#8221; and you&#8217;ve got yourself a real problem.</p></li><li><p><strong>I&#8217;m concerned about a looming cyber shrug.</strong> This is just one of the many, many cybersecurity incidents that are reported every day. Even for me, the unrelenting drumbeat of just the truly huge data breaches threatens to recede into the background as a low-level &#8220;hum,&#8221; because no one can keep up with them all and no one should have to be on high alert all of the time. But, just because these attacks are familiar doesn&#8217;t mean they are no big deal. Our national cybersecurity has been a hot topic for policymakers for the last several months but I&#8217;m concerned that, in the face of what feels like an overwhelming challenge and no clear way forward strategically, political will and attention will ebb away. And then one day, our enemies will finally leverage the data, influence, and compromises they have amassed and we&#8217;ll have nothing left to do but pick up the pieces. This is why Congress needs a select committee on cybersecurity &#8212; to keep policymakers&#8217; eyes on the ball and to drive executive accountability. The threat couldn&#8217;t be any more clear and we shouldn&#8217;t shrug it off.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-11-february-2022/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-11-february-2022/comments"><span>Leave a comment</span></a></p><div><hr></div><h2>Pentagon Suppliers Struggling to Meet Cybersecurity Requirements</h2><p><strong>What&#8217;s New: </strong>Only one in four defense contractors are in compliance with the Department of Defense&#8217;s cybersecurity standards, <a href="https://csrc.nist.gov/publications/detail/sp/800-171/rev-2/final">according to the Defense Industrial Base Cybersecurity Assessment Center (DIBCAC)</a>. </p><p><strong>Why This Matters: </strong>The standards were originally designed to protect critical weapons systems from foreign hackers, but the Biden administration is planning to expand them to more than 200K companies across the defense supply chain.</p><p><strong>Key Points:</strong></p><ul><li><p>The Cybersecurity Maturity Model Certification (CMMC) was first announced in 2019 and seeks to formalize the cybersecurity assessment and reporting of critical defense contractors.</p></li><li><p>Before this, most defense industrial base cybersecurity assessments were based on a self-assessment and a report against <a href="https://en.wikipedia.org/w/index.php?title=NIST_SP-800-171&amp;action=edit&amp;redlink=1">NIST SP-800-171</a> standards.</p></li><li><p>According to the DIBCAC Director Mr. John Ellis, however, three-quarters of the 220 contractors that have been assessed by the Pentagon have failed to meet these baselines and are now operating under &#8220;special agreements.&#8221; </p></li></ul><blockquote><p>&#8220;It is clear that a very large number of companies have a very great deal of work to do&#8221; to meet the CMMC standards, <a href="https://readme.security/thousands-of-pentagon-contractors-could-buckle-under-cybersecurity-push-a034ff75d314">said Robert Metzger</a>, an attorney and former member of the Defense Science Board Task Force on Cyber Supply Chain.</p></blockquote><ul><li><p>Despite these failures, the White House continues to expand the rollout of these standards to the entire defense industrial base over the next few years.</p></li></ul><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>The CMMC is a good idea, but it was always going to be painful.</strong> Having a set of common, verifiable cybersecurity standards for the folks who build the stuff we need to fight and win wars is obviously important and not too much to ask from defense contractors. That said, suppliers are not wrong when they complain that some of the CMMC&#8217;s 110 requirements are unclear, expensive, and can even be unfair. Further, we&#8217;re talking about an industrial base of more than 200K companies <a href="https://www.mordorintelligence.com/industry-reports/us-aerospace-and-defense-market">worth more than $500 billion</a>. This means the government is trying to wrangle and shape a massive challenge and it was never going to be easy.</p></li><li><p><strong>The best we can do is just keep at it.</strong> Implementing the CMMC is going to take time and patience &#8212; but it&#8217;s worth it. Expanding the CMMC will require even more time and patience &#8212; but this too will be worth it. Even if these efforts take decades (and they likely will), the nation will be better off than we were just a few years ago. So everyone needs to settle in, get comfortable, and get after it. Eventually, we&#8217;ll need to think about how to turn the screw on companies who aren&#8217;t coming into compliance quickly enough. But I suspect now is largely the time for carrots, not sticks.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-11-february-2022/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-11-february-2022/comments"><span>Leave a comment</span></a></p><div><hr></div><h2>Skydio&#8217;s Win is a Good Sign</h2><p><strong>What&#8217;s New: </strong>The Army has chosen U.S. drone maker Skydio for its Short Range Reconnaissance (SRR) Program of Record, <a href="https://www.skydio.com/blog/skydio-selected-sole-platform-for-us-army-srr/">according to a company press release</a>. </p><p><strong>Why This Matters: </strong>The contract has a base year value of $20 million and could be worth nearly $100 million over five years &#8212; constituting one of the most significant DoD contracts with an agile, non-traditional defense contractor out of Silicon Valley.</p><p><strong>Key Points:</strong></p><ul><li><p>The Army teamed up with the Defense Innovation Unit to review more than 30 unmanned reconnaissance and surveillance proposals. </p></li><li><p>Skydio&#8217;s X2D was selected based on &#8220;soldier feedback and design review packages intended to assess the overall product performance, quality, and production readiness.&#8221;</p></li></ul><blockquote><p>&#8220;With the SRR program, our soldiers will now have access to the most advanced capabilities in the world in this class," said Skydio CEO, Adam Bry. "Skydio drones deliver unparalleled situational awareness and ease of use in the most demanding situations thanks to Skydio Autonomy.&#8221;</p></blockquote><p>Here&#8217;s a quick video of a Skydio drone in action:</p><div id="youtube2-IOi1Dusp2Wc" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;IOi1Dusp2Wc&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/IOi1Dusp2Wc?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>Full disclosure: I know and like these folks.</strong> I&#8217;ve had the opportunity to spend time with Adam and his team and they are really impressive. </p></li><li><p><strong>Their kit really works.</strong> There are lots of drone companies out there but Skydio is known for its autonomous AI, which allows their platforms to avoid objects, fly routes, map objects, and complete other tasks with minimal effort from a human pilot. They won this contract for a reason.</p></li><li><p><strong>I&#8217;m encouraged by what this could mean.</strong> I&#8217;ve long said that one of the key challenges to incorporating non-traditional defense contractors into Pentagon acquisitions is the infrequency with which DoD awards these companies with real programs of record. Typically, &#8220;start-ups&#8221; like Skydio will only get proof-of-concept or other limited funding that also comes with a lot strings that can make doing business with the military difficult or even impossible. Over the last several years, the government has evolved its authorities and processes to be more agile and, I hope, we&#8217;ll be seeing more of these contracts very soon.</p></li></ul><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://twitter.com/anduriltech/status/1491487618156175360?s=20&amp;t=aauRdkwRfXxvEwanNWn2wA&quot;,&quot;full_text&quot;:&quot;Awesome to see <span class=\&quot;tweet-fake-link\&quot;>@DeptofDefense</span> looking to innovative companies to solve their problems and rewarding the best with large contracts. Congratulations to <span class=\&quot;tweet-fake-link\&quot;>@SkydioHQ</span> &quot;,&quot;username&quot;:&quot;anduriltech&quot;,&quot;name&quot;:&quot;Anduril Industries&quot;,&quot;profile_image_url&quot;:&quot;&quot;,&quot;date&quot;:&quot;Wed Feb 09 19:02:13 +0000 2022&quot;,&quot;photos&quot;:[],&quot;quoted_tweet&quot;:{&quot;full_text&quot;:&quot;The Skydio team is proud to announce our selection as the sole platform for the US Army Short Range Reconnaissance (SRR) program. https://t.co/qGZdV0vQY8&quot;,&quot;username&quot;:&quot;SkydioHQ&quot;,&quot;name&quot;:&quot;Skydio&quot;},&quot;reply_count&quot;:0,&quot;retweet_count&quot;:7,&quot;like_count&quot;:73,&quot;impression_count&quot;:0,&quot;expanded_url&quot;:{},&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-11-february-2022/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-11-february-2022/comments"><span>Leave a comment</span></a></p><div><hr></div><h2>Let&#8217;s Get Visual: <strong>Using Planets to Visualize the Speed of Light</strong></h2><div id="vimeo-671329010" class="vimeo-wrap" data-attrs="{&quot;videoId&quot;:&quot;671329010&quot;,&quot;videoKey&quot;:&quot;&quot;,&quot;belowTheFold&quot;:true}" data-component-name="VimeoToDOM"><div class="vimeo-inner"><iframe src="https://player.vimeo.com/video/671329010?autoplay=0" frameborder="0" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" loading="lazy"></iframe></div></div><p>From <a href="https://www.visualcapitalist.com/cp/using-planets-to-visualize-the-speed-of-light/">The Visual Capitalist</a>: </p><blockquote><p>We often come across the term &#8220;light-year&#8221; in the context of space travel. But what does it actually mean?</p><p>A light-year is the distance light travels in one year. At a speed of <strong>186,000 miles/sec</strong> (300,000km/sec), light travels 5.88 trillion miles (9.46 trillion km) in a year&#8212;a distance well beyond immediate comprehension.</p><p>Scientists created the term light-year to measure astronomical distances beyond the confines of the Earth. And in the vastness of space, light photons, which can go around the Earth <a href="https://www.visualcapitalist.com/visualizing-the-speed-of-light-fast-but-slow/">7.5 times</a> in just one second, seem slow.</p><p>The above animation from planetary scientist <a href="https://www.youtube.com/channel/UCSaCQr2ppyNUY_kjnWY1yVQ">Dr.James O&#8217;Donoghue</a> helps put the speed of light into a broader perspective while highlighting the vast distances between celestial bodies.</p></blockquote><div><hr></div><h2>Nerd Humor</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://twitter.com/nycartoons/status/1491049233138470920?s=20&amp;t=OrnKJ2EAGQPenzNrNP8POw" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eMEd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35198ee-28c7-45ba-bde0-ed6e3d20a875_680x579.jpeg 424w, https://substackcdn.com/image/fetch/$s_!eMEd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35198ee-28c7-45ba-bde0-ed6e3d20a875_680x579.jpeg 848w, https://substackcdn.com/image/fetch/$s_!eMEd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35198ee-28c7-45ba-bde0-ed6e3d20a875_680x579.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!eMEd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35198ee-28c7-45ba-bde0-ed6e3d20a875_680x579.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eMEd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35198ee-28c7-45ba-bde0-ed6e3d20a875_680x579.jpeg" width="680" height="579" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/d35198ee-28c7-45ba-bde0-ed6e3d20a875_680x579.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:579,&quot;width&quot;:680,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:&quot;https://twitter.com/nycartoons/status/1491049233138470920?s=20&amp;t=OrnKJ2EAGQPenzNrNP8POw&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Image" title="Image" srcset="https://substackcdn.com/image/fetch/$s_!eMEd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35198ee-28c7-45ba-bde0-ed6e3d20a875_680x579.jpeg 424w, https://substackcdn.com/image/fetch/$s_!eMEd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35198ee-28c7-45ba-bde0-ed6e3d20a875_680x579.jpeg 848w, https://substackcdn.com/image/fetch/$s_!eMEd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35198ee-28c7-45ba-bde0-ed6e3d20a875_680x579.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!eMEd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35198ee-28c7-45ba-bde0-ed6e3d20a875_680x579.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: New Yorker Cartoons (Twitter)</figcaption></figure></div><div><hr></div><h2>Quick Clicks</h2><ul><li><p><a href="https://www.nytimes.com/article/elon-musk-starship.html">What is Starship? SpaceX builds its next-gen rocket</a></p></li><li><p><a href="https://www.ft.com/content/59c0d5f9-ed6a-4de6-a997-f25faed58833?shareType=nongift">Softbank sale of Arm chip group to Nvidia falls through</a></p></li><li><p><a href="https://asia.nikkei.com/Business/Tech/Semiconductors/South-Korea-to-track-travel-by-chip-engineers-as-tech-leaks-grow">Seoul is tracking the travel of its chip engineers</a></p></li><li><p><a href="https://www.defenseone.com/threats/2022/02/navy-puts-ai-unmanned-systems-test-five-sea-60-nation-exercise/361568/">Navy tests AI, unmanned systems in five sea, 60 nation exercise</a></p></li><li><p><a href="https://www.zdnet.com/article/4-4-million-stolen-in-attack-on-blockchain-infrastructure-meter/">$4.4 million stolen in blockchain infrastructure attack</a></p></li></ul><div><hr></div><p><em>That&#8217;s it for this Friday Brief. Thanks for reading, and if you think someone else would like this newsletter, please share it with your friends and followers. Have a great weekend!</em></p>]]></content:encoded></item><item><title><![CDATA[Friday Brief for 4 February 2022]]></title><link>https://www.thekitchensync.tech/p/friday-brief-for-4-february-2022</link><guid isPermaLink="false">https://www.thekitchensync.tech/p/friday-brief-for-4-february-2022</guid><dc:creator><![CDATA[Klon Kitchen]]></dc:creator><pubDate>Fri, 04 Feb 2022 11:00:42 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/48051441/5e6579aa960884cf305d08392f168a26.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Uh2b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 424w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 848w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1272w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png" width="737" height="121.605" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:165,&quot;width&quot;:1000,&quot;resizeWidth&quot;:737,&quot;bytes&quot;:12912,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 424w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 848w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1272w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><div><hr></div><h4>Tech Terms</h4><blockquote><p><strong>Transformer &#8212; </strong>A transformer is a <a href="https://en.wikipedia.org/wiki/Deep_learning" title="Deep learning">deep learning</a> model that adopts the mechanism of <a href="https://en.wikipedia.org/wiki/Attention_(machine_learning)" title="Attention (machine learning)">self-attention</a>, differentially weighting the significance of each part of the input data. It is used primarily in the field of <a href="https://en.wikipedia.org/wiki/Natural_language_processing" title="Natural language processing">natural language processing</a> (NLP) and in <a href="https://en.wikipedia.org/wiki/Computer_vision" title="Computer vision">computer vision</a> (CV).</p></blockquote><div><hr></div><h2>FBI Director is Trying to Make a Point</h2><p><strong>What&#8217;s New: </strong>FBI Director Christopher Wray gave a speech this week on <a href="https://www.fbi.gov/news/speeches/countering-threats-posed-by-the-chinese-government-inside-the-us-wray-013122">&#8220;Countering Threats Posed by the Chinese Government Inside the U.S.&#8221;</a></p><p><strong>Why This Matters: </strong>Wray gave a <a href="https://www.hudson.org/research/16201-transcript-the-threat-posed-by-the-chinese-government-and-the-chinese-communist-party-to-the-economic-and-national-security-of-the-united-states">similarly pointed speech in 2020</a> and his other public comments since have had a consistent message &#8212; the United States has a China problem that it cannot ignore.</p><p><strong>Key Points:</strong></p><ul><li><p>On Monday, Wray spoke at the Ronald Reagan Presidential Library and Museum in Simi Valley, CA and was unambiguous in his analysis.</p></li></ul><blockquote><p>[The threat from China has] &#8220;reached a new level&#8212;more brazen, more damaging than ever before, and it&#8217;s vital&#8212;vital&#8212;that all of us focus on that threat together,&#8221; said Wray. &#8220;When we tally up what we see in our investigations&#8212;over 2,000 of which are focused on the Chinese government trying to steal our information and technology&#8212;there is just no country that presents a broader threat to our ideas, our innovation, and our economic security than China.&#8221;</p></blockquote><ul><li><p>The Director makes clear that the challenge is broad in scope and complex in sophistication.</p></li></ul><blockquote><p>&#8220;What makes the Chinese government&#8217;s strategy so insidious is the way it exploits multiple avenues at once, often in seemingly innocuous ways &#8230; They unleash a massive, sophisticated hacking program that is bigger than those of every other major nation combined. Operating from pretty much every major city in China, with a lot of funding and sophisticated tools, and often joining forces with cyber criminals &#8230; At the same time, the Chinese government uses intelligence officers to target the same information, multiplying their efforts by working extensively through scores of so-called co-optees. Basically, people who aren&#8217;t technically Chinese government officials but who assist in their intelligence operations&#8212;spotting and assessing sources, providing cover, communications, and helping steal secrets in other ways. The Chinese government also makes investments and partnerships to position their proxies to take valuable technology.&#8221;</p></blockquote><ul><li><p>But it&#8217;s about more than just hacking and IP theft.</p></li></ul><blockquote><p>&#8220;The Chinese government is increasingly targeting people inside the U.S. for personal and political retribution&#8212;undercutting the freedoms that our Constitution and laws promise &#8230; Over the past eight years, the Chinese government has hauled home more than 9,000 people worldwide, bringing them back to China, where they can be imprisoned or controlled &#8230; Currently, there are hundreds of people on U.S. soil who are on the Chinese government&#8217;s official Fox Hunt<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> list and a whole lot more that are not on the official list. And most of the targets are green card holders, naturalized citizens&#8212;folks with important rights and protections under U.S. law.&#8221;</p></blockquote><ul><li><p>Wray closes with an optimistic note and a promise.</p></li></ul><blockquote><p>&#8220;All of us in America&#8212;and across the free world&#8212;are in this together. And as President Reagan said in his inaugural address, &#8220;No arsenal or no weapon in the arsenals of the world is so formidable as the will and moral courage of free men and women.&#8221; And I have been heartened to see that recognition take hold, to watch and help our partners gird for the long, important fight now underway. And everyone involved in that fight can be certain that you will have no more committed partner than the FBI.&#8221;</p></blockquote><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>No need to beat a dead horse (but somebody hand me a stick).</strong> My views on the Chinese Communist Party are well known and I don&#8217;t need to belabor this story with repetitive commentary. That said, I want to underscore (again) the scale of this challenge because Wray&#8217;s speech has this squarely in view. The United States&#8217; policy towards China continues to be convoluted and, at times, contradicting. If Chinese theft of data and IP is as big of a threat as Wray says &#8212; and it is &#8212; then we need a foreign policy that punishes Beijing for this theft and complementary domestic policies that actually protect against it. If the CCP hacking campaign is &#8220;bigger than those of every other major nation combined,&#8221; then we need to have a comprehensive national cybersecurity strategy that is actually being implemented and a coherent overarching policy for dealing with all Chinese companies in the U.S. market &#8212; every one of which is subject to CCP law and coercion. Finally, if there is &#8220;no country that presents a broader threat to our ideas, our innovation, and our economic security than China,&#8221; then we have to crack down on U.S. outbound investments that are enabling China&#8217;s technological rise and its ability to imperil our citizens and interests. The Biden administration needs to remember that China is a strategic opponent on the world stage &#8212; one with a defined and hostile ideology, with a comprehensive plan for leveraging its national power to constrain our own, and with real resources for implementing this plan. The discreet efforts of the FBI are laudable and necessary. But they&#8217;re not sufficient. </p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-4-february-2022/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-4-february-2022/comments"><span>Leave a comment</span></a></p><div><hr></div><h2>A Hacker Hacks the Hermit Kingdom </h2><p><strong>What&#8217;s New: </strong>A lone hacker reportedly took down North Korea&#8217;s internet, <a href="https://www.wired.com/story/north-korea-hacker-internet-outage/">according to Wired</a>. </p><p><strong>Why This Matters: </strong>The story illustrates how, even in a world of powerful state actors, individual actors can have outsized geopolitical influence.</p><p><strong>Key Points:</strong></p><ul><li><p>Recently, almost all of North Korea&#8217;s websites (only a few dozen) have experienced intermittent service problems &#8212; with at least one of the country&#8217;s central networks being completely incapable of connecting to the global internet.</p></li><li><p>Some believed this was the work of the United States or another nation in response to Pyongyang&#8217;s recent missile tests.</p></li><li><p>Wired reports, however, that the takedown is the work of P4x, an independent hacker who was himself hacked by North Korea just over one year ago.</p></li></ul><blockquote><p>&#8220;It felt like the right thing to do here. If they don&#8217;t see we have teeth, it&#8217;s just going to keep coming,&#8221; says the hacker. (P4x spoke to WIRED and shared screen recordings to verify his responsibility for the attacks but declined to use his real name for fear of prosecution or retaliation.) &#8220;I want them to understand that if you come at us, it means some of your infrastructure is going down for a while.&#8221;</p></blockquote><ul><li><p>P4x says he disrupted the Hermit Kingdom&#8217;s internet by exploiting several unpatched vulnerabilities and launching a distributed denial of service (DDOS) attack &#8212; essentially flooding North Korean servers with more internet traffic than they could handle. </p></li><li><p>The U.S.-based hacker also says he&#8217;s trying to get Washington&#8217;s attention because it has not, in his view, responded aggressively enough to North Korea&#8217;s targeting of foreign cybersecurity researchers: &#8220;If no one&#8217;s going to help me, I&#8217;m going to help myself.&#8221;</p></li></ul><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>This wasn&#8217;t a huge hit against North Korea.</strong> Very few North Koreans have internet access and many of the nation&#8217;s government-backed hackers are likely located in other countries &#8212; especially in China. </p></li><li><p><strong>But it wasn&#8217;t nothing.</strong> Any time one person takes down a significant portion of the internet it&#8217;s a reminder of how vulnerable some systems continue to be. P4x&#8217;s DDOS attack wasn&#8217;t particularly sophisticated, but it might still have significant implications.</p></li><li><p><strong>Beware of unintended consequences. </strong>It&#8217;s not hard to sympathize with P4x&#8217;s frustrations over a perceived lack of government help; but, his actions could have important consequences beyond him. For example, what if his actions disrupted ongoing Western intelligence efforts piggybacking on the networks he brought down? What if the DDOS attack had caused cascading failures of essential services, punishing innocent North Koreans who are already suffering under Kim Jong Un&#8217;s despotism? Finally, what if the North Koreans decide that they can&#8217;t have every disgruntled hacker shutting down the nation&#8217;s internet and so they take more aggressive, punitive actions that risk escalating tensions between Washington and Pyongyang? This is why I continue to oppose so-called &#8220;hack back&#8221; laws that would allow citizens to attack hackers online. There are too many tripwires for bad things and it is hard enough navigating the cyber domain without a bunch of cyber renegades running around shooting up the place.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-4-february-2022/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-4-february-2022/comments"><span>Leave a comment</span></a></p><div><hr></div><h2>An AI is Matching Human Coders</h2><p><strong>What&#8217;s New: </strong>DeepMind has a new AI algorithm that writes computer programs at a competitive level.</p><p><strong>Why This Matters: </strong>Writing programs requires a mix of critical thinking, logic, natural language understanding, coding, and algorithms. An AI that can do all of these things could transform how such programs are generated in the future.</p><p><strong>Key Points:</strong></p><ul><li><p>DeepMind is owned by Google parent company, Alphabet and has produced a number of bleeding-edge algorithms.</p></li><li><p>The new algo, AlphaCode, &#8220;uses transformer-based language models to generate code at an unprecedented scale, and then smartly filters to a small set of promising programs,&#8221; <a href="https://deepmind.com/blog/article/Competitive-programming-with-AlphaCode">according to DeepMind</a>.</p></li><li><p>In plain English this means the algo has learned how to throw a lot of code &#8220;spaghetti&#8221; against the wall and to identify which programs are most likely to solve the defined problem. </p></li><li><p>The amazing part is that DeepMind validated AlphaCode by having it complete 10 different coding competitions where it performed at the level of a median human competitor &#8212; &#8220;marking the first time an AI code generation system has reached a competitive level of performance in programming competitions.&#8221;</p></li></ul><blockquote><p>&#8220;Solving competitive programming problems is a really hard thing to do, requiring both good coding skills and problem solving creativity in humans,&#8221; said Peter Mitrichev, a software engineer at Google and world-class competitive programmer.  &#8220;I was very impressed that AlphaCode could make progress in this area, and excited to see how the model uses its statement understanding to produce code and guide its random exploration to create solutions.&#8221;</p></blockquote><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>What will we get when AI creates itself?</strong> While AlphaCode has a long way to go before it can write its own AI programming, the processing power of these programs often allow them to become exponentially more sophisticated in relatively short time frames. At the point where AIs are able to produce other working AIs, we&#8217;ll be entering a world where computer programming could simply be something we ask a digital personal assistant to do for us &#8212; &#8220;Hey Siri, I need an app that tracks my grocery spending and buys Pringles in bulk when they go on sale.&#8221; </p></li><li><p><strong>I mean, I guess there are applications beyond Pringles.</strong> This type of autonomous coding would not only make the &#8220;magic&#8221; of software development more accessible for everyone, the tendency of AIs to employ novel and counterintuitive approaches would likely also lead to new software development models, languages, and tools that humans are less likely to create &#8212; advancing and shaping our technological future in ways that are hard to even imagine right now.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-4-february-2022/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-4-february-2022/comments"><span>Leave a comment</span></a></p><div><hr></div><h2>Let&#8217;s Get Visual</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.visualcapitalist.com/the-cost-of-space-flight/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9YCy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2257e3f9-5076-4acb-a36a-7a38ed03d165_1200x1575.jpeg 424w, https://substackcdn.com/image/fetch/$s_!9YCy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2257e3f9-5076-4acb-a36a-7a38ed03d165_1200x1575.jpeg 848w, https://substackcdn.com/image/fetch/$s_!9YCy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2257e3f9-5076-4acb-a36a-7a38ed03d165_1200x1575.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!9YCy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2257e3f9-5076-4acb-a36a-7a38ed03d165_1200x1575.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9YCy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2257e3f9-5076-4acb-a36a-7a38ed03d165_1200x1575.jpeg" width="1200" height="1575" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/2257e3f9-5076-4acb-a36a-7a38ed03d165_1200x1575.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1575,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;The Cost of Space Flight Before and After SpaceX&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:&quot;https://www.visualcapitalist.com/the-cost-of-space-flight/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="The Cost of Space Flight Before and After SpaceX" title="The Cost of Space Flight Before and After SpaceX" srcset="https://substackcdn.com/image/fetch/$s_!9YCy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2257e3f9-5076-4acb-a36a-7a38ed03d165_1200x1575.jpeg 424w, https://substackcdn.com/image/fetch/$s_!9YCy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2257e3f9-5076-4acb-a36a-7a38ed03d165_1200x1575.jpeg 848w, https://substackcdn.com/image/fetch/$s_!9YCy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2257e3f9-5076-4acb-a36a-7a38ed03d165_1200x1575.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!9YCy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2257e3f9-5076-4acb-a36a-7a38ed03d165_1200x1575.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Visual Capitalist</figcaption></figure></div><div><hr></div><h2>Nerd Humor</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://twitter.com/NewYorker/status/1484268526957477894?s=20&amp;t=ni_D90lyeELnjDXcuNFRmQ" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!q0En!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8371742b-1bc3-40c7-8421-8d23262042ee_680x562.jpeg 424w, https://substackcdn.com/image/fetch/$s_!q0En!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8371742b-1bc3-40c7-8421-8d23262042ee_680x562.jpeg 848w, https://substackcdn.com/image/fetch/$s_!q0En!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8371742b-1bc3-40c7-8421-8d23262042ee_680x562.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!q0En!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8371742b-1bc3-40c7-8421-8d23262042ee_680x562.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!q0En!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8371742b-1bc3-40c7-8421-8d23262042ee_680x562.jpeg" width="574" height="474.3941176470588" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/8371742b-1bc3-40c7-8421-8d23262042ee_680x562.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:562,&quot;width&quot;:680,&quot;resizeWidth&quot;:574,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:&quot;https://twitter.com/NewYorker/status/1484268526957477894?s=20&amp;t=ni_D90lyeELnjDXcuNFRmQ&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Image" title="Image" srcset="https://substackcdn.com/image/fetch/$s_!q0En!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8371742b-1bc3-40c7-8421-8d23262042ee_680x562.jpeg 424w, https://substackcdn.com/image/fetch/$s_!q0En!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8371742b-1bc3-40c7-8421-8d23262042ee_680x562.jpeg 848w, https://substackcdn.com/image/fetch/$s_!q0En!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8371742b-1bc3-40c7-8421-8d23262042ee_680x562.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!q0En!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8371742b-1bc3-40c7-8421-8d23262042ee_680x562.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: NewYorker Cartoons (Twitter)</figcaption></figure></div><div><hr></div><h2>Quick Clicks</h2><ul><li><p><a href="https://www.nytimes.com/2022/02/01/us/politics/russia-ukraine-cybersecurity-nato.html">U.S. sends official to help NATO brace for Russian cyberattacks</a></p></li><li><p><a href="https://www.aei.org/foreign-and-defense-policy/making-the-china-bill-worthwhile/">Making the House&#8217;s &#8220;China Bill&#8221; worthwhile</a></p></li><li><p><a href="https://www.nytimes.com/2022/01/28/technology/faa-5g-verizon-att.html">FAA announces progress expanding 5G</a></p></li><li><p><a href="https://www.wired.com/story/trickbot-malware-group-internal-messages/">Inside Trickbot, Russia&#8217;s notorious ransomware gang</a></p></li><li><p><a href="https://www.foreignaffairs.com/articles/china/2022-02-01/taiwan-cant-wait">Taiwan can&#8217;t wait</a></p></li></ul><div><hr></div><p><em>That&#8217;s it for this Friday Brief. Thanks for reading, and if you think someone else would like this newsletter, please share it with your friends and followers. Have a great weekend!</em></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>A CCP program ostensibly aimed at stamping out corruption, but in reality, targets, captures, and repatriates former Chinese citizens overseas that are deemed a threat to Beijing.</p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[Update: Friday Brief for 28 January 2022]]></title><description><![CDATA[More on China's My2022 Olympics App]]></description><link>https://www.thekitchensync.tech/p/update-friday-brief-for-28-january</link><guid isPermaLink="false">https://www.thekitchensync.tech/p/update-friday-brief-for-28-january</guid><dc:creator><![CDATA[Klon Kitchen]]></dc:creator><pubDate>Sat, 29 Jan 2022 22:24:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!isE6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd06123d-7a90-4eb3-82a5-e96a425ae31d" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Hello friends, </p><p><strong>What&#8217;s New:</strong> In <a href="https://www.thekitchensync.tech/p/friday-brief-for-28-january-2022">yesterday&#8217;s Briefing</a> I discussed security concerns with China&#8217;s My2022 Olympics app. In this story, I cited research done by Citizen Lab and Jonathan Scott &#8212; both of whom claim My2022 has serious flaws. Mr. Scott&#8217;s claims were particularly alarming, stating, &#8220;<a href="https://twitter.com/jonathandata1/status/1486458526767661060?s=20">All Olympian audio is being collected, analyzed and saved on Chinese servers</a>.&#8221;</p><p>This claim is getting serious criticism from the broader information security sector and &#8212; I must confess &#8212; it&#8217;s beyond my technical expertise to independently verify. While some of the critiques are petty, there is a growing number of experts that I trust calling Scott&#8217;s research into question.</p><p><strong>Why This Matters:</strong> I want my readers to trust what they read in this newsletter and to know that I will always provide the most accurate information I can.</p><p><strong>What I&#8217;m Thinking:</strong> </p><ul><li><p><strong>I don&#8217;t think this really changes much.</strong> First, the Citizen Lab tear-down still stands. Second, even if the app were flawless, the developer and everyone attending the Games in China are subject to known Chinese cybersecurity and national security laws that give the CCP unfettered access. In other words, user data doesn&#8217;t have to &#8220;leak&#8221; from the app; it can simply be gathered directly from the servers and other infrastructure under the government&#8217;s control. A simple read of the app&#8217;s Terms of Service shows it is collecting tons of data and the use of software from known human rights violator, iFLYTEK, is also confirmed. So there&#8217;s still plenty wrong with My2022.</p></li><li><p><strong>App store rules need to change.</strong> Going forward, if companies really want to credibly host &#8220;secure&#8221; app stores and to protect their users, then they can no longer treat all developers the same. In light of everything we know, is it really sufficient to pretend that, if a Chinese-developed app doesn&#8217;t overtly leak like a sieve and if they promise they&#8217;re not misusing the information they collect, then everything must be ok? I understand wanting to treat all developers the same, but they&#8217;re not. Chinese developers operate under different rules, have different obligations to their home government, and are legally required to deny and hide those obligations. If tech leaders really believe &#8220;<a href="https://www.nbcnews.com/tech/tech-news/apple-ceo-tim-cook-slams-facebook-privacy-human-right-it-n860816">privacy is a human right</a>,&#8221; then it seems obvious that the status quo is insufficient.</p></li></ul><p>As a thank you for your understanding, here&#8217;s a photo of Bo telling me, &#8220;Dude, get off your laptop and get to scratchin&#8217;.&#8221;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!isE6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd06123d-7a90-4eb3-82a5-e96a425ae31d" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!isE6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd06123d-7a90-4eb3-82a5-e96a425ae31d 424w, https://substackcdn.com/image/fetch/$s_!isE6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd06123d-7a90-4eb3-82a5-e96a425ae31d 848w, https://substackcdn.com/image/fetch/$s_!isE6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd06123d-7a90-4eb3-82a5-e96a425ae31d 1272w, https://substackcdn.com/image/fetch/$s_!isE6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd06123d-7a90-4eb3-82a5-e96a425ae31d 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!isE6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd06123d-7a90-4eb3-82a5-e96a425ae31d" width="1456" height="1092" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/dd06123d-7a90-4eb3-82a5-e96a425ae31d&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1092,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1143762,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!isE6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd06123d-7a90-4eb3-82a5-e96a425ae31d 424w, https://substackcdn.com/image/fetch/$s_!isE6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd06123d-7a90-4eb3-82a5-e96a425ae31d 848w, https://substackcdn.com/image/fetch/$s_!isE6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd06123d-7a90-4eb3-82a5-e96a425ae31d 1272w, https://substackcdn.com/image/fetch/$s_!isE6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fdd06123d-7a90-4eb3-82a5-e96a425ae31d 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Thanks for being a subscriber and I hope the rest of your weekend is awesome!</p><p>Klon</p>]]></content:encoded></item><item><title><![CDATA[Friday Brief for 28 January 2022]]></title><description><![CDATA[China's Olympics app is pure spyware; Preparing for cyber spillover; & Simulating tomorrow's reality]]></description><link>https://www.thekitchensync.tech/p/friday-brief-for-28-january-2022</link><guid isPermaLink="false">https://www.thekitchensync.tech/p/friday-brief-for-28-january-2022</guid><dc:creator><![CDATA[Klon Kitchen]]></dc:creator><pubDate>Fri, 28 Jan 2022 11:00:40 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/47794333/37d23a73e57f4eee0e803d12ca4aeed2.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Uh2b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 424w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 848w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1272w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png" width="737" height="121.605" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:165,&quot;width&quot;:1000,&quot;resizeWidth&quot;:737,&quot;bytes&quot;:12912,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 424w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 848w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1272w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><div><hr></div><h4>Tech Terms</h4><blockquote><p><strong><a href="https://techterms.com/definition/bootsequence">Boot Sequence &#8212; </a></strong>The initial series of processes a computer runs when starting up.</p></blockquote><div><hr></div><h2>China&#8217;s Olympics App is Pure Spyware</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iM2V!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6a10e37e-259c-45ae-9d9f-f3ec23558b18_1125x658.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iM2V!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6a10e37e-259c-45ae-9d9f-f3ec23558b18_1125x658.jpeg 424w, https://substackcdn.com/image/fetch/$s_!iM2V!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6a10e37e-259c-45ae-9d9f-f3ec23558b18_1125x658.jpeg 848w, https://substackcdn.com/image/fetch/$s_!iM2V!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6a10e37e-259c-45ae-9d9f-f3ec23558b18_1125x658.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!iM2V!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6a10e37e-259c-45ae-9d9f-f3ec23558b18_1125x658.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iM2V!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6a10e37e-259c-45ae-9d9f-f3ec23558b18_1125x658.jpeg" width="442" height="258.52088888888886" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/6a10e37e-259c-45ae-9d9f-f3ec23558b18_1125x658.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:658,&quot;width&quot;:1125,&quot;resizeWidth&quot;:442,&quot;bytes&quot;:226860,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!iM2V!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6a10e37e-259c-45ae-9d9f-f3ec23558b18_1125x658.jpeg 424w, https://substackcdn.com/image/fetch/$s_!iM2V!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6a10e37e-259c-45ae-9d9f-f3ec23558b18_1125x658.jpeg 848w, https://substackcdn.com/image/fetch/$s_!iM2V!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6a10e37e-259c-45ae-9d9f-f3ec23558b18_1125x658.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!iM2V!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6a10e37e-259c-45ae-9d9f-f3ec23558b18_1125x658.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>What&#8217;s New: </strong>Cybersecurity researchers say the My2022 mobile app &#8212; the official app of the Beijing Winter Olympics &#8212; has serious security vulnerabilities and that &#8220;<a href="https://twitter.com/jonathandata1/status/1486458526767661060?s=20">all Olympian audio is being collected, analyzed and saved on Chinese servers</a>.&#8221;</p><p><strong>Why This Matters: </strong>The Chinese government is mandating all Olympic athletes, coaches, and attendees use the My2022 app and, as of Thursday morning, the app is still available in the Apple and Android U.S. app stores where Americans can download it too.</p><p><strong>Key Points:</strong></p><ul><li><p>The Chinese government <a href="http://www.chinaembassy.cz/zxdt/202110/P020211029009615923122.pdf">says</a> My2022 was developed by the Beijing Organizing Committee for the 2022 Olympics and <a href="https://apps.apple.com/us/developer/%E5%8C%97%E4%BA%AC%E9%87%91%E8%9E%8D%E6%8E%A7%E8%82%A1%E9%9B%86%E5%9B%A2%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8/id1559670295">records</a> show that it is owned by the state-controlled Beijing Financial Holdings Group.</p></li><li><p>The app&#8217;s public capabilities include COVID-19 health monitoring, GPS navigation, and numerous tourism recommendations.</p></li><li><p>Citizen Lab researchers, however, demonstrate the app has a <a href="https://citizenlab.ca/2022/01/cross-country-exposure-analysis-my2022-olympics-app/">&#8220;devastating flaw where encryption protecting users&#8217; voice audio and file transfers can be trivially sidestepped.&#8221;</a></p></li><li><p>Jonathan Scott, a mobile and IoT security researcher specializing in malware, spyware, and forensics, has also done a complete breakdown of the app and is raising alarms.</p></li></ul><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://twitter.com/jonathandata1/status/1486458526767661060?s=20&quot;,&quot;full_text&quot;:&quot;After reverse engineering all of the <span class=\&quot;tweet-fake-link\&quot;>#Beijing2022</span> <span class=\&quot;tweet-fake-link\&quot;>#spyware</span> app for <span class=\&quot;tweet-fake-link\&quot;>@Apple</span> <span class=\&quot;tweet-fake-link\&quot;>#ios</span> and <span class=\&quot;tweet-fake-link\&quot;>@Google</span> <span class=\&quot;tweet-fake-link\&quot;>#Android</span> \nI can definitively say all Olympian audio is being collected, analyzed and saved on Chinese servers using tech from USA blacklisted AI firm <span class=\&quot;tweet-fake-link\&quot;>@iflytek1999</span> \n\n<a class=\&quot;tweet-url\&quot; href=\&quot;https://www.wired.com/story/mit-cuts-ties-chinese-ai-firm-human-rights/\&quot;>wired.com/story/mit-cuts&#8230;</a> &quot;,&quot;username&quot;:&quot;jonathandata1&quot;,&quot;name&quot;:&quot;Jonathan Scott&quot;,&quot;profile_image_url&quot;:&quot;&quot;,&quot;date&quot;:&quot;Wed Jan 26 21:58:24 +0000 2022&quot;,&quot;photos&quot;:[{&quot;img_url&quot;:&quot;https://pbs.substack.com/media/FKD1udYWUAASVi7.jpg&quot;,&quot;link_url&quot;:&quot;https://t.co/hdIfiKX37m&quot;,&quot;alt_text&quot;:null}],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:0,&quot;retweet_count&quot;:1127,&quot;like_count&quot;:1770,&quot;impression_count&quot;:0,&quot;expanded_url&quot;:{},&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><ul><li><p>Of special concern is Scott&#8217;s discovery that My2022 is built using voice recognition and processing tech from iFLYTEK &#8212; a Chinese company that is blacklisted in the United States because of gross human rights violations.</p></li><li><p>iFLYTEK&#8217;s capabilities allow the app, <a href="https://twitter.com/jonathandata1/status/1486653535597076488?s=20">according to Jonathan Scott</a>, to conduct &#8220;continuous&#8221; voice monitoring.</p></li></ul><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>No one should be surprised.</strong> Beijing has not been secretive about its desire to have and to use all data within its reach. For years, the Chinese government has enacted laws that ensure it has unfettered digital access and every Chinese company has been put on notice that anything less than full compliance with these government mandates will result in massive fines, executive imprisonment, and even being shut down completely. The only thing surprising here is that anyone believed the CCP would <em>not</em> want to strictly control the Winter Olympics and to seize the opportunity of hoovering up the deluge of data that will be created by the games. </p></li><li><p><strong>This could/should have been avoided.</strong> Both Apple and Google will tell you they have thousands of app submissions to their stores everyday and that it&#8217;s impossible to do a deep-dive on every one of them. But, My2022 isn&#8217;t just another app &#8212; it&#8217;s an app developed by a state-run company, for the Chinese government, and mandated for every single Olympic participant. It collects tons of personal data and it should have been prioritized and examined with a fine-tooth comb. Even after outside researchers raised concerns about the app, it has remained in both companies&#8217; app stores where Americans can download it, potentially compromising them as well. And even after the Citizen Lab report and the research by Jonathan Scott, the Apple app store still claims that the only data My2022 can connect to users is their contact information.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-SY7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1a0de140-0cae-402a-a71d-7b2c34ac76b0_1125x2017.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-SY7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1a0de140-0cae-402a-a71d-7b2c34ac76b0_1125x2017.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-SY7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1a0de140-0cae-402a-a71d-7b2c34ac76b0_1125x2017.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-SY7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1a0de140-0cae-402a-a71d-7b2c34ac76b0_1125x2017.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-SY7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1a0de140-0cae-402a-a71d-7b2c34ac76b0_1125x2017.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-SY7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1a0de140-0cae-402a-a71d-7b2c34ac76b0_1125x2017.jpeg" width="306" height="548.624" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1a0de140-0cae-402a-a71d-7b2c34ac76b0_1125x2017.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2017,&quot;width&quot;:1125,&quot;resizeWidth&quot;:306,&quot;bytes&quot;:514965,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-SY7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1a0de140-0cae-402a-a71d-7b2c34ac76b0_1125x2017.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-SY7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1a0de140-0cae-402a-a71d-7b2c34ac76b0_1125x2017.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-SY7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1a0de140-0cae-402a-a71d-7b2c34ac76b0_1125x2017.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-SY7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F1a0de140-0cae-402a-a71d-7b2c34ac76b0_1125x2017.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ul><li><p><strong>Capitulating to the Chinese invites U.S. regulations.</strong> The games in Beijing begin on February 4th. The day before, the U.S. Senate Judiciary Committee is scheduled to mark up the <a href="https://govtrackinsider.com/open-app-markets-act-would-prevent-apple-and-google-from-only-selling-approved-apps-in-their-app-e56e692a8891">Open Apps Market Act </a>&#8212; a bill that would require tech companies to relinquish control over how users add applications to their devices. I don&#8217;t like this bill and<a href="https://www.thekitchensync.tech/p/the-american-innovation-and-choice"> I&#8217;m on record</a> explaining how laws like this would actually compromise our individual and corporate cybersecurity. But, failures like the My2022 app &#8212; especially if Apple and Google do not take decisive action before the games &#8212; completely undermine any assertion that these companies oppose opening up their app stores over security concerns. While I believe that capitulation to the CCP does not justify the United States cutting its own cybersecurity throat, there&#8217;s no denying that these companies are severely undermining their credibility. Apple and Google will need to explain themselves specifically, publicly, and convincingly if they want any hope of mitigating the justified frustrations of policy makers and the general public.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-28-january-2022/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-28-january-2022/comments"><span>Leave a comment</span></a></p><div><hr></div><h2>Preparing for Cyber Spillover from Ukraine</h2><p><strong>What&#8217;s New: </strong>As the situation along the Russia-Ukraine border continues to evolve, government officials and private sector leaders are preparing for possible cyber &#8220;spillover.&#8221; </p><p><strong>Why This Matters: </strong>Previous Russian cyber operations that began in Ukraine have caused billions of dollars in damages around the world and the prospect of escalating hostilities in the region raises the specter of even more trouble to come.</p><p><strong>Key Points:</strong></p><ul><li><p>The United States has r<a href="https://www.nytimes.com/live/2022/01/26/world/ukraine-russia-us">esponded in writing</a> to Russia&#8217;s insane list of demands and, reportedly, Washington said, &#8220;Nah,&#8221; (though the U.S. letter has not been publicly released).</p></li><li><p>Meanwhile, Russian troops continue their &#8220;exercises&#8221; along Ukraine&#8217;s border with Russia and Belarus and the Biden administration is <a href="https://www.cnn.com/2022/01/24/politics/biden-troops-europe/index.html">ordering more than 8,500 troops on alert </a>for a rapid deployment to Europe. </p></li></ul><ul><li><p>Relatedly, the Department of Homeland Security <a href="https://www.cbsnews.com/news/russian-cyberattack-u-s-heightened-alert/">issued</a> a memo to law enforcement warning that Moscow may execute cyber attacks against the United States if things go sideways and CISA (DHS&#8217;s Cybersecurity and Infrastructure Security Agency) also warned American companies of these concerns.</p></li><li><p>A growing list of companies are reviewing their ties in Ukraine and those of their key vendors, <a href="https://www.wsj.com/articles/companies-prepare-for-fallout-from-cyberattacks-against-ukraine-11643151083?mod=rss_Technology">according to the Wall Street Journal</a>, as they seek to bolster their resilience to Russian attacks online.</p></li></ul><blockquote><p>&#8220;The worst-case scenario, cybersecurity experts warn, would be escalating breaches that mimic the <a href="https://www.wsj.com/articles/cyberattacks-hit-global-companies-in-europe-1498575793?mod=article_inline">2017 NotPetya attack on a Ukrainian accounting firm</a> that allowed hackers to rampage across other corporate networks, eventually causing an estimated $10 billion in global damage.&#8221;</p></blockquote><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>This is getting serious.</strong> Last year&#8217;s <a href="https://www.dni.gov/files/ODNI/documents/assessments/ATA-2021-Unclassified-Report.pdf">Annual Threat Assessment </a>by the ODNI states, &#8220;Russia continues to target critical infrastructure, including underwater cables and industrial control systems, in the United States and in allied and partner countries, as compromising such infrastructure improves&#8212;and in some cases can demonstrate&#8212;its ability to damage infrastructure during a crisis.&#8221; It also observes, &#8220;Russia almost certainly considers cyber attacks an acceptable option to deter adversaries, control escalation, and prosecute conflicts.&#8221; What does this mean? It means Moscow has the ability to execute devastating cyber attacks in the West and that we are entering a scenario where it might actually choose to do so. The actions of DHS/CISA and industry demonstrate such concerns are well-founded.</p></li><li><p><strong>Spillover happens.</strong> Like a biological virus, digital viruses and other malware  can be hard to contain. Interconnected networks and broadly deployed core hardware and software can allow an attack to quickly spread beyond its intended target(s). That means Russia could conduct an attack aimed squarely at Ukraine but its consequences could go well beyond that country &#8212; possibly pulling other nations into a conflict and climbing up the escalation ladder. If such spillover occurs, it will be doubly important that all involved watch their steps. </p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-28-january-2022/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-28-january-2022/comments"><span>Leave a comment</span></a></p><div><hr></div><h2>Synthetic Simulations of Tomorrow&#8217;s Realities</h2><p><strong>What&#8217;s New: </strong>Joe Robinson at Wired has an interesting article on how <a href="https://www.wired.com/story/simulation-tech-global-threats-prediction/">simulation tech can help predict the biggest threats.</a></p><p><strong>Why This Matters: </strong>&#8220;Traditional analysis tools are poorly equipped to predict and respond to these blurred and intertwined threats,&#8221; says Robinson. &#8220;Instead, in 2022 governments and militaries will use sophisticated and credible real-life simulations, putting software at the heart of their decision-making and operating processes.&#8221;</p><p><strong>Key Points:</strong></p><ul><li><p>The article cites the Brits&#8217; development of a &#8220;digital backbone&#8221; for their Ministry of Defense that integrates cloud computing, advanced analytics and a new capability called Single Synthetic Environments (SSE).</p></li><li><p>SSEs leverage AI/Machine Learning, distributed systems, and cutting-edge modeling to make detailed simulations of the real world.</p></li><li><p>The idea, then, is that military strategists and warfighters can use these synthetic environments to predict, understand, and plan for future challenges.</p></li></ul><blockquote><p>&#8220;National security officials will be able to use SSEs to identify threats early, understand them better, explore their response options, and analyze the likely consequences of different actions. They will even be able to use them to train, rehearse, and implement their plans. By running thousands of simulated futures, senior leaders will be able to grapple with complex questions, refining policies and complex plans in a virtual world before implementing them in the real one.&#8221;</p></blockquote><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>This stuff is real, but not quite ready for showtime.</strong> Robinson&#8217;s article is interesting and well worth the read. And, while SSEs and other advanced modeling capabilities continue to progress &#8212; I&#8217;m not as excited as the article suggests we should be. It&#8217;s true that these SSEs can be highly detailed and very useful generally; but to be an actual digital representation of the real world they require volumes of real-world data that we simply do not have. That&#8217;s not to say these tools have no utility or that they will never realize their full promise. As 5G and follow-on network upgrades enable a real internet-of-things, we&#8217;ll move closer to truly representative SSEs and that will be a massive improvement for everyone from military leaders to city planners. Until then, though, these models are still very much a work in progress.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-28-january-2022/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-28-january-2022/comments"><span>Leave a comment</span></a></p><div><hr></div><h2>Let&#8217;s Get Visual: <strong>The Top 10 Biggest Companies in India</strong></h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.visualcapitalist.com/the-top-10-biggest-companies-in-india/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aBAA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F075f317f-4a23-47f7-a8fc-9b6bf1df7630_1250x1261.jpeg 424w, https://substackcdn.com/image/fetch/$s_!aBAA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F075f317f-4a23-47f7-a8fc-9b6bf1df7630_1250x1261.jpeg 848w, https://substackcdn.com/image/fetch/$s_!aBAA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F075f317f-4a23-47f7-a8fc-9b6bf1df7630_1250x1261.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!aBAA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F075f317f-4a23-47f7-a8fc-9b6bf1df7630_1250x1261.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aBAA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F075f317f-4a23-47f7-a8fc-9b6bf1df7630_1250x1261.jpeg" width="1250" height="1261" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/075f317f-4a23-47f7-a8fc-9b6bf1df7630_1250x1261.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1261,&quot;width&quot;:1250,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:774661,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:&quot;https://www.visualcapitalist.com/the-top-10-biggest-companies-in-india/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aBAA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F075f317f-4a23-47f7-a8fc-9b6bf1df7630_1250x1261.jpeg 424w, https://substackcdn.com/image/fetch/$s_!aBAA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F075f317f-4a23-47f7-a8fc-9b6bf1df7630_1250x1261.jpeg 848w, https://substackcdn.com/image/fetch/$s_!aBAA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F075f317f-4a23-47f7-a8fc-9b6bf1df7630_1250x1261.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!aBAA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F075f317f-4a23-47f7-a8fc-9b6bf1df7630_1250x1261.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Visual Capitalist</figcaption></figure></div><div><hr></div><h2>Nerd Humor</h2><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://twitter.com/nycartoons/status/1483861878661173252?s=20&quot;,&quot;full_text&quot;:&quot;Cartoon by Carolita Johnson\n\n&#8220;Have you tried turning it off and taking a nap?&#8221;\n\n<a class=\&quot;tweet-url\&quot; href=\&quot;https://www.newyorker.com/cartoon/a25681\&quot;>newyorker.com/cartoon/a25681</a> &quot;,&quot;username&quot;:&quot;nycartoons&quot;,&quot;name&quot;:&quot;New Yorker Cartoons&quot;,&quot;profile_image_url&quot;:&quot;&quot;,&quot;date&quot;:&quot;Wed Jan 19 18:00:15 +0000 2022&quot;,&quot;photos&quot;:[{&quot;img_url&quot;:&quot;https://pbs.substack.com/media/FJe8hBKX0AgMkLA.jpg&quot;,&quot;link_url&quot;:&quot;https://t.co/vyDprdeDBA&quot;,&quot;alt_text&quot;:null}],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:0,&quot;retweet_count&quot;:14,&quot;like_count&quot;:49,&quot;impression_count&quot;:0,&quot;expanded_url&quot;:{},&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><div><hr></div><h2>Quick Clicks</h2><ul><li><p><a href="https://www.wsj.com/articles/sec-looks-to-bolster-markets-cyber-defenses-11643040982?mod=rss_Technology">SEC looks to bolster market&#8217;s cyber defenses</a></p></li><li><p><a href="https://www.washingtonpost.com/politics/2022/01/26/an-ingredients-list-software-could-help-prevent-next-log4j/">An ingredient list for software could help prevent the next log4j</a></p></li><li><p><a href="https://www.wsj.com/articles/biden-to-expand-national-security-agency-role-in-government-cybersecurity-11642604412?mod=rss_Technology">Biden expanding NSA&#8217;s role in gov cybersecurity</a></p></li><li><p><a href="https://www.c4isrnet.com/unmanned/2022/01/20/contractors-demonstrate-single-user-drone-swarm-at-darpa-experiment/?mc_cid=aa0b475d4f&amp;mc_eid=cb69914e13">DARPA demonstrates drone swarms</a></p></li><li><p><a href="https://www.cnet.com/news/spacex-signs-a-deal-to-rocket-military-cargo-around-the-world/?ftag=COS-05-10aaa0b&amp;TheTime=2022-01-21T00%3A32%3A54&amp;ServiceType=twitter&amp;PostType=link&amp;UniqueID=AC73416C-7A51-11EC-869D-94044844363C">SpaceX signs deal to rocket military cargo around the world</a></p></li></ul><div><hr></div><p><em>That&#8217;s it for this Friday Brief. Thanks for reading, and if you think someone else would like this newsletter, please share it with your friends and followers. Have a great weekend!</em></p>]]></content:encoded></item><item><title><![CDATA[Private Call with DC's "China Guy"]]></title><description><![CDATA[An invite-only conversation with Eric Sayers from Beacon Global Strategies]]></description><link>https://www.thekitchensync.tech/p/private-call-with-dcs-china-guy</link><guid isPermaLink="false">https://www.thekitchensync.tech/p/private-call-with-dcs-china-guy</guid><dc:creator><![CDATA[Klon Kitchen]]></dc:creator><pubDate>Mon, 24 Jan 2022 20:19:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!sRGd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F78719e52-45c5-4c3e-af04-6d98010f9d9c_440x450.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Hello!</p><p>As a paid subscriber to The Kitchen Sync, you have access to monthly Zoom calls with some of the most influential and interesting people working at the nexus of technology and national security.</p><p>On Monday, January 31st at 7pm, our conversation will be with Eric Sayers, one of the most influential &#8220;hidden hands&#8221; of American policy in Asia. I&#8217;m confi&#8230;</p>
      <p>
          <a href="https://www.thekitchensync.tech/p/private-call-with-dcs-china-guy">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Friday Brief for 21 January 2022]]></title><description><![CDATA[Russia's ransomware roundup; Alibaba in the dock; and Distrust is our default]]></description><link>https://www.thekitchensync.tech/p/friday-brief-for-21-january-2022</link><guid isPermaLink="false">https://www.thekitchensync.tech/p/friday-brief-for-21-january-2022</guid><dc:creator><![CDATA[Klon Kitchen]]></dc:creator><pubDate>Fri, 21 Jan 2022 11:00:42 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/47415158/c12ffb11d8e779c4d493a47b6a659929.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Uh2b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 424w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 848w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1272w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png" width="737" height="121.605" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:165,&quot;width&quot;:1000,&quot;resizeWidth&quot;:737,&quot;bytes&quot;:12912,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 424w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 848w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1272w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><div><hr></div><h4>Tech Terms</h4><blockquote><p><strong><a href="https://www.jigsawacademy.com/blogs/cloud-computing/elastic-computing">Elastic Computing</a> &#8212; </strong><em>The capability of cloud services to decrease or expand computer storage, memory, and processing to handle fluctuating demand.</em></p></blockquote><div><hr></div><h2>Don&#8217;t be Fooled by Russia&#8217;s Ransomware Roundup</h2><p><strong>What&#8217;s New: </strong>The Russian government has arrested several members of the REvil ransomware syndicate, the group responsible for last year&#8217;s attacks against meat supplier JBS and customers of the IT company Kaseya. </p><p><strong>Why This Matters: </strong>REvil has been under pressure since its high-profile attacks last year and President Biden has called on Russia to crack down on ransomware groups operating within its borders.</p><p><strong>Key Points:</strong></p><ul><li><p>Members of the Federal Security Service (FSB) raided and arrested 14 REvil members, seizing computers, luxury vehicles, and more than $5.5 million in cryptocurrency and rubles, <a href="https://www.wired.com/story/russia-revil-ransomware-arrests-ukraine/">according to Wired</a>. </p></li></ul><blockquote><p>&#8220;The organized criminal community ceased to exist, the information infrastructure used for criminal purposes was neutralized,&#8221; a translated version of the FSB&#8217;s statement says.</p></blockquote><ul><li><p>The FSB went on to say that the arrests were in direct response to Biden&#8217;s request for action.</p></li></ul><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>There&#8217;s no rest for the wicked.</strong> For a long time, ransomware groups were assured they could operate with near impunity inside of Russia so long as they didn&#8217;t cause the country too much trouble internationally and they complied with government requests for &#8220;technical assistance.&#8221; But that deal was always transactional and hackers inside of Putin&#8217;s paradise are now getting the message that they might be arrested or otherwise constrained if the country&#8217;s political interests require such actions. Don&#8217;t feel too bad for the REvil jerks, they&#8217;re not going to be deported and they&#8217;ll likely continue to be employed and handsomely rewarded by the FSB.</p></li></ul><ul><li><p><strong>The is the Devil rebuking sin. </strong>While Putin&#8217;s REvil roundup would appear to serve U.S. interests, it falls within the broader context of growing tensions along the Ukrainian border. Negotiations between the United States and Russia have failed to turn down the heat and Moscow is poised to cross the border any day. Even more so after the President&#8217;s disastrous press conference this week where he indicated NATO is divided and that America&#8217;s promise of crippling sanctions might not materialize if Putin only conducts a &#8220;minor incursion.&#8221; The arrests were almost certainly a political ploy aimed at signaling to the United States that Russia has the ability to take decisive action against ransomware groups if it wants or it can let them off the chain &#8212; and both possibilities should be considered as the United States charts its path on Ukraine.</p></li></ul><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://twitter.com/continetti/status/1483924402202943489?s=20&quot;,&quot;full_text&quot;:&quot;Shorter Biden: Putin will invade. Unless he doesn&#8217;t. And NATO stands united to drop some major sanctions on him if he does. Except NATO isn&#8217;t united. And fear of these sanctions may deter Putin. But probably not. And if it&#8217;s a &#8216;minor incursion,&#8217; well, we&#8217;ll see what happens.&quot;,&quot;username&quot;:&quot;continetti&quot;,&quot;name&quot;:&quot;Matthew Continetti&quot;,&quot;profile_image_url&quot;:&quot;&quot;,&quot;date&quot;:&quot;Wed Jan 19 22:08:42 +0000 2022&quot;,&quot;photos&quot;:[],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:0,&quot;retweet_count&quot;:159,&quot;like_count&quot;:641,&quot;impression_count&quot;:0,&quot;expanded_url&quot;:{},&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-21-january-2022/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-21-january-2022/comments"><span>Leave a comment</span></a></p><div><hr></div><h2>Alibaba&#8217;s Turn in the Dock</h2><p><strong>What&#8217;s New: </strong>The Biden administration is reviewing Alibaba&#8217;s U.S. cloud business over concerns that it might pose a threat to American national security, <a href="https://www.reuters.com/technology/exclusive-us-examining-alibabas-cloud-unit-national-security-risks-sources-2022-01-18/">according to Reuters.</a>  </p><p><strong>Why This Matters: </strong>The company is an e-commerce giant, bigger than Amazon, with extensive cloud service offerings that, until recently, appeared poised to expand rapidly in the United States.</p><p><strong>Key Points:</strong></p><ul><li><p>Alibaba Group Holding Limited is a China-based company offering a suite of businesses, including core commerce, cloud computing, and digital media and entertainment &#8212; generating more than $100 billion in revenue last year.</p></li><li><p>Alibaba Cloud is China&#8217;s largest cloud provider and offers everything from database, storage, and network virtualization to elastic computing, data analytics, machine learning, and IoT services. But its U.S. business is relatively small at an estimated $50 million.</p></li><li><p>The U.S. is reportedly concerned about how Alibaba stores, secures, and manages the data of its American clients and whether the Chinese government can access this information.</p></li><li><p>The Commerce Department&#8217;s Office of Intelligence and Security (OIS) is reportedly leading the investigation; but, the agency declined to comment on the story.</p></li><li><p>The OIS was created by the Trump administration as it rolled out new authorities for the Commerce Department to review and reject transactions between U.S. and foreign telecom and technology companies.</p></li><li><p>Separate, but relatedly, France&#8217;s National Agency for the Security of Information Systems (ANSSI) is <a href="https://www.france24.com/en/live-news/20211203-french-concern-about-chinese-alibaba-cloud-for-paris-2024">pushing back</a> on a plan to have Alibaba as a provider of cloud services for the 2024 Olympic Games in Paris over data security concerns.</p></li></ul><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>These companies don&#8217;t have to be evil, just compliant.</strong> I&#8217;ve always liked Alibaba. Its founder, Jack Ma, is a charismatic and seemingly nice guy. He&#8217;s not really a tech guru but he built a massive tech company. He also appeared to have some significant differences with the Chinese Communist Party (CCP). And that&#8217;s when things went sideways for him and his company. Last year, just before Alibaba&#8217;s ANT financial company was about to have the largest public offering in history, Ma publicly criticized the CCP and the government responded by stopping the listing, placing Ma in a suspected house arrest, and hitting Alibaba (and other Chinese tech companies) with mounting regulations. You see, in China, the communist government is supreme and irresistible. If you want to do business as a Chinese company you have to play ball with the CCP &#8212; and this is the root of U.S. concerns about Alibaba&#8217;s cloud services. We know Chinese law gives the government access to all data and we know that companies who don&#8217;t comply with the government don&#8217;t stay in business very long. The OIS investigation should be completed with rigor but we already know what it should conclude: so long as the CCP is running China, Chinese technology providers cannot be trusted to operate safely or securely in the United States.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-21-january-2022/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-21-january-2022/comments"><span>Leave a comment</span></a></p></li></ul><div><hr></div><h2>Distrust is our Default</h2><p><strong>What&#8217;s New: </strong>The <a href="https://www.edelman.com/trust/2022-trust-barometer">2022 Edelman Trust Barometer</a> is out and its findings are not good.</p><p><strong>Why This Matters: </strong>This annual report tracks and analyzes how trust is shaping the world economically, socially, and politically. While not a pure &#8220;tech&#8221; issue, I often find this report helpful in understanding many of the social dynamics shaping tech and national security.</p><p><strong>Key Points:</strong></p><ul><li><p>The Trust Barometer report is an annual survey conducted in 28 countries and engaging more than 36K respondents.</p></li><li><p>This is the 22nd year of the survey and this year&#8217;s report is titled, &#8220;The Cycle of Distrust.&#8221; Here&#8217;s its bottom line:</p></li></ul><blockquote><p>&#8220;After a year of unprecedented disaster and turbulence&#8212;the&nbsp;<strong><a href="https://www.edelman.com/covid-19">Covid-19 pandemic</a></strong>&nbsp;and&nbsp;<strong><a href="https://www.edelman.com/expertise/financial-communications-capital-markets">economic crisis</a></strong>, the global outcry over systemic racism and political instability&#8212;the 2022 Edelman Trust Barometer reveals an epidemic of misinformation and widespread mistrust of societal institutions and leaders around the world. Adding to this is a failing&nbsp;<strong><a href="https://www.edelman.com/trust">trust ecosystem</a></strong>&nbsp;unable to confront the rampant infodemic, leaving the four institutions&#8212;business, government, NGOs&nbsp;and media&#8212;in an environment of information bankruptcy and a mandate to rebuild trust and chart a new path forward.&#8221;</p></blockquote><ul><li><p>Below is a quick summary of the report&#8217;s top 10 findings (click for larger view).</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.edelman.com/sites/g/files/aatuss191/files/2022-01/Trust%2022_Top10.pdf" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1ECl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F18d2adeb-1294-4356-bfb0-75ab7ebd3146_612x792.png 424w, https://substackcdn.com/image/fetch/$s_!1ECl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F18d2adeb-1294-4356-bfb0-75ab7ebd3146_612x792.png 848w, https://substackcdn.com/image/fetch/$s_!1ECl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F18d2adeb-1294-4356-bfb0-75ab7ebd3146_612x792.png 1272w, https://substackcdn.com/image/fetch/$s_!1ECl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F18d2adeb-1294-4356-bfb0-75ab7ebd3146_612x792.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1ECl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F18d2adeb-1294-4356-bfb0-75ab7ebd3146_612x792.png" width="600" height="776.4705882352941" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/18d2adeb-1294-4356-bfb0-75ab7ebd3146_612x792.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:792,&quot;width&quot;:612,&quot;resizeWidth&quot;:600,&quot;bytes&quot;:302429,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.edelman.com/sites/g/files/aatuss191/files/2022-01/Trust%2022_Top10.pdf&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1ECl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F18d2adeb-1294-4356-bfb0-75ab7ebd3146_612x792.png 424w, https://substackcdn.com/image/fetch/$s_!1ECl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F18d2adeb-1294-4356-bfb0-75ab7ebd3146_612x792.png 848w, https://substackcdn.com/image/fetch/$s_!1ECl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F18d2adeb-1294-4356-bfb0-75ab7ebd3146_612x792.png 1272w, https://substackcdn.com/image/fetch/$s_!1ECl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F18d2adeb-1294-4356-bfb0-75ab7ebd3146_612x792.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Edelman Trust Barometer</figcaption></figure></div><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>Our fundamental problem is pre-political. </strong>I&#8217;m a Christian. As a Christian, I root my understanding of truth, ultimately, in the person and character of an eternal, unchanging, and good God as revealed in the Bible. His unchanging nature, specifically, provides a steady point of reference for my understanding of the truth because all moral judgements are relative to Him. This, in my view, is the most compelling explanation of the world theologically, intellectually, and experientially. While many disagree with this view, this has been the predominant worldview in most of the West &#8212; and certainly in the United States &#8212; for centuries. But this understanding of truth is eroding rapidly, even among my co-religionists. <a href="https://www.arizonachristian.edu/wp-content/uploads/2020/05/AWVI-2020-Release-05-Perceptions-of-Truth.pdf">According to one study</a>, 58% of surveyed Americans believe &#8220;moral truth is up to the individual to decide,&#8221; and 46% of Evangelicals<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> &#8220;reject absolute moral truth.&#8221; Why do I bring this up? Because a society that rejects the idea of truth cannot trust, and a society that cannot trust, cannot long survive as a democracy.</p></li><li><p><strong>Our nation is a beautiful house of cards.</strong> American society is held up by institutions which are themselves braced by their legitimacy in the public&#8217;s mind. Remove legitimacy and the whole thing comes crashing down. Take our much-discussed electoral system as an example. For nearly two and half centuries, we have been able to peaceably transition political power because our citizens believed that electoral outcomes were determined by the will of the people and were, therefore, legitimate. Both political parties, however, are now systemically attacking this notion of legitimacy with the former president arguing his election loss was due to large-scale voter fraud and the current president saying rampant voter suppression is imposing a new reign of Bull Connor. Both assertions are categorically and demonstrably false; and yet, they are widely held. Unsurprisingly, this is leading to a hemorrhaging of legitimacy, <a href="https://news.northwestern.edu/stories/2020/12/38-of-americans-lack-confidence-in-election-fairness/">with more than one-third </a>of Americans saying they do not have confidence in the fairness of our last presidential election. If distrust of our elections continues to metastasize, it will eventually kill the legitimacy &#8212; and therefore the effectiveness &#8212; our entire political system.</p></li><li><p><strong>All of this has implications for tech and national security.</strong> Tech&#8217;s current fascination with virtual, augmented, and synthetic worlds will further loosen humanity&#8217;s grip on truth by making the real and the made up indistinguishable. Those without a metaphysical anchor are likely to be tossed about in a restless sea of bits and bytes. Many will simply let go of truth and allow the currents to sweep them away into a fathomless ocean of entertainment, ease, and moral relativity. These trends will further dwindle the number of people with the moral and intellectual capacity to navigate foreign policy and national security challenges. After all, how do you argue against China&#8217;s genocide against the Uyghurs if you ultimately believe the CCP is just a &#8220;strict parent?&#8221;<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> Or, how can we possibly marshal the nation&#8217;s political will to fight and die for our cause, if our own people don&#8217;t trust the government that is calling them to service?</p></li><li><p><strong>All is not lost.</strong> While I suspect we will pay a higher cost than is required, I also expect that we will, over time, change many of these trends. Michelle Dean has said, &#8220;Crisis forces commonality of purpose on one another.&#8221; I think this is true and, as our current confusion leads to a growing sense of crisis, I trust that we will again form a commonality of purpose and return to our senses. We have done it before and, by God&#8217;s grace, we can do it again.</p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-21-january-2022/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-21-january-2022/comments"><span>Leave a comment</span></a></p></li></ul><div><hr></div><h2>Let&#8217;s Get Visual</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.visualcapitalist.com/20-internet-giants-rule-web/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uqOu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fad22b08c-a57d-4b08-aebe-2cc7d1664e68_1200x1060.jpeg 424w, https://substackcdn.com/image/fetch/$s_!uqOu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fad22b08c-a57d-4b08-aebe-2cc7d1664e68_1200x1060.jpeg 848w, https://substackcdn.com/image/fetch/$s_!uqOu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fad22b08c-a57d-4b08-aebe-2cc7d1664e68_1200x1060.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!uqOu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fad22b08c-a57d-4b08-aebe-2cc7d1664e68_1200x1060.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uqOu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fad22b08c-a57d-4b08-aebe-2cc7d1664e68_1200x1060.jpeg" width="1100" height="972" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/ad22b08c-a57d-4b08-aebe-2cc7d1664e68_1200x1060.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:972,&quot;width&quot;:1100,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:585169,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:&quot;https://www.visualcapitalist.com/20-internet-giants-rule-web/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!uqOu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fad22b08c-a57d-4b08-aebe-2cc7d1664e68_1200x1060.jpeg 424w, https://substackcdn.com/image/fetch/$s_!uqOu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fad22b08c-a57d-4b08-aebe-2cc7d1664e68_1200x1060.jpeg 848w, https://substackcdn.com/image/fetch/$s_!uqOu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fad22b08c-a57d-4b08-aebe-2cc7d1664e68_1200x1060.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!uqOu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fad22b08c-a57d-4b08-aebe-2cc7d1664e68_1200x1060.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Visual Capitalist</figcaption></figure></div><div><hr></div><h2>Nerd Humor</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.instagram.com/p/CY6t-BmrV6C/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!y0z4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0ea80736-cfaf-4000-b441-61160102327b_1005x988.png 424w, https://substackcdn.com/image/fetch/$s_!y0z4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0ea80736-cfaf-4000-b441-61160102327b_1005x988.png 848w, https://substackcdn.com/image/fetch/$s_!y0z4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0ea80736-cfaf-4000-b441-61160102327b_1005x988.png 1272w, https://substackcdn.com/image/fetch/$s_!y0z4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0ea80736-cfaf-4000-b441-61160102327b_1005x988.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!y0z4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0ea80736-cfaf-4000-b441-61160102327b_1005x988.png" width="1005" height="988" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/0ea80736-cfaf-4000-b441-61160102327b_1005x988.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:988,&quot;width&quot;:1005,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:452615,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.instagram.com/p/CY6t-BmrV6C/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!y0z4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0ea80736-cfaf-4000-b441-61160102327b_1005x988.png 424w, https://substackcdn.com/image/fetch/$s_!y0z4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0ea80736-cfaf-4000-b441-61160102327b_1005x988.png 848w, https://substackcdn.com/image/fetch/$s_!y0z4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0ea80736-cfaf-4000-b441-61160102327b_1005x988.png 1272w, https://substackcdn.com/image/fetch/$s_!y0z4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0ea80736-cfaf-4000-b441-61160102327b_1005x988.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Nathan Pyle</figcaption></figure></div><div><hr></div><h2>Quick Clicks</h2><ul><li><p><a href="https://www.wsj.com/articles/china-notifies-firms-of-tougher-investment-rules-for-big-tech-11642581909?st=ouc5fw9uxerx3r7&amp;reflink=desktopwebshare_twitter">China notifies firms of tougher investment rules for tech</a></p></li><li><p><a href="https://www.reuters.com/world/middle-east/half-global-cyber-defence-investment-has-been-israel-pm-bennett-2022-01-18/">Israel says it is responsible for half of global cyber defense investment</a></p></li><li><p><a href="https://www.wired.com/story/north-korea-cryptocurrency-theft-ethereum/">North Korean hackers stole almost $400 million in crypto last year</a></p></li><li><p><a href="https://therecord.media/wp-content/themes/therecordmedia/">Europol takes down VPNLab</a></p></li><li><p><a href="https://www.wired.com/story/astrophysicists-release-the-biggest-map-of-the-universe-yet/">Astrophysicists release the biggest map of the universe ever created</a></p></li></ul><div><hr></div><p><em>That&#8217;s it for this Friday Brief. Thanks for reading, and if you think someone else would like this newsletter, please share it with your friends and followers. Have a great weekend!</em></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Defined as believing the Bible to be the true, reliable word of God.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p><a href="https://markets.businessinsider.com/news/stocks/ray-dalio-china-strict-parents-disappearances-human-rights-investing-bridgewater-2021-12">https://markets.businessinsider.com/news/stocks/ray-dalio-china-strict-parents-disappearances-human-rights-investing-bridgewater-2021-12</a></p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[The American Innovation and Choice Online Act Is A Mistake]]></title><description><![CDATA[The bill will harm American cyber and national security]]></description><link>https://www.thekitchensync.tech/p/the-american-innovation-and-choice</link><guid isPermaLink="false">https://www.thekitchensync.tech/p/the-american-innovation-and-choice</guid><dc:creator><![CDATA[Klon Kitchen]]></dc:creator><pubDate>Wed, 19 Jan 2022 21:09:42 GMT</pubDate><enclosure url="https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/0492c0c1-75fb-46dc-9fc9-80ca0509d980_1000x377.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>What&#8217;s New:</strong> On Thursday, the Senate Judiciary Committee (SJC) will be &#8220;marking up&#8221; the <a href="https://www.congress.gov/bill/117th-congress/senate-bill/2992/text">American Innovation and Choice Online Act (S.2992)</a>.</p><p><strong>Why This Matters:</strong> This bill would significantly change U.S. antitrust law and dramatically impact U.S. national security concerns.</p><p><strong>Key Points:</strong></p><ul><li><p>Senators Amy Klobuchar (D-MN) and Chuck Grassley (R-IA) introduced S.2992 and it&#8217;s currently being cosponsored by 11 others &#8212; Senators Durbin (D-IL), Graham (R-SC), Blumenthal (D-CT), Kennedy (R-LA), Booker (D-NJ), Lummis (R-WY), Hirono (D-HI), Warner (D-VA), Hawley (R-MO), and Daines (R-MT). </p></li><li><p>A &#8220;mark up&#8221; is when the committee meets to debate, amend, and rewrite the legislation. Once completed, Senate Majority Leader Chuck Schumer (D-NY) can then bring the bill to the Senate floor debate and a vote.</p></li><li><p>Currently, the bill has a narrow focus on a small number of &#8220;big tech&#8221; companies, with its rules applying only to those who (1) have 50 million monthly active users or 100,000 monthly active business users; (2) have sales or a market capitalization exceeding $550 billion; and (3) are a &#8220;critical trading partner for the sale or provision of any product or service offered on or directly related to the online platform.&#8221;</p></li><li><p>Ostensibly, the legislation wants to prevent leading tech companies from leveraging their position to unfairly benefit their own products and services. </p></li><li><p>A few of the major muscle movements from the text include (1) an explicit prohibition against privileging a platform&#8217;s own products and services; (2) mandates platforms be &#8220;interoperable&#8221; with one another; and (3) makes it illegal for tech companies to discriminate in the application or enforcement of their terms of service against competitors who use their platform.</p></li></ul><p><strong>What We&#8217;re Thinking:</strong></p><ul><li><p><strong>You can be angry and not be suicidal.</strong> Republican supporters are clear that they are at least partially motivated by concerns about &#8220;big tech&#8221; hurting conservatives online and enforcing &#8220;woke&#8221; orthodoxies on the general public. These views are broadly shared and, for the sake of argument, we&#8217;ll concede them without caveats. But, any effort to bring these companies to heel cannot do so at the expense of our national security &#8212; which this bill does and which we will explain further.</p></li><li><p><strong>"Preferencing&#8221; isn&#8217;t just about shelf space.</strong> Critics will often say it&#8217;s wrong for Amazon to preference its Amazon Basics brand over competitors who are using its platform to sell their products. While we could make an argument that this is no different than Costco placing its Kirkland brand merchandise on valuable eye-level shelves, the bill&#8217;s proposed remedy is confusing and could actually harm cybersecurity. For example, Google&#8217;s Threat Analysis Group (TAG) <a href="https://blog.google/threat-analysis-group/countering-threats-iran/">is reportedly tracking</a> more than 270 government-backed bad guys that are operating in more than 50 countries. In just the last year, TAG has issued more than 50K warnings and uses this threat information to make products like Gmail safer. But, the bill&#8217;s opaque language makes it possible that this type of proactive cybersecurity would be seen as preferencing Google&#8217;s services over other cybersecurity offerings and therefore a violation of the law. That&#8217;s nuts.</p></li><li><p><strong>Interoperability and &#8220;sideloading&#8221; could hurt individual and national cybersecurity.</strong> Requirements that tech platforms build their products and services in such a way that they are interoperable with everyone else necessarily defaults to the lowest common denominator on cybersecurity standards and will lead to a rapid race-to-the-bottom. Similarly, the legislation&#8217;s requirement that companies like Apple allow users to download software and apps from sources outside of the company&#8217;s app store will also massively degrade user cybersecurity. Currently, if you want your app to be available for iPhones (<a href="https://www.counterpointresearch.com/global-smartphone-share/">only 14% of the global smartphone market</a>, by the way), then you have to be in the Apple app store. But, you can only be in this app store if you meet the company&#8217;s stringent security requirements. S.2992 deems this practice &#8220;unfair&#8221; and illegal. Other app stores have much lower security requirements and other mobile operating systems allow this type of &#8220;sideloading&#8221; of apps. The result? There&#8217;s been a proliferation of fake programs in less secure app stores, include Chinese clones of WhatsApp, Telegram, and Signal &#8212; all of which have fooled users into downloading them and funneling their private data back to the Chinese Communist Party. Apple&#8217;s &#8220;walled garden&#8221; strategy, on the contrary, also constrains what data is collected by developers and how this data can be used &#8212; something most privacy-minded Republicans would seemingly support. </p></li><li><p><strong>China won&#8217;t play by these rules.</strong> Foreign tech companies will not be bound by these rules and so, if passed, S.2992 will hamstring American companies while leaving global competitors with greater agility. This bill is about more than a few U.S. tech companies being brought down a peg; it&#8217;s about us voluntarily ceding critical technological and economic advantage to countries like China at a time when leading in key technologies and tech markets is critical for our nation&#8217;s long-term thriving.</p></li><li><p><strong>We&#8217;re not thinking about the long-game.</strong> Large tech companies will be the chief suppliers of next-generation warfighting capabilities like artificial intelligence, robotics, and quantum computing. Last year, Alphabet, Amazon, Apple, Facebook, Intel and Microsoft alone spent a combined $140 billion on research and development (R&amp;D), not including acquisitions. The&nbsp;<a href="https://www.aip.org/fyi/2020/final-fy20-appropriations-dod-science-and-technology">Pentagon&#8217;s R&amp;D budget for the same year</a>&nbsp;was $109 billion. Why were six U.S. companies able to outspend and out-innovate the U.S. government? Because they are profitable. And they are profitable because they are big. Pushing the frontiers of science and pioneering game-changing technologies is expensive. The resources and talent to do these things are highly valuable and desperately scarce. It&#8217;s no coincidence, then, that the companies that have found ways to attract billions of customers &#8212; and the profits that come with them &#8212; are the ones at the center of these innovations. Do we really need to dismantle them in order to address our other concerns? We don&#8217;t think so.</p></li><li><p><strong>Economic security is national security.</strong> Going after our technology companies, particularly a targeted shot at certain big ones, sends the wrong message to startups and investors alike; it tells them that if you are innovative enough to be successful and grow significantly larger, you may be targeted for different treatment. That is simply not the approach we&#8217;ve taken as a nation to concerns about competition. Instead we&#8217;ve outlined the conduct we think is problematic or undermines competition and we&#8217;ve sought to prohibit this  conduct. To now say that different rules apply if you get to a certain size simply punishes success without dealing with the actual problem. This undermines not only the companies that are likely to be investing in R&amp;D over the next decade and generating some of the key innovations that will contribute to our national security, it also undermines a central proposition that has created a robust tech ecosystem in this country:&nbsp; take risk, innovate, fail fast and often, and when you succeed, reap the rewards so long as you don&#8217;t exploit your position to gain unfair advantage.&nbsp;</p></li></ul><p><strong>What Should Be Done:</strong></p><ul><li><p><strong>Ideally, we should build a tailored solution. </strong>As written, the bill is too broad, too opaque, and chock-full of unintended consequences. S.2992 could seriously damage American security and no amount of political revenge on &#8220;big tech&#8221; is worth that risk. </p></li><li><p><strong>At the very least, the Committee should delay the mark up and hold public hearings before proceeding further.</strong> The mark up on S.2992 was originally scheduled for next week. This was changed on Friday of last week and new bill text was dropped this morning. In addition to the points laid out above, there are dozens of other questions about this bill that need to be understood and answered. And it&#8217;s not just us who have these concerns &#8212; 12 national security leaders&nbsp;<a href="https://www.documentcloud.org/documents/21062393-national-security-letter-on-antitrust?responsive=1&amp;title=1">warned</a>&nbsp;Congress in a letter that it needs to better understand the national security implications of antitrust bills currently under consideration. The authors include a former Secretary of Defense, former Director of National Intelligence, former CIA executives, and a former White House Homeland Security adviser. Unless we are willing to dismiss these individuals as techie shills, shouldn&#8217;t we at least consider their warnings via public hearings and testimonies? Isn&#8217;t that the way the process is supposed to work? </p></li></ul>]]></content:encoded></item><item><title><![CDATA[Friday Brief for 14 January 2022]]></title><description><![CDATA[Listen now | Coercing Russia with tech; Kazakhstan's crypto collapse; & Cybersecurity nutrition labels]]></description><link>https://www.thekitchensync.tech/p/friday-brief-for-14-january-2022</link><guid isPermaLink="false">https://www.thekitchensync.tech/p/friday-brief-for-14-january-2022</guid><dc:creator><![CDATA[Klon Kitchen]]></dc:creator><pubDate>Fri, 14 Jan 2022 11:00:47 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/46890976/275a39b2021842ce561d0b359e951350.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Uh2b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 424w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 848w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1272w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png" width="737" height="121.605" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:null,&quot;height&quot;:165,&quot;width&quot;:1000,&quot;resizeWidth&quot;:737,&quot;bytes&quot;:12912,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 424w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 848w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1272w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><div><hr></div><h4>Heads Up</h4><p>Bill Drexel and I have a new article arguing that the United States and Taiwan need unprecedented cooperation in order to secure the island from Chinese invasion and cyber attacks.</p><blockquote><p>&#8220;In the domain of Sino-American tech rivalry, Taiwan is unique in two aspects: First, the Taiwan Semiconductor Manufacturing Corporation (TSMC) remains the world&#8217;s tightest bottleneck in the global high-tech ecosystem, with exclusive capabilities to construct the most valuable, sophisticated computer chips in existence. Second, military conflagration in Taiwan would represent a hitherto-unknown level of cyber-intensive military conflict, the seeds of which likely have already been planted. Both of these realities demand unprecedented cooperation between the United States and Taiwan&#8212;cooperation that requires significant trust and openness in Taipei and significant counter-espionage and national security assistance from Washington.&#8221;</p></blockquote><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:47070716,&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/securing-taiwan-requires-immediate&quot;,&quot;publication_id&quot;:243606,&quot;publication_name&quot;:&quot;The Kitchen Sync&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/4a5e18da-b391-43b3-8db4-c5cab0426e9a_256x256.png&quot;,&quot;title&quot;:&quot;Securing Taiwan Requires Immediate Unprecedented Cyber Action&quot;,&quot;truncated_body_text&quot;:&quot;The prospect of a Chinese invasion of Taiwan echoes some of the most disastrous 20th century instances of great power expansion&#8212;reminiscent, perhaps, of Nazi Germany&#8217;s Anschluss or even its subsequent invasion of Poland. Given that the latter ignited World War II, America&#8217;s strategic community has been rightly fixated on the vast military and political &#8230;&quot;,&quot;date&quot;:&quot;2022-01-13T16:25:24.754Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:4355149,&quot;name&quot;:&quot;Klon Kitchen&quot;,&quot;photo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/da60edbc-bc00-451f-85e5-2d561aea1110_1149x766.jpeg&quot;,&quot;bio&quot;:&quot;I&#8217;m a technology and foreign policy entrepreneur, practitioner, and a scholar at the American Enterprise Institute, with more than 20 years of public service.&quot;,&quot;profile_set_up_at&quot;:&quot;2021-04-23T13:24:45.303Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:209250,&quot;user_id&quot;:4355149,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:243606,&quot;name&quot;:&quot;The Kitchen Sync&quot;,&quot;subdomain&quot;:&quot;thekitchensync&quot;,&quot;custom_domain&quot;:&quot;www.thekitchensync.tech&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Serious thoughts on technology and national security, from someone who doesn't take himself too seriously.&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/4a5e18da-b391-43b3-8db4-c5cab0426e9a_256x256.png&quot;,&quot;author_id&quot;:4355149,&quot;theme_var_background_pop&quot;:&quot;#2096ff&quot;,&quot;created_at&quot;:&quot;2020-12-21T15:40:40.426Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;The Kitchen Sync&quot;,&quot;copyright&quot;:&quot;Klon Kitchen&quot;,&quot;founding_plan_name&quot;:&quot;Founder&quot;,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false}}],&quot;is_guest&quot;:false},{&quot;id&quot;:35441470,&quot;name&quot;:&quot;Bill Drexel&quot;,&quot;photo_url&quot;:null,&quot;bio&quot;:&quot;Bill Drexel is a Research Associate at the AEI. He previously consulted with the UN on tech ethics in humanitarian contexts and studied Chinese state surveillance in Beijing. He holds degrees from Yale and Cambridge universities.&quot;,&quot;profile_set_up_at&quot;:null,&quot;publicationUsers&quot;:[],&quot;is_guest&quot;:false}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:false,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.thekitchensync.tech/p/securing-taiwan-requires-immediate?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!K7lp!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4a5e18da-b391-43b3-8db4-c5cab0426e9a_256x256.png"><span class="embedded-post-publication-name">The Kitchen Sync</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Securing Taiwan Requires Immediate Unprecedented Cyber Action</div></div><div class="embedded-post-body">The prospect of a Chinese invasion of Taiwan echoes some of the most disastrous 20th century instances of great power expansion&#8212;reminiscent, perhaps, of Nazi Germany&#8217;s Anschluss or even its subsequent invasion of Poland. Given that the latter ignited World War II, America&#8217;s strategic community has been rightly fixated on the vast military and political &#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">4 years ago &#183; Klon Kitchen and Bill Drexel</div></a></div><div><hr></div><h4>Tech Terms</h4><blockquote><p><strong><a href="https://www.ourcommunity.com.au/tech/tech_article.jsp?articleId=74">Secure Socket Layering (SSL)</a> &#8212; </strong><em>SSL is a protocol that allows Internet users to send encrypted messages across the Internet. It is generally used when transmitting confidential information (e.g. personal data or credit card details). A web address that begins with "https" indicates that an SSL connection is in use.</em></p></blockquote><div><hr></div><h2>Tech Policy as Coercive Diplomacy</h2><p><strong>What&#8217;s New: </strong>The United States is considering sanctions that would deny Russia access to key technologies as the two nations face off over Ukraine.</p><p><strong>Why This Matters: </strong>As technology grows in economic, social, military, and political importance, so does its potential as a means of leverage in global affairs.</p><p><strong>Key Points:</strong></p><ul><li><p>The Biden administration is putting together a suite of actions, <a href="https://www.nytimes.com/2022/01/08/us/politics/us-sanctions-russia-ukraine.html">according to the New York Times</a>, that would &#8220;target some of Mr. Putin&#8217;s favored industries &#8212; particularly aerospace and arms, which are major producers of revenue for the Russian government.&#8221;</p></li></ul><blockquote><p>&#8220;The focus would be on Russian-built fighter aircraft, antiaircraft systems, antisatellite systems, space systems and emerging technologies where Russia is hoping to make gains, like artificial intelligence and quantum computing,&#8221; says the New York Times story. </p></blockquote><ul><li><p>The proposed sanctions would ban Russia from purchasing semiconductors that rely on American design, as well as machines that use these chips &#8212; everything from mobile phones, to personal computers, to dishwashers and refrigerators.</p></li></ul><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>This is a modernized version of a proven foreign policy tool.</strong> Coercive diplomacy is a long-practiced and formally-studied form of statecraft. The general idea, as explained by Alexander George in <em>The General Theory of Coercive Diplomacy, </em>is to &#8220;back one's demand to an adversary with a threat of punishment for noncompliance that he will consider credible and potent enough to persuade him to comply with the demand."<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> </p></li><li><p><strong>There are three general strategies of coercive diplomacy.</strong> First, you can issue an ultimatum &#8212; drawing a &#8220;redline&#8221; and giving a drop-dead date for compliance. Second, you can &#8220;try-and-see.&#8221; In this case, an ultimatum is issued but no deadline is given and the threatening party observes the behavior of its target and adjusts accordingly. Finally, third, you can &#8220;turn the screw,&#8221; where a target is told what behavior is expected and pressure or punishment are incrementally increased. The first strategy is the most aggressive while the second and third strategies allow for more agility. Right now, the United States appears to be employing the second strategy but may shift to the third approach after a Russian invasion.</p></li><li><p><strong>Tech sanctions are powerful and play to U.S. strengths, but they are no silver bullet.</strong> Even though the United States does not manufacture most of the world&#8217;s technology, it does play a decisive role in their design and in consumer demand. Leveraging this point of power has proven effective in the case of China and Huawei, for example. By working with foreign semiconductor manufacturers to deny access to advanced chipsets, the United States has crippled the telecommunications company&#8217;s ability to innovate or even meet current requirements &#8212; <a href="https://www.wsj.com/articles/u-s-restrictions-push-huaweis-revenue-down-by-nearly-a-third-11640934969#:~:text=Huawei's%20revenue%20fell%2029%25%20to,from%20its%20chairman%2C%20Guo%20Ping.">causing profits to fall nearly 30% last year</a>. Even so, Russia&#8217;s consumers are not nearly as demanding for technological goods as are China&#8217;s, and if punishing sanctions are imposed, it is possible Russians would primarily blame the United States, and not the Kremlin, for the disruption. Beyond this, however, cutting off Moscow from key tech could dramatically constrain the nation&#8217;s military industry which is a key source of economic strength and is likely being considered very seriously by Putin &#8212; with <a href="https://t.co/jRWx86URaa">Russian markets dropping 6%</a> this week after the apparent breakdown of U.S. talks.</p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-14-january-2022/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-14-january-2022/comments"><span>Leave a comment</span></a></p></li></ul><div><hr></div><h2>Crypto Mining Goes Down With Kazakhstan</h2><p><strong>What&#8217;s New: </strong>Once a crypto currency center of gravity, political unrest and other problems are killing Kazakhstan&#8217;s digital mining industry.</p><p><strong>Why This Matters: </strong>The nation&#8217;s unstable political situation and unreliable power and other essential services are gutting its once-growing crypto mining economy &#8212; costing the nation millions and further inflaming domestic frustration.</p><p><strong>Key Points:</strong></p><ul><li><p>Miners compete to complete &#8220;blocks&#8221; of verified transactions, which are then added to the coin&#8217;s digital ledger, called the &#8220;blockchain.&#8221; (Here&#8217;s a <a href="https://greenerideal.com/news/is-solar-powered-bitcoin-mining-the-future/attachment/2cc67f9762b72c3f4742266afe78dad1/">simple infographic</a> if you&#8217;d like to learn more)</p></li><li><p>Mining &#8220;rigs&#8221; &#8212; groups of networked computers &#8212; either use application-specific integrated circuits (ASIC) or graphics processing units (GPU) to complete these calculations, both of which require substantial computational power and energy consumption.</p></li><li><p>After China shut down crypto mining within its borders last year, Kazakhstan became an attractive alternative because of its relative proximity, permissive legal environment, and rich energy sources. <a href="https://www.ft.com/content/086b7ec7-f71a-4214-bfa0-5644852056f3">As many as 87,849 machines</a> relocated to Kazakhstan, accounting for more than 18% of the global Bitcoin mining as of last August.</p></li><li><p>That&#8217;s all changing as fuel prices surge, Kazakhs protest, and Russian troops roam the country.</p></li><li><p>Even as Kazakhstan&#8217;s President Kassym-Jomart Tokayev has restored some semblance of order &#8212; backed by the Russian military &#8212; internet and power outages continue and crypto mining declined by more than 12% last week.</p></li><li><p>The recent protests began over fuel prices, but are also about longer-standing issues like economic weakness and income inequality &#8212; none of which are going away.</p></li></ul><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>It&#8217;s a short hop from crypto boom to bust.</strong> Kazakhstan is an example of how a nation can realize new opportunities with new technologies but also how those same technologies can strain a nation&#8217;s underlying capacity. It didn&#8217;t take long for crypto mining to push the country&#8217;s energy infrastructure to the brink, forcing the government to shut down a major mining farm in November. Throw in a healthy dose of political instability and you get yet another dynamic that geostrategists must now account for as they seek to understand and shape the international order.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-14-january-2022/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-14-january-2022/comments"><span>Leave a comment</span></a></p><div><hr></div><h2>Commerce Considering Cybersecurity Labels</h2><p><strong>What&#8217;s New: </strong>The U.S. government is considering nutrition-like labels to help consumers assess cyber risk, <a href="https://www.washingtonpost.com/politics/2022/01/13/cybersecurity-labels-consumer-products-could-be-way/">according to the Washington Post</a>.</p><p><strong>Why This Matters: </strong>Similar labeling efforts have been considered and implemented in related contexts &#8212; for example, Apple uses simple labels to help app store customers understand what data apps collect.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.apple.com/privacy/labels/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hTRQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F59192f4a-e7cc-4aec-bd99-ab4d7881f954_1034x688.png 424w, https://substackcdn.com/image/fetch/$s_!hTRQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F59192f4a-e7cc-4aec-bd99-ab4d7881f954_1034x688.png 848w, https://substackcdn.com/image/fetch/$s_!hTRQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F59192f4a-e7cc-4aec-bd99-ab4d7881f954_1034x688.png 1272w, https://substackcdn.com/image/fetch/$s_!hTRQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F59192f4a-e7cc-4aec-bd99-ab4d7881f954_1034x688.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hTRQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F59192f4a-e7cc-4aec-bd99-ab4d7881f954_1034x688.png" width="1034" height="688" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/59192f4a-e7cc-4aec-bd99-ab4d7881f954_1034x688.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:688,&quot;width&quot;:1034,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:86434,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.apple.com/privacy/labels/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hTRQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F59192f4a-e7cc-4aec-bd99-ab4d7881f954_1034x688.png 424w, https://substackcdn.com/image/fetch/$s_!hTRQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F59192f4a-e7cc-4aec-bd99-ab4d7881f954_1034x688.png 848w, https://substackcdn.com/image/fetch/$s_!hTRQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F59192f4a-e7cc-4aec-bd99-ab4d7881f954_1034x688.png 1272w, https://substackcdn.com/image/fetch/$s_!hTRQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F59192f4a-e7cc-4aec-bd99-ab4d7881f954_1034x688.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Key Points:</strong></p><ul><li><p>The National Institute of Standards and Technology (NIST) is running lead on a set of standards for the labels &#8212; intended to help consumers know which of their internet-connected devices is most vulnerable for hacking.</p></li><li><p>Ideally, the standards will allow industry to voluntarily adopt a verification and labeling program that tells users how good (or bad) a device or service is when it comes to basic cybersecurity practices like patching and information security.</p></li><li><p>The government hopes this will eventually work the same way energy efficiency labels work on U.S. appliances.</p></li></ul><blockquote><p> &#8220;Making security relatable to someone's daily life and how it can impact them is really critical for the success of this,&#8221;&nbsp;Julie Haney, an NIST computer scientist who&#8217;s working on the project.</p></blockquote><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>Growing consumer awareness is a good thing.</strong> As explained, the government is not rolling out new regulations. Instead, it&#8217;s issuing a set of standards that companies can voluntarily meet and reference so that customers can make more informed choices. In light of the fact that more than 64 billion internet-connected devices are expected to be online by 2025, this seems like a generally easy and non-intrusive effort at improving the nation&#8217;s cybersecurity.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-14-january-2022/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-14-january-2022/comments"><span>Leave a comment</span></a></p><div><hr></div><h2>Let&#8217;s Get Visual</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.visualcapitalist.com/prediction-consensus-what-the-experts-see-coming-in-2022/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pxju!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2fa1ed50-01c1-4eab-a38a-88f24e6cbffd_1200x1474.jpeg 424w, https://substackcdn.com/image/fetch/$s_!pxju!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2fa1ed50-01c1-4eab-a38a-88f24e6cbffd_1200x1474.jpeg 848w, https://substackcdn.com/image/fetch/$s_!pxju!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2fa1ed50-01c1-4eab-a38a-88f24e6cbffd_1200x1474.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!pxju!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2fa1ed50-01c1-4eab-a38a-88f24e6cbffd_1200x1474.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pxju!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2fa1ed50-01c1-4eab-a38a-88f24e6cbffd_1200x1474.jpeg" width="1100" height="1351" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/2fa1ed50-01c1-4eab-a38a-88f24e6cbffd_1200x1474.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1351,&quot;width&quot;:1100,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1621056,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://www.visualcapitalist.com/prediction-consensus-what-the-experts-see-coming-in-2022/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!pxju!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2fa1ed50-01c1-4eab-a38a-88f24e6cbffd_1200x1474.jpeg 424w, https://substackcdn.com/image/fetch/$s_!pxju!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2fa1ed50-01c1-4eab-a38a-88f24e6cbffd_1200x1474.jpeg 848w, https://substackcdn.com/image/fetch/$s_!pxju!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2fa1ed50-01c1-4eab-a38a-88f24e6cbffd_1200x1474.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!pxju!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F2fa1ed50-01c1-4eab-a38a-88f24e6cbffd_1200x1474.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Visual Capitalist</figcaption></figure></div><div><hr></div><h2>Nerd Humor</h2><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://twitter.com/nycartoons/status/1479090423385796609?s=20&quot;,&quot;full_text&quot;:&quot;Cartoon by Ken Levine\n\n&#8220;He who controls the Internet controls the world.&#8221;\n\n<a class=\&quot;tweet-url\&quot; href=\&quot;https://www.newyorker.com/cartoon/a26058\&quot;>newyorker.com/cartoon/a26058</a> &quot;,&quot;username&quot;:&quot;nycartoons&quot;,&quot;name&quot;:&quot;New Yorker Cartoons&quot;,&quot;profile_image_url&quot;:&quot;&quot;,&quot;date&quot;:&quot;Thu Jan 06 14:00:11 +0000 2022&quot;,&quot;photos&quot;:[{&quot;img_url&quot;:&quot;https://pbs.substack.com/media/FIbI5xFX0AM79w9.jpg&quot;,&quot;link_url&quot;:&quot;https://t.co/jrPJhE2VKm&quot;,&quot;alt_text&quot;:null}],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:0,&quot;retweet_count&quot;:13,&quot;like_count&quot;:48,&quot;impression_count&quot;:0,&quot;expanded_url&quot;:{},&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><div><hr></div><h2>Quick Clicks</h2><ul><li><p><a href="https://www.wsj.com/articles/hungry-for-chips-huawei-invests-in-chinese-companies-that-make-them-11641819638?mod=rss_Technology">Huawei turning to Chinese companies for vital semiconductors</a></p></li><li><p><a href="https://www.wsj.com/articles/intel-erases-reference-to-chinas-xinjiang-after-social-media-backlash-11641808676?mod=rss_Technology">Intel continues to cower before China (pathetic)</a></p></li><li><p><a href="https://www.wired.com/story/ios-15-app-privacy-report/">How to read your iOS 15 app privacy report</a></p></li><li><p><a href="https://www.bloomberg.com/news/articles/2022-01-10/danish-intelligence-chief-jailed-following-surveillance-scandal">Danish INTEL chief jailed after surveillance scandal</a></p></li><li><p><a href="https://www.washingtonpost.com/politics/2022/01/12/congress-update-government-cyber-rules-one-year-after-solarwinds/">Federal cybersecurity rules are out of date, lawmakers say</a></p></li></ul><div><hr></div><p><em>That&#8217;s it for this Friday Brief. Thanks for reading, and if you think someone else would like this newsletter, please share it with your friends and followers. Have a great weekend!</em></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Alexander George, "The General Theory and Logic of Coercive Diplomacy," part in&nbsp;<em>Forceful Persuasion: Coercive Diplomacy as an Alternative to War</em>, (Washington, D.C.: United States Institute of Peace Press, 1991), pp. 4</p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[Securing Taiwan Requires Immediate Unprecedented Cyber Action]]></title><description><![CDATA[The prospect of a Chinese invasion of Taiwan echoes some of the most disastrous 20th century instances of great power expansion&#8212;reminiscent, perhaps, of Nazi Germany&#8217;s Anschluss or even its subsequent invasion of Poland.]]></description><link>https://www.thekitchensync.tech/p/securing-taiwan-requires-immediate</link><guid isPermaLink="false">https://www.thekitchensync.tech/p/securing-taiwan-requires-immediate</guid><dc:creator><![CDATA[Klon Kitchen]]></dc:creator><pubDate>Thu, 13 Jan 2022 16:25:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!K7lp!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4a5e18da-b391-43b3-8db4-c5cab0426e9a_256x256.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The prospect of a Chinese invasion of Taiwan echoes some of the most disastrous 20th century instances of great power expansion&#8212;reminiscent, perhaps, of Nazi Germany&#8217;s Anschluss or even its subsequent invasion of Poland. Given that the latter ignited World War II, America&#8217;s strategic community has been rightly fixated on the vast military and political contingencies of a Chinese invasion that would remake Asia.&nbsp;</p><p>But Taiwan is not just the geopolitical fulcrum of the Indo-Pacific; it is also the nexus of a rapidly evolving Sino-American technological competition. And if 20th century great power competition is any guide, tech races are just as important to long-term competition as territorial military contests. The U.S. needs to act now to secure the technological dimensions of a looming Taiwan crisis, or risk losing far more than the island.&nbsp;</p><p>In the domain of Sino-American tech rivalry, Taiwan is unique in two aspects: First, the Taiwan Semiconductor Manufacturing Corporation (TSMC) remains the world&#8217;s tightest bottleneck in the global high-tech ecosystem, with exclusive capabilities to construct the most valuable, sophisticated computer chips in existence. Second, military conflagration in Taiwan would represent a hitherto-unknown level of cyber-intensive military conflict, the seeds of which likely have already been planted. Both of these realities demand unprecedented cooperation between the United States and Taiwan&#8212;cooperation that requires significant trust and openness in Taipei and significant counter-espionage and national security assistance from Washington.&nbsp;</p><p><strong>The Silicon Brain Trust</strong></p><p>It&#8217;s hard to overstate the importance of TSMC&#8217;s microscopic transistors: The company&#8217;s chips are the foundation of enormous sectors of national economic growth for both the U.S. and China. They are also the backbone of the massively consequential tech <a href="https://www.washingtonpost.com/technology/2021/09/21/us-china-tech-competition/">race</a> between the two countries in security-essential sectors like artificial intelligence, quantum computing and advanced military capabilities. TSMC is <a href="https://time.com/6102879/semiconductor-chip-shortage-tsmc/">estimated</a> to have cornered as much as 90 percent market share of the world&#8217;s most advanced processors, and controls a majority of the global market for made-to-order chips. To stretch the historical analogy, it is as though a coterie of the world&#8217;s most accomplished nuclear physicists lived in a country that the Nazis aimed to annex in the 1930s, or like a collection of world-leading rocket scientists were on the verge of being absorbed into the Soviet bloc at the height of the Cold War.&nbsp;</p><p>It&#8217;s no coincidence that the world&#8217;s most precious technological capabilities are nestled in the world&#8217;s hottest geopolitical fault line. Taiwan&#8217;s government has long cultivated a &#8220;silicon shield&#8221; over the island in hopes that unique dominance in a crucial&#8212;but delicate&#8212;industry would deter China from rash actions against the island. In terms of imports, China spends more on semiconductors than on anything else&#8212;including <a href="https://technode.com/2021/04/29/china-spends-more-importing-semiconductors-than-oil/">oil</a>&#8212;and in 2020, China&#8217;s semiconductor trade deficit stood at a whopping $233 billion. By intertwining Beijing&#8217;s long-term economic and strategic interests with Taiwanese semiconductors, the thought went, the PRC would be unlikely to invade the island because it would invite devastating supply-chain disruptions.</p><p>But that calculus may be changing. Stricter export controls on American-designed chips have stymied China&#8217;s access to advanced semiconductors from TSMC and elsewhere. The U.S. sanctions that cut off vital TSMC chips to Huawei, <a href="https://www.aei.org/op-eds/huaweis-decline-shows-why-china-will-struggle-to-dominate/">crippling</a> many of the company&#8217;s prospects, seem ominous to many Chinese strategists. If Beijing&#8217;s decision-makers come to believe that something like Huawei&#8217;s fate awaits the PRC more broadly, Taiwan&#8217;s &#8220;silicon shield&#8221; will crack: Beijing would have nothing to lose, technologically speaking, from an invasion. If China could seize and leverage the personnel and facilities of TSMC effectively&#8212;or at least ensure they don&#8217;t continue accelerating U.S. technologies&#8212;it could have everything to gain.&nbsp;</p><p>Chinese efforts aside from an invasion have failed. Despite President Xi Jinping&#8217;s <a href="https://www.csis.org/analysis/chinas-pursuit-semiconductor-independence">forceful</a> statements on the immense value of semiconductor technologies for China&#8217;s security, little progress has been made in the mainland. China has already tried to recruit TSMC leaders to its own chip industry with <a href="https://asia.nikkei.com/Business/Tech/Semiconductors/4-directors-quit-board-of-top-Chinese-chipmaker-SMIC">limited</a> success. Chinese hackers have been waging a chronic war on the company and have already <a href="https://www.wired.com/story/chinese-hackers-taiwan-semiconductor-industry-skeleton-key/">stolen</a> disturbingly large troves of information. But despite these efforts and <a href="https://www.wsj.com/articles/more-chips-will-be-made-in-america-amid-a-global-spending-surge-11637762400">the vast sums</a> of money that China and other governments around the world are pouring into semiconductor alternatives, TSMC&#8217;s dominance in many of the most complex and competitive chip production techniques seems to only be <a href="https://www.bloomberg.com/news/features/2021-01-25/the-world-is-dangerously-dependent-on-taiwan-for-semiconductors">growing</a>. If China cannot buy, poach or steal TSMC&#8217;s talent, its next best option may be to conquer it&#8212;which is convenient enough, for a dictator who seems determined to reunify Taiwan with the PRC.&nbsp;</p><p>Ultra-sophisticated chips are a prerequisite for vast sectors of economic growth and are the key to a massively consequential tech <a href="https://www.washingtonpost.com/technology/2021/09/21/us-china-tech-competition/">race</a> between the U.S. and China. Given those factors, the U.S. cannot afford to gamble on the fate of the world&#8217;s most advanced chipmakers. In light of the shifting incentives of Beijing, any American contingency plan for a Chinese invasion that does not coordinate with Taipei now on quickly securing the TSMC &#8220;brain trust&#8221; and their families in the event of a crisis is woefully incomplete. In the event of a successful Chinese invasion, and with proper planning, TSMC engineers and scientists have the potential to fulfill a similar role to that of the German Jewish refugees who were so <a href="https://online.norwich.edu/academic-programs/resources/who-were-the-manhattan-project-scientists">central</a> to the success of the Manhattan Project in the 1940s&#8212;if the U.S. can ensure their safety. On the other hand, their loss could set back global technological development by years, or supercharge China&#8217;s edge in advanced technologies.&nbsp;</p><p>Relatedly, U.S. counter-espionage efforts also need to focus on protecting the full design and production chain of advanced semiconductors around the world. Attempts to try to diversify TSMC&#8217;s geographic presence with new fabrication facilities (or &#8220;fabs&#8221;) in Arizona, Japan and possibly <a href="https://www.bloomberg.com/news/articles/2021-12-11/tsmc-in-early-stage-contact-with-germany-about-potential-plant">Germany</a> are not without risks. Nor are the efforts to expand the capacity of alternative companies to compete with Taiwan&#8217;s dominance in the sector. Diversified expertise will ultimately mean more targets for one of the PRC&#8217;s most urgent intelligence objectives. Protecting such vital intellectual property will require similar procedures and approaches to those used in the construction of America&#8217;s most sensitive sites&#8212;like military bases, intelligence agency facilities and nuclear weapons depots. Outfitting new fabs with such precautions will be costly, but not nearly as costly as a major breach of techniques, designs or data to the PRC.&nbsp;</p><p><strong>Cyberwarfare</strong></p><p>Chip manufacturing is not the only technologically unique feature of a looming Taiwan crisis. Warfare writ large is at an inflection point, as emerging technologies subvert and transform conventional conflict, particularly between highly networked societies. In the coming decades, tensions between technologically advanced states are likely to manifest increasingly&#8212;and perhaps predominantly&#8212;in the cyber domain. Taiwan is also at the forefront of this world-altering trend: Never before have such technologically sophisticated states, with such highly networked communications, infrastructure and weapons, risked all-out war.&nbsp;</p><p>As the head of Taiwan&#8217;s Department of Cyber Security <a href="https://www.cnn.com/2021/07/23/tech/taiwan-china-cybersecurity-intl-hnk/index.html">noted</a>, Taiwan&#8217;s &#8220;critical infrastructure, such as gas, water and electricity are highly digitized,&#8221; meaning that the right cyberattack from China could prove catastrophic and leave the island in disarray. More than a few commentators have <a href="https://www.aei.org/articles/new-u-s-indo-pacific-strategy-isnt-going-to-scare-china/">suggested</a> that, in the event of an invasion, Beijing would very likely seek a fait accompli<em> </em>victory&#8212;a decisively rapid takeover of the island involving a debilitating cyberattack that would avoid a longer and more costly war with the U.S. Due to Taiwan&#8217;s level of networked sophistication and Beijing&#8217;s strategic imperatives, the unprecedented use of cyberwarfare in Taiwan is more likely than not.&nbsp;</p><p>But emerging cyberwarfare tactics differ markedly from conventional dynamics, not least in the degree to which they are covert and preemptive. Networks can be infiltrated silently and exploited months later in an explosive instant. And while the estimated 200-400 cyberattacks that Taiwan endures from China <a href="https://www.voanews.com/a/how-china-could-cyberattack-taiwan/6349594.html">each month</a> don&#8217;t constitute acts of war, even one successful attempt to worm into Taiwan&#8217;s networks could prove more destructive than any bomb if a military conflict were to kick off. Put simply, cyberwarfare would commence well before formal conflict.&nbsp;</p><p>Building on successful U.S.-Taiwan joint cyberwar <a href="https://www.bbc.com/news/technology-50289974">exercises</a>, the U.S. needs to work with Taipei to threat-hunt on Taiwanese networks as soon as possible. Cyberattacks do not necessarily constitute acts of war, so the U.S. aiding Taiwan&#8217;s defense in cyberspace most likely wouldn&#8217;t substantively risk upsetting today&#8217;s delicate political equilibrium in the Taiwan Strait, save perhaps further deterring Chinese aggression. It would, however, give the island-state a fighting chance against the legions of Chinese military hackers arrayed against it.&nbsp;</p><p>That aid would require direct U.S. access to Taiwanese servers, an unusual arrangement between sovereign states. Certainly Taipei could be forgiven for any hesitation about allowing such broad access, but China is likely already in these networks and bringing U.S. muscle to Taiwan&#8217;s cyber defenses could be the difference between crumbling under a Chinese offensive and maintaining robust defensive capabilities. Aside from bolstering commitments to Taiwan, the U.S. would also gain indispensable experience in navigating the cyber conflicts of the future, particularly one in which its primary geostrategic rival is the aggressor. The only alternative, trying to hunt down network vulnerabilities at the onset of conflict, would be far too little too late.</p><p>Contemporary Taiwan may be unique in the history of great power competition in the degree to which both geopolitical conquest and a superpower tech race are at stake. Each requires different, but interrelated, preparations on distinct timescales. Any strategy that fails to weigh the two together is not a winning one. And while no part of a Chinese invasion on Taiwan will be easy, the U.S.&#8217;s urgent technological priorities are, at least, clear&#8212;and ripe for immediate action.</p><p>This article originally appeared on the <a href="https://www.lawfareblog.com/securing-taiwan-requires-immediate-unprecedented-cyber-action">Lawfare Blog</a>. </p>]]></content:encoded></item><item><title><![CDATA[Cyber at the Center of Power]]></title><description><![CDATA[A Kitchen Sync Conversation with David Sanger]]></description><link>https://www.thekitchensync.tech/p/cyber-at-the-center-of-power</link><guid isPermaLink="false">https://www.thekitchensync.tech/p/cyber-at-the-center-of-power</guid><dc:creator><![CDATA[Klon Kitchen]]></dc:creator><pubDate>Thu, 13 Jan 2022 11:00:52 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/46962360/7a2d368cdfc06a1b956ff198eb5f1e07.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><a href="https://www.nytimes.com/by/david-e-sanger">David E. Sanger</a> is a White House and national security correspondent, and a senior writer. In a 38-year reporting career for The New York Times, he has been on three teams that have won Pulitzer Prizes, most recently in 2017 for international reporting. His newest book, &#8220;<a href="https://www.amazon.com/The-Perfect-Weapon-David-E-Sanger-audiobook/dp/B07B7QPYGZ/ref=sr_1_1?crid=2Z45907G0A71P&amp;keywords=sanger+perfect+weapon&amp;qid=1641924534&amp;sprefix=plate+pin%2Caps%2C105&amp;sr=8-1">The Perfect Weapon: War, Sabotage and Fear in the Cyber Age</a>,&#8217;&#8217; and an HBO documentary by the same title, examine the emergence of cyber conflict and its role in changing the nature of global power.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!L9Yv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fae11037c-dc0a-4687-ac3d-dd617142ec5e_1080x1080.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!L9Yv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fae11037c-dc0a-4687-ac3d-dd617142ec5e_1080x1080.jpeg 424w, https://substackcdn.com/image/fetch/$s_!L9Yv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fae11037c-dc0a-4687-ac3d-dd617142ec5e_1080x1080.jpeg 848w, https://substackcdn.com/image/fetch/$s_!L9Yv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fae11037c-dc0a-4687-ac3d-dd617142ec5e_1080x1080.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!L9Yv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fae11037c-dc0a-4687-ac3d-dd617142ec5e_1080x1080.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!L9Yv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fae11037c-dc0a-4687-ac3d-dd617142ec5e_1080x1080.jpeg" width="1080" height="1080" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/ae11037c-dc0a-4687-ac3d-dd617142ec5e_1080x1080.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1080,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:101701,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!L9Yv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fae11037c-dc0a-4687-ac3d-dd617142ec5e_1080x1080.jpeg 424w, https://substackcdn.com/image/fetch/$s_!L9Yv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fae11037c-dc0a-4687-ac3d-dd617142ec5e_1080x1080.jpeg 848w, https://substackcdn.com/image/fetch/$s_!L9Yv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fae11037c-dc0a-4687-ac3d-dd617142ec5e_1080x1080.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!L9Yv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fae11037c-dc0a-4687-ac3d-dd617142ec5e_1080x1080.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In our conversation, we discuss his return to covering the White House, his latest reporting on U.S. negotiations with Russia over Ukraine and NATO, what China is thinking, and how cyber operations are now a core feature of every major military strategy.</p><p>It is a great conversation and I hope you enjoy it!</p><p>Klon</p>]]></content:encoded></item><item><title><![CDATA[Friday Brief for 7 January 2022]]></title><description><![CDATA[Putin's cyber plans for Ukraine; Hacking-for-hire business is booming; & Beijing targets the algorithms]]></description><link>https://www.thekitchensync.tech/p/friday-brief-for-7-january-2022</link><guid isPermaLink="false">https://www.thekitchensync.tech/p/friday-brief-for-7-january-2022</guid><dc:creator><![CDATA[Klon Kitchen]]></dc:creator><pubDate>Fri, 07 Jan 2022 11:00:44 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/46596670/fc8d07a3a00651ecba2d2cf210ed3b7e.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Uh2b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 424w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 848w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1272w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png" width="737" height="121.605" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:165,&quot;width&quot;:1000,&quot;resizeWidth&quot;:737,&quot;bytes&quot;:12912,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 424w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 848w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1272w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><div><hr></div><h4>Heads Up</h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!H5b0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0469c845-ecc7-4fa0-8a7d-98a05b38a37e_480x270.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!H5b0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0469c845-ecc7-4fa0-8a7d-98a05b38a37e_480x270.gif 424w, https://substackcdn.com/image/fetch/$s_!H5b0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0469c845-ecc7-4fa0-8a7d-98a05b38a37e_480x270.gif 848w, https://substackcdn.com/image/fetch/$s_!H5b0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0469c845-ecc7-4fa0-8a7d-98a05b38a37e_480x270.gif 1272w, https://substackcdn.com/image/fetch/$s_!H5b0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0469c845-ecc7-4fa0-8a7d-98a05b38a37e_480x270.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!H5b0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0469c845-ecc7-4fa0-8a7d-98a05b38a37e_480x270.gif" width="480" height="270" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/0469c845-ecc7-4fa0-8a7d-98a05b38a37e_480x270.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:270,&quot;width&quot;:480,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2631721,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/gif&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!H5b0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0469c845-ecc7-4fa0-8a7d-98a05b38a37e_480x270.gif 424w, https://substackcdn.com/image/fetch/$s_!H5b0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0469c845-ecc7-4fa0-8a7d-98a05b38a37e_480x270.gif 848w, https://substackcdn.com/image/fetch/$s_!H5b0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0469c845-ecc7-4fa0-8a7d-98a05b38a37e_480x270.gif 1272w, https://substackcdn.com/image/fetch/$s_!H5b0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0469c845-ecc7-4fa0-8a7d-98a05b38a37e_480x270.gif 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I sat down with AEI&#8217;s big boss, Robert Doar, to chat about tech, culture, &amp; national security. He asks me about "big tech", fake media, and Chinese aggression. You can <a href="https://www.aei.org/podcast/klon-kitchen-on-the-intersection-of-tech-and-national-security">listen to our conversation here</a>.</p><div><hr></div><h4>Tech Terms</h4><blockquote><p><strong><a href="https://niccs.cisa.gov/about-niccs/cybersecurity-glossary">Air Gap</a> &#8212; </strong><em>The physical separation or isolation of a system from other systems or networks.</em></p></blockquote><div><hr></div><h2>Anticipating Russia&#8217;s Use of Cyber in Ukraine</h2><p><strong>What&#8217;s New: </strong>Russian President Vladimir Putin is positioned for a military invasion of Ukraine and cyber capabilities are likely to feature heavily in any future conflict.</p><p><strong>Why This Matters: </strong>Russia has been hitting Ukraine with cyber attacks for years but we should expect a dramatic escalation of these efforts before and during a military incursion.</p><p><strong>Key Points:</strong></p><ul><li><p>Dmitri Alperovitch &#8212; Co-Founder and former CTO of Crowdstrike and now Chairman of the Silverado Policy Accelerator &#8212; lays out one of the most compelling arguments I&#8217;ve seen on why Putin is likely to invade in the next few months. It&#8217;s worth reading the thread linked below.</p></li></ul><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://twitter.com/DAlperovitch/status/1473362460673515527?s=20&quot;,&quot;full_text&quot;:&quot;In the last few weeks, I have become increasingly convinced that Kremlin has unfortunately made a decision to invade Ukraine later this winter. While it is still possible for Putin to deescalate, I believe the likelihood is now quite low. Allow me to explain why &#129525;&quot;,&quot;username&quot;:&quot;DAlperovitch&quot;,&quot;name&quot;:&quot;Dmitri Alperovitch&quot;,&quot;profile_image_url&quot;:&quot;&quot;,&quot;date&quot;:&quot;Tue Dec 21 18:39:19 +0000 2021&quot;,&quot;photos&quot;:[],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:0,&quot;retweet_count&quot;:4818,&quot;like_count&quot;:11589,&quot;impression_count&quot;:0,&quot;expanded_url&quot;:{},&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><ul><li><p>Ever since Putin&#8217;s initial &#8220;annexation&#8221; of Crimea, Russian hackers have conducted a full-scale cyber campaign against targets in Ukraine&#8217;s political, economic, media, finance, and energy sectors.</p></li><li><p>On several occasions, hackers turned off electricity to hundreds of thousands of people for hours at a time.</p></li><li><p>In one of the most destructive cyber attacks ever, Moscow-backed attackers targeted Ukraine with the NotPetya virus, but it quickly spread beyond Ukraine causing billions of dollars of damage around the world &#8212; including in Russia.</p></li><li><p>Now the United States and Britain are helping Kyiv prepare for more cyber action by deploying various experts and defenses and, in the meantime, Moscow is turning up its online efforts &#8212; particularly digital disinformation.</p></li></ul><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>Russia has established a strong digital foothold over the last eight years.</strong> Crimea&#8217;s annexation occurred in 2014. Ever since then, Moscow has been burrowing into and exploiting Ukraine&#8217;s networks and critical infrastructure. These operations have had at least three primary objectives. First, destabilize Ukraine&#8217;s government and foment popular unrest. Second, conduct persistent digital surveillance and reconnaissance. And finally, third, lay the digital foundation for future military operations by, for example, sabotaging critical infrastructure, infiltrating military command and control networks, and compromising key military capabilities like air defense systems. Putin&#8217;s intentions have been clear and he&#8217;s had plenty of time and opportunity to achieve these ends.</p></li><li><p><strong>Everything starts in the &#8220;gray zone,&#8221; but will escalate quickly.</strong> As I&#8217;ve said, Russia has been cybering Ukraine for nearly a decade. Even so, if Putin decides to invade, all of these efforts will grow rapidly in both scale and severity. Propaganda will create a pretext for invasion. Critical infrastructure will be brought down. Digital denial and deception will be used to mask Russian operations and objectives. There may even be broader electronic warfare aimed at disabling Ukrainian access to communications, imagery, and GPS satellites. The bottom line is that all of this, and more, are within Russia&#8217;s capabilities and it is likely to be Russian decisions &#8212; not those of Kyiv &#8212; that set the conditions and scope of the coming conflict.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-7-january-2022/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-7-january-2022/comments"><span>Leave a comment</span></a></p><div><hr></div><h2>Hackers-For-Hire Industry Is Too Big To Fail</h2><p><strong>What&#8217;s New: </strong>Facebook parent company, Meta, has a new report detailing how &#8220;cyber mercenaries&#8221; targeted more than 50,000 of the social media platform&#8217;s users.</p><div class="file-embed-wrapper" data-component-name="FileToDOM"><div class="file-embed-container-reader"><div class="file-embed-container-top"><image class="file-embed-thumbnail" src="https://cdn.substack.com/image/fetch/w_400,h_600,c_fill,f_auto,q_auto:best,fl_progressive:steep,g_auto,ar_1.5/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7c72a495-41a0-4b07-ba49-1938cbf189e0_914x1166.png"></image><div class="file-embed-details"><div class="file-embed-details-h1">Threat Report On The Surveillance For Hire Industry</div><div class="file-embed-details-h2">494KB &#8729; PDF file</div></div><a class="file-embed-button wide" href="https://www.thekitchensync.tech/api/v1/file/079803ea-624d-4f15-8bfe-b6aef394d8af.pdf"><span class="file-embed-button-text">Download</span></a></div><a class="file-embed-button narrow" href="https://www.thekitchensync.tech/api/v1/file/079803ea-624d-4f15-8bfe-b6aef394d8af.pdf"><span class="file-embed-button-text">Download</span></a></div></div><p><strong>Why This Matters: </strong>While this newsletter and other sources have detailed the recent woes of NSO Group, the reality is that hacking- and surveillance-for-hire companies are booming.</p><p><strong>Key Points:</strong></p><ul><li><p>If you don&#8217;t know about &#8212; or just want a quick refresher on &#8212; the drama around NSO, you can read <a href="https://www.thekitchensync.tech/p/friday-brief-for-5-november-2021">my previous commentary here</a>.</p></li><li><p>The Meta report says that, while most of these companies sell their wares under the guise of only targeting terrorists and criminals, the reality is much different.</p></li></ul><blockquote><p>&#8220;Our months-long investigation concluded that targeting is in fact indiscriminate and includes journalists, dissidents, critics of authoritarian regimes, families of opposition members and human rights activists.&#8221;</p></blockquote><ul><li><p>And Meta is naming names.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JNHE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fce6f7629-27d0-4b17-8979-d52991258252_731x701.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JNHE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fce6f7629-27d0-4b17-8979-d52991258252_731x701.png 424w, https://substackcdn.com/image/fetch/$s_!JNHE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fce6f7629-27d0-4b17-8979-d52991258252_731x701.png 848w, https://substackcdn.com/image/fetch/$s_!JNHE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fce6f7629-27d0-4b17-8979-d52991258252_731x701.png 1272w, https://substackcdn.com/image/fetch/$s_!JNHE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fce6f7629-27d0-4b17-8979-d52991258252_731x701.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JNHE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fce6f7629-27d0-4b17-8979-d52991258252_731x701.png" width="731" height="701" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/ce6f7629-27d0-4b17-8979-d52991258252_731x701.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:701,&quot;width&quot;:731,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:134973,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JNHE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fce6f7629-27d0-4b17-8979-d52991258252_731x701.png 424w, https://substackcdn.com/image/fetch/$s_!JNHE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fce6f7629-27d0-4b17-8979-d52991258252_731x701.png 848w, https://substackcdn.com/image/fetch/$s_!JNHE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fce6f7629-27d0-4b17-8979-d52991258252_731x701.png 1272w, https://substackcdn.com/image/fetch/$s_!JNHE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fce6f7629-27d0-4b17-8979-d52991258252_731x701.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><ul><li><p>In addition to removing more than 1,500 accounts linked to these surveillance-for-hire groups, Meta also alerted approximately 50,000 people who the company says were targeted by these groups worldwide.</p></li><li><p>Interestingly, four out the seven groups identified by Meta &#8212; Cobwebs Technologies, Cognyte, Black Cube, and Bluehawk CI &#8212; are based in Israel.</p></li></ul><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>This is big business.</strong> The general cybersecurity market is <a href="https://www.statista.com/statistics/595182/worldwide-security-as-a-service-market-size/">predicted</a> to reach $345.4 billion by 2026. Hidden within this market is the hacking- and surveillance-for-hire market. As a point of reference, in 2019 NSO Group reported nearly $300 million in revenue. </p></li><li><p><strong>Demand is only growing.</strong> Foreign governments are a key customer for cyber mercenaries. It&#8217;s a relatively cheap and fast way for smaller nations to gain access to world-class talent without all those pesky reporting and accountability challenges that come with official capabilities. But, global companies are also paying for these services. If you&#8217;re a U.S.-based, globally operating company, for example, you cannot conduct certain counter-hacking efforts or unilaterally retrieve stolen data and IP from an attacker&#8217;s networks. You depend on the U.S. government for justice and remediation. Or &#8230; you can pay foreign &#8220;cybersecurity consultants&#8221; to take &#8220;proactive measures&#8221; on your behalf. Certainly this brings its own risks, but it&#8217;s almost always faster and more efficient than waiting on Uncle Sam to defend your honor.</p></li><li><p><strong>The connection to Israel isn&#8217;t a coincidence.</strong> Like NSO Group, it&#8217;s reasonable to believe Israel-based hacking companies need tacit approval from their government to export their capabilities and services. And the Israeli government has some understandable reasons for allowing this. First, Israel is a legit cyber powerhouse and allowing this surveillance market to grow will likely generate even greater wealth, insight, and capabilities. Second, by allowing these companies to work with governments like Saudi Arabia and the United Arab Emirates, they become a powerful diplomatic tool for normalizing relations and influencing key leaders. Finally, third, Israel has never been shy about spying on everyone &#8212; even its friends &#8212; and anyone who thinks they&#8217;re blushing about any of this is sorely mistaken. For sure, Israel&#8217;s aggressive use of cyber has real risks; but, the United States has also benefited from this forward-leaning posture and challenges like those demonstrated in the Meta report may simply be an unavoidable consequence of having these capabilities active at the cutting-edge (where we need them).</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-7-january-2022/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-7-january-2022/comments"><span>Leave a comment</span></a></p><div><hr></div><h2>China Regulates Algorithms</h2><p><strong>What&#8217;s New: </strong>Beijing is cracking down on content management and recommendation algorithms. </p><p><strong>Why This Matters: </strong>The Chinese Communist Party (CCP) wants to have decisive control over these society-shaping capabilities and these new rules will apply to Chinese companies everywhere and all foreign companies operating in China.</p><p><strong>Key Points:</strong></p><ul><li><p>The Cyberspace Administration of China issued its <a href="http://www.cac.gov.cn/2022-01/04/c_1642894606364259.htm">Internet Information Service Algorithm Recommendation Management Regulations</a> on Tuesday, saying the rules will come into force on March 1st.</p></li><li><p>The rules reportedly &#8220;standardize Internet information service algorithm recommendation activities, promote socialist core values, safeguard national security and social public interests, protect the legitimate rights and interests of citizens, legal persons and other organizations, and promote the healthy and orderly development of Internet information services.&#8221;<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a></p></li><li><p>Among the many requirements, anyone employing content management and recommendation algorithms must &#8220;actively spread positive energy,&#8221; not &#8220;induce users to set up addicted, over-consumption and other violations of laws,&#8221; and &#8220;regulate the development of Internet news information collection, editing and publishing services, reprinting services and dissemination platform services.&#8221;</p></li><li><p>The regulations&#8217; lengthy &#8220;User Rights&#8221; section also demands service providers &#8220;provide users with options that are not specific to their personal characteristics, or provide users with convenient options to turn off algorithm recommendation services.&#8221;</p></li><li><p>There&#8217;s also this bit concerning security: &#8220;Algorithm recommendation service providers shall keep network logs in accordance with the law, cooperate with network information departments and relevant departments such as telecommunications, public security, and market supervision to carry out security assessment and supervision and inspection work, and provide necessary technical and data support and assistance.&#8221;</p></li></ul><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>This is an authoritarian response to a universal challenge. </strong>The CCP is engaging powerful content management algorithms in a very totalitarian way. Specifically, the government is ensuring it holds the power and that &#8220;internet information services&#8221; are subservient to the state and know it. All of the bureaucratic requirements and labyrinthian language amount to a single outcome &#8212; any company using these algorithms must now do so only in a manner that the CCP finds acceptable and that facilitates government control over these algorithms and the data they utilize and generate.</p></li><li><p><strong>This bad response doesn&#8217;t delegitimize the issue itself.</strong> It&#8217;s undeniable that algorithms play a huge role in what news users see, what products they purchase, and how they participate in modern society. In many ways, algorithms play an important role in allowing people to sort through the deluge of online content in a manner that maximizes satisfaction, ease, and even safety. But, it is also true that these algorithms often reinforce many of our worst inclinations and encourage a growing political tribalization. It&#8217;s completely legitimate for Americans to be concerned about and to debate these issues.</p></li><li><p><strong>But China is no model for a free people.</strong> A number of the new Chinese provisions should sound familiar. Much of the language echoes proposals from draft legislation like the U.S. Filter Bubble Transparency Act, which, according to one of its sponsors, would require online platforms to offer their services &#8220;without being manipulated by secret algorithms driven by user-specific data.&#8221; While I can empathize with <em>some</em> of the underlying concerns, this approach &#8212; like that of the CCP &#8212; is misguided. I wrote at length on this topic for my friends over at the Dispatch (see the linked article below); but, the bottom line is that there is incontrovertible evidence that this approach leads to lower user satisfaction, higher volumes of extreme content, and more &#8212; not less &#8212; advertising revenue for the companies. The exact opposite outcomes proponents of such measures are looking for. While some will find Beijing&#8217;s &#8220;strong&#8221; response attractive, it proceeds from a theory of man and of government that is in direct contradiction with our most fundamental ideals and commitments. That&#8217;s not to say there&#8217;s nothing we can do about powerful algorithms; but, it is to say that there are a lot of things we shouldn&#8217;t do.</p></li></ul><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:44039871,&quot;url&quot;:&quot;https://thedispatch.com/p/legislation-cant-fix-social-media&quot;,&quot;publication_id&quot;:17455,&quot;publication_name&quot;:&quot;The Dispatch&quot;,&quot;publication_logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/631ce259-4b95-4f90-928e-ccc471a9fb27_256x256.png&quot;,&quot;title&quot;:&quot;Legislation Can&#8217;t Fix Social Media&quot;,&quot;truncated_body_text&quot;:&quot;It is perhaps apocryphal, but when reportedly commenting on Russia&#8217;s peasant soldiers deserting the tsar&#8217;s army during Russia&#8217;s Revolution between 1905-1906, Vladimir Illich Lenin&#8212;the founder and first head of government for Soviet Russia&#8212;quipped, &#8220;They voted with their feet.&#8221;&quot;,&quot;date&quot;:&quot;2021-11-15T11:04:46.067Z&quot;,&quot;like_count&quot;:70,&quot;comment_count&quot;:64,&quot;bylines&quot;:[{&quot;id&quot;:51357445,&quot;name&quot;:&quot;Klon Kitchen&quot;,&quot;photo_url&quot;:null,&quot;bio&quot;:&quot;Klon Kitchen is a senior fellow at the American Enterprise Institute, a former national security adviser to Sen. Ben Sasse (R-Neb.), and a 15-year veteran of the United States Intelligence Community. Read his weekly technology and national security newsletter at thekitchensync.techand follow him on Twitter @klonkitchen.&quot;,&quot;profile_set_up_at&quot;:null,&quot;is_guest&quot;:true}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:null,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://thedispatch.com/p/legislation-cant-fix-social-media?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!ZdOs!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F631ce259-4b95-4f90-928e-ccc471a9fb27_256x256.png" loading="lazy"><span class="embedded-post-publication-name">The Dispatch</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Legislation Can&#8217;t Fix Social Media</div></div><div class="embedded-post-body">It is perhaps apocryphal, but when reportedly commenting on Russia&#8217;s peasant soldiers deserting the tsar&#8217;s army during Russia&#8217;s Revolution between 1905-1906, Vladimir Illich Lenin&#8212;the founder and first head of government for Soviet Russia&#8212;quipped, &#8220;They voted with their feet&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">4 years ago &#183; 70 likes &#183; 64 comments &#183; Klon Kitchen</div></a></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-7-january-2022/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-7-january-2022/comments"><span>Leave a comment</span></a></p><div><hr></div><h2>Let&#8217;s Get Visual</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.visualcapitalist.com/the-companies-that-defined-2021/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!L0ag!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F75be9ecb-f753-4c44-9478-46a784fc6923_1200x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!L0ag!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F75be9ecb-f753-4c44-9478-46a784fc6923_1200x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!L0ag!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F75be9ecb-f753-4c44-9478-46a784fc6923_1200x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!L0ag!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F75be9ecb-f753-4c44-9478-46a784fc6923_1200x1000.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!L0ag!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F75be9ecb-f753-4c44-9478-46a784fc6923_1200x1000.jpeg" width="1100" height="917" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/75be9ecb-f753-4c44-9478-46a784fc6923_1200x1000.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:917,&quot;width&quot;:1100,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;The Companies that Defined 2021&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:&quot;https://www.visualcapitalist.com/the-companies-that-defined-2021/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="The Companies that Defined 2021" title="The Companies that Defined 2021" srcset="https://substackcdn.com/image/fetch/$s_!L0ag!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F75be9ecb-f753-4c44-9478-46a784fc6923_1200x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!L0ag!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F75be9ecb-f753-4c44-9478-46a784fc6923_1200x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!L0ag!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F75be9ecb-f753-4c44-9478-46a784fc6923_1200x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!L0ag!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F75be9ecb-f753-4c44-9478-46a784fc6923_1200x1000.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Visual Capitalist</figcaption></figure></div><div><hr></div><h2>Nerd Humor</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://twitter.com/nycartoons/status/1471684096497786884?s=20" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CrQw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F347fe85d-26ed-41a3-a047-f0842bb3166a_640x640.jpeg 424w, https://substackcdn.com/image/fetch/$s_!CrQw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F347fe85d-26ed-41a3-a047-f0842bb3166a_640x640.jpeg 848w, https://substackcdn.com/image/fetch/$s_!CrQw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F347fe85d-26ed-41a3-a047-f0842bb3166a_640x640.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!CrQw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F347fe85d-26ed-41a3-a047-f0842bb3166a_640x640.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CrQw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F347fe85d-26ed-41a3-a047-f0842bb3166a_640x640.jpeg" width="640" height="640" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/347fe85d-26ed-41a3-a047-f0842bb3166a_640x640.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:640,&quot;width&quot;:640,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:59790,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:&quot;https://twitter.com/nycartoons/status/1471684096497786884?s=20&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CrQw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F347fe85d-26ed-41a3-a047-f0842bb3166a_640x640.jpeg 424w, https://substackcdn.com/image/fetch/$s_!CrQw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F347fe85d-26ed-41a3-a047-f0842bb3166a_640x640.jpeg 848w, https://substackcdn.com/image/fetch/$s_!CrQw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F347fe85d-26ed-41a3-a047-f0842bb3166a_640x640.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!CrQw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F347fe85d-26ed-41a3-a047-f0842bb3166a_640x640.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">New Yorker Cartoons</figcaption></figure></div><div><hr></div><h2>Quick Clicks</h2><ul><li><p><a href="https://www.nytimes.com/2022/01/03/technology/verizon-att-5g-delay-airline-safety.html">Verizon &amp; AT&amp;T agree to 5G delay</a></p></li><li><p><a href="https://technewsspace.com/chinese-operator-china-mobile-expelled-from-canada-over-threat-to-national-security/">China Mobile kicked out of China over security concerns</a></p></li><li><p><a href="https://www.nytimes.com/2021/12/23/business/japan-defense-spending.html">Japan boosts military spending with Taiwan in mind</a></p></li><li><p><a href="https://www.wsj.com/articles/tesla-opens-showroom-in-chinas-xinjiang-region-at-center-of-u-s-genocide-allegations-11641214630">Tesla opens showroom in China&#8217;s Xinjiang (Boo!)</a></p></li><li><p><a href="https://www.nextgov.com/emerging-tech/2022/01/us-army-announces-new-machine-learning-tech-burn-treatment/360303/">Army announces new machine learning tech for burn treatment</a></p></li></ul><div><hr></div><p><em>That&#8217;s it for this Friday Brief. Thanks for reading, and if you think someone else would like this newsletter, please share it with your friends and followers. Have a great weekend!</em></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Translation provided by Google Translate.</p></div></div>]]></content:encoded></item><item><title><![CDATA[Friday Brief for 17 December 2021]]></title><description><![CDATA[What you need to know about Log4j; The U.K.'s new cyber strategy; and Chinese tech is in the crosshairs]]></description><link>https://www.thekitchensync.tech/p/friday-brief-for-17-december-2021</link><guid isPermaLink="false">https://www.thekitchensync.tech/p/friday-brief-for-17-december-2021</guid><dc:creator><![CDATA[Klon Kitchen]]></dc:creator><pubDate>Fri, 17 Dec 2021 11:00:38 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/45585279/027e7c1f4942c1cb196db79c1695991d.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Uh2b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 424w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 848w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1272w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png" width="737" height="121.605" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:165,&quot;width&quot;:1000,&quot;resizeWidth&quot;:737,&quot;bytes&quot;:12912,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 424w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 848w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1272w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uXVj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F147448ce-0a4e-49e0-a985-741c819f7ff8_800x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uXVj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F147448ce-0a4e-49e0-a985-741c819f7ff8_800x600.png 424w, https://substackcdn.com/image/fetch/$s_!uXVj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F147448ce-0a4e-49e0-a985-741c819f7ff8_800x600.png 848w, https://substackcdn.com/image/fetch/$s_!uXVj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F147448ce-0a4e-49e0-a985-741c819f7ff8_800x600.png 1272w, https://substackcdn.com/image/fetch/$s_!uXVj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F147448ce-0a4e-49e0-a985-741c819f7ff8_800x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uXVj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F147448ce-0a4e-49e0-a985-741c819f7ff8_800x600.png" width="800" height="600" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/147448ce-0a4e-49e0-a985-741c819f7ff8_800x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:645210,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!uXVj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F147448ce-0a4e-49e0-a985-741c819f7ff8_800x600.png 424w, https://substackcdn.com/image/fetch/$s_!uXVj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F147448ce-0a4e-49e0-a985-741c819f7ff8_800x600.png 848w, https://substackcdn.com/image/fetch/$s_!uXVj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F147448ce-0a4e-49e0-a985-741c819f7ff8_800x600.png 1272w, https://substackcdn.com/image/fetch/$s_!uXVj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F147448ce-0a4e-49e0-a985-741c819f7ff8_800x600.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>This is the last Friday Brief for 2021</strong></h2><p>We&#8217;ll be back in 2022 and it&#8217;s gonna be great! In the meantime, I&#8217;ll be pushing out one or two more podcasts and &#8212; don&#8217;t forget &#8212; you can always gift a subscription to this newsletter for that certain someone special!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/subscribe?&amp;gift=true&quot;,&quot;text&quot;:&quot;Give a gift subscription&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/subscribe?&amp;gift=true"><span>Give a gift subscription</span></a></p><p>Enjoy the holidays and happy New Year. </p><p>Klon</p><div><hr></div><h4>Tech Terms</h4><blockquote><p><strong><a href="https://www.totaldefense.com/security-glossary/?gclid=Cj0KCQiA5OuNBhCRARIsACgaiqXIQXZKHkE47R1kFIdAc-1WKNe1bgjNfeqViuXQ5uAUx9c6tfE_dTMaAvZUEALw_wcB#Firewall">Firewall</a> &#8212; </strong><em>Firewall software is used to block unauthorized access to a computer system. All incoming and outgoing network traffic is monitored through a firewall so that it can block suspicious activity that does not abide to a defined set of security rules.</em></p></blockquote><div><hr></div><h2>Log4j: What You Need To Know</h2><p><strong>What&#8217;s New: </strong>A vulnerability in a popular open-source logging tool has had security researchers and response teams surging for more than a week.</p><p><strong>Why This Matters: </strong>The Log4j &#8220;logger&#8221; is widely used and hackers all over the world are aggressively exploiting this vulnerability.</p><p><strong>Key Points:</strong></p><ul><li><p>Java is a programming language and computing platform that powers a huge portion of internet apps and services.</p></li><li><p>Log4j is a Java-based &#8220;logger&#8221; &#8212; a program that records most of the activity when a service or app is running, allowing programmers to go back and to fix bugs and failures.</p></li></ul><blockquote><p>&#8220;Log4j is a very popular logging package for Java. It is very powerful and flexible and, even from my own experience, is used in almost every Java application that I have ever encountered ... The exploit is actually unbelievably simple &#8212; which makes it very, very scary at the same time," Bojan Zdrnja, senior instructor at SANS Institute, <a href="https://www.vice.com/en/article/93bag7/a-simple-exploit-is-exposing-the-biggest-apps-on-the-internet">told Vice.</a></p></blockquote><ul><li><p>To completely take over a vulnerable system, an attacker simply sends a short code string that is logged by Log4j. Then it&#8217;s owned.</p></li><li><p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued <a href="https://www.cisa.gov/uscert/ncas/current-activity/2021/12/10/apache-releases-log4j-version-2150-address-critical-rce">this alert</a>, <a href="https://cert-at.translate.goog/de/warnungen/2021/12/kritische-0-day-sicherheitslucke-in-apache-log4j-bibliothek?_x_tr_sl=de&amp;_x_tr_tl=en&amp;_x_tr_hl=en-US">as did</a> Australia&#8217;s Computer Emergency Response Team (CERT).</p></li></ul><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://twitter.com/CISAJen/status/1471126118728142850?s=20&quot;,&quot;full_text&quot;:&quot;FLAGGING:&#128737;Shields Up&#8212;Between log4j, geopolitical challenges, holiday time-off &amp;amp; defender burnout, we may be in for a wild ride over the next few weeks. Check out this product for some things you can do to shore up your defenses: <a class=\&quot;tweet-url\&quot; href=\&quot;https://go.usa.gov/xe6fG\&quot;>go.usa.gov/xe6fG</a> &quot;,&quot;username&quot;:&quot;CISAJen&quot;,&quot;name&quot;:&quot;Jen Easterly&quot;,&quot;profile_image_url&quot;:&quot;&quot;,&quot;date&quot;:&quot;Wed Dec 15 14:32:53 +0000 2021&quot;,&quot;photos&quot;:[{&quot;img_url&quot;:&quot;https://pbs.substack.com/media/FGp9Z_JXIAMuMN7.jpg&quot;,&quot;link_url&quot;:&quot;https://t.co/QkbmlZzpUa&quot;,&quot;alt_text&quot;:null}],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:0,&quot;retweet_count&quot;:93,&quot;like_count&quot;:193,&quot;impression_count&quot;:0,&quot;expanded_url&quot;:{},&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><ul><li><p>The Check Point cybersecurity group <a href="https://blog.checkpoint.com/2021/12/11/protecting-against-cve-2021-44228-apache-log4j2-versions-2-14-1/">claims</a> hackers from around the world are scanning the internet for vulnerable systems and have already conducted nearly 1 million attacks on companies since last Friday.</p></li><li><p>Most of the attacks appear to be aimed at using compromised systems for cryptocurrency mining. Chinese state-backed groups, however, have also been observed using the exploit.</p></li></ul><p><strong>What I&#8217;m Thinking: </strong></p><ul><li><p><strong>This is gonna be tricky.</strong> The sheer scope of the problem makes this hard enough. Complicating things even further is the challenge of &#8220;intermingling.&#8221; A lot of companies build custom software that runs on top of base code like Log4j, which means a lot of companies will need to deploy custom patches that could fix one application while &#8220;breaking&#8221; another one. Even more, if something does go wrong a user could lose their logging ability precisely when they need it most to keep watch for bad guys who may have infiltrated their networks.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-17-december-2021?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-17-december-2021?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h2>The U.K.&#8217;s New Cyber Security Strategy</h2><p><strong>What&#8217;s New: </strong>Our cousins across the pond have a new <a href="https://www.gov.uk/government/publications/national-cyber-strategy-2022/national-cyber-security-strategy-2022">Cyber Security Strategy</a> out this week.</p><p><strong>Why This Matters: </strong>The 2022 strategy picks up where the previous 2016 strategy left off, emphasizing the country&#8217;s need to remain &#8220;confident, capable and resilient in this fast-moving digital world; and that we continue to adapt, innovate and invest in order to protect and promote our interests in cyberspace.&#8221;</p><p><strong>Key Points:</strong></p><ul><li><p>The strategy begins by laying out the U.K. government&#8217;s view of the world:</p></li></ul><blockquote><p>&#8220;Exponential advances in technology combined with decreasing costs have made the world more connected than ever before, driving extraordinary opportunity, innovation and progress &#8230; The scale and speed of this change &#8211; often outpacing our social norms, laws, and democratic institutions &#8211; is also unleashing unprecedented complexity, instability and risk &#8230; The transnational nature of cyberspace means these challenges cannot be addressed without international collaboration, but it is also an increasingly important arena of systemic competition and the clash of competing interests, values and visions of our global future.&#8221;</p></blockquote><ul><li><p>It then lays out a vision for how the government will use &#8220;cyber power in support of national goals.&#8221;</p></li></ul><blockquote><p>&#8220;Cyber power is the ability to protect and promote national interests in and through cyberspace. Countries that are best able to navigate the opportunities and challenges of the digital age will be more secure, more resilient and more prosperous in future &#8230; As we forge a new role for the UK in a more competitive age, strengthening our cyber power will enable us to lead the way for industry and other countries, get ahead of future changes in technology, mitigate threats and gain strategic advantage over our adversaries and competitors &#8230; Our vision is that the UK in 2030 will continue to be a leading responsible and democratic cyber power, able to protect and promote our interests in and through cyberspace in support of national goals.&#8221;</p></blockquote><ul><li><p>These four overlapping goals for the U.K. are as follow:</p></li></ul><blockquote><p>&#8220;A more secure and resilient nation, better prepared for evolving threats and risks and using our cyber capabilities to protect citizens against crime, fraud and state threats;</p><p>An innovative, prosperous digital economy, with opportunity more evenly spread across the country and our diverse population;</p><p>A Science and Tech Superpower, securely harnessing transformative technologies in support of a greener, healthier society; and, </p><p>A more influential and valued partner on the global stage, shaping the future frontiers of an open and stable international order while maintaining our freedom of action in cyberspace&#8221;</p></blockquote><ul><li><p>Finally, the strategy is built on five pillars: (1) Strengthening the U.K. cyber ecosystem; (2)Building a resilient and prosperous digital U.K.; (3) Taking the lead in technologies vital to cyber power; (4) Advancing U.K. global leadership and influence for a more secure, prosperous and open international order; and (5) Detecting, disrupting and deterring our adversaries to enhance U.K. security in and through cyberspace.</p></li></ul><div class="file-embed-wrapper" data-component-name="FileToDOM"><div class="file-embed-container-reader"><div class="file-embed-container-top"><image class="file-embed-thumbnail-default" src="https://substackcdn.com/image/fetch/$s_!0Cy0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack.com%2Fimg%2Fattachment_icon.svg"></image><div class="file-embed-details"><div class="file-embed-details-h1">National Cyber Strategy Final Version</div><div class="file-embed-details-h2">10.6MB &#8729; PDF file</div></div><a class="file-embed-button wide" href="https://www.thekitchensync.tech/api/v1/file/2ee1bc96-0df7-4a0d-9f12-13f65032314d.pdf"><span class="file-embed-button-text">Download</span></a></div><a class="file-embed-button narrow" href="https://www.thekitchensync.tech/api/v1/file/2ee1bc96-0df7-4a0d-9f12-13f65032314d.pdf"><span class="file-embed-button-text">Download</span></a></div></div><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>I think the Brits get it.</strong> There has been a marked evolution in the U.K.&#8217;s cyber posture over the last several years. They&#8217;ve become more serious and clear in their rhetoric which suggests the same evolution is occurring in their thinking, planning, and doctrine. Initiatives like their new National Cyber Security Center (NCSC) and National Cyber Force (NCF) also give reason for optimism. One thing that got my attention is just how frankly the U.K. government talks about the NCF, unapologetically stating in the strategy that the Center will be used to &#8220;influence individuals and groups, disrupt online and communications systems and degrade the operations of physical systems.&#8221; I&#8217;m reminded of what A.P. Herbert once said: "The Englishman never enjoys himself except for a noble purpose.&#8221; Well, I might dare say the British appear to be enjoying themselves as they get about the noble work of securing their nation and countrymen in cyberspace. Bully for them!</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-17-december-2021?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-17-december-2021?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h2>Chinese Tech Companies In The Crosshairs</h2><p><strong>What&#8217;s New: </strong>The Biden administration is placing eight Chinese tech companies on the &#8220;<a href="https://home.treasury.gov/policy-issues/financial-sanctions/consolidated-sanctions-list/ns-cmic-list">Chinese Military-Industrial Complex Companies</a>&#8221; list, and has listed dozens more on the U.S. Entities List.</p><p><strong>Why This Matters: </strong>The new listings are part of a broader U.S. effort to reduce U.S. outbound investments that directly facilitate Beijing&#8217;s military capabilities or its violation of human rights.</p><p><strong>Key Points:</strong></p><ul><li><p>The new listings formally identify the companies as having Chinese military links and bars Americans from trading in their securities.</p></li><li><p>According to research by Georgetown&#8217;s CSET (<a href="https://www.thekitchensync.tech/p/friday-brief-for-19-november-2021">discussed last month</a>), Goldman Sachs and Sequoia Capital are among those who are funding companies like <a href="https://en.4paradigm.com/content/details_10_480.html">4Paradigm</a> &#8212; a company who is directly providing AI-enabled battlefield command software to the Chinese military.</p></li><li><p>Shenzhen-based DJI &#8212; the global leader in commercial unmanned systems with more than 70% of the global market &#8212; is among those being culled for their &#8220;biometric surveillance and tracking&#8221; of Uyghers. </p></li><li><p>In light of the tightening environment in the United States and because of domestic politics in China, a growing number of Chinese tech giants listed on Wall Street are also listing in Hong Kong &#8212; including Alibaba, Baidu, NetEase, and Weibo &#8212; in an effort to minimize the impact of possibly being removed from U.S. trading.</p></li></ul><blockquote><p>&#8220;I think for a lot of Chinese companies listed in U.S. markets, it&#8217;s essentially game over,&#8221; David Loevinger, managing director for emerging markets sovereign research at TCW Group, <a href="https://www.cnbc.com/2021/12/15/us-china-most-chinese-companies-could-delist-from-us-says-tcw-group.html">told CNBC Wednesday</a>. &#8220;This is an issue that&#8217;s been hanging out there for 20 years &#8212; we haven&#8217;t been able to solve it.&#8221;</p></blockquote><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>The new listings are a good development. More please.</strong> Every one of these companies deserves the scrutiny they&#8217;re getting. There are dozens of others worthy of the same treatment. Beyond limiting U.S. investment in these companies, companies like DJI should be prevented from doing business in the United States at all. There&#8217;s simply no way to trust Chinese-made drones and the software that runs them. Their ability to collect and transmit huge volumes of data makes our continued allowance of them in our domestic skies one of the most truly foolish mistakes in this new tech confrontation with China. Also, while Tuya isn&#8217;t yet on this list, <a href="https://thehill.com/opinion/cybersecurity/564962-tuya-may-be-the-china-threat-that-beats-russias-ransomware-attacks">it deserves to be</a> and I hope readers in a position to do something about it will take them on next.</p></li><li><p><strong>Outbound investment is a key priority.</strong> The investments by Goldman Sachs and Sequoia Capital were not illegal. They were immoral. 4Paradigm&#8217;s relationship with the Chinese military was easily knowable and it strains belief that this relationship was not uncovered during pre-investment investigations. This suggests a certain comfort within the U.S. investment community when it comes to supporting companies that are working in direct contradiction to U.S. security and interests. That&#8217;s unfortunate; but, as Loevinger said in the story above, &#8220;it&#8217;s essentially game over&#8221; for this type of unethical behavior and I&#8217;m happy for this screw to be turned tight.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-17-december-2021?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-17-december-2021?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h2>Let&#8217;s Get Visual</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.visualcapitalist.com/graphene-the-wonder-material-of-the-future/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uxt7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6275d5f6-ba3c-4421-ae9a-c22b3b0a6f0e_1200x6716.jpeg 424w, https://substackcdn.com/image/fetch/$s_!uxt7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6275d5f6-ba3c-4421-ae9a-c22b3b0a6f0e_1200x6716.jpeg 848w, https://substackcdn.com/image/fetch/$s_!uxt7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6275d5f6-ba3c-4421-ae9a-c22b3b0a6f0e_1200x6716.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!uxt7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6275d5f6-ba3c-4421-ae9a-c22b3b0a6f0e_1200x6716.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uxt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6275d5f6-ba3c-4421-ae9a-c22b3b0a6f0e_1200x6716.jpeg" width="1100" height="6156" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/6275d5f6-ba3c-4421-ae9a-c22b3b0a6f0e_1200x6716.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:6156,&quot;width&quot;:1100,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:&quot;https://www.visualcapitalist.com/graphene-the-wonder-material-of-the-future/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!uxt7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6275d5f6-ba3c-4421-ae9a-c22b3b0a6f0e_1200x6716.jpeg 424w, https://substackcdn.com/image/fetch/$s_!uxt7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6275d5f6-ba3c-4421-ae9a-c22b3b0a6f0e_1200x6716.jpeg 848w, https://substackcdn.com/image/fetch/$s_!uxt7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6275d5f6-ba3c-4421-ae9a-c22b3b0a6f0e_1200x6716.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!uxt7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F6275d5f6-ba3c-4421-ae9a-c22b3b0a6f0e_1200x6716.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Visual Capitalist</figcaption></figure></div><div><hr></div><h2>Nerd Humor</h2><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://twitter.com/nycartoons/status/1471238690336817156?s=20&quot;,&quot;full_text&quot;:&quot;Cartoon by Benjamin Schwartz\n\n&#8220;Let&#8217;s take an excruciatingly awkward two minutes for people to trickle in.&#8221;\n\n<a class=\&quot;tweet-url\&quot; href=\&quot;https://www.newyorker.com/cartoon/a25844\&quot;>newyorker.com/cartoon/a25844</a> &quot;,&quot;username&quot;:&quot;nycartoons&quot;,&quot;name&quot;:&quot;New Yorker Cartoons&quot;,&quot;profile_image_url&quot;:&quot;&quot;,&quot;date&quot;:&quot;Wed Dec 15 22:00:12 +0000 2021&quot;,&quot;photos&quot;:[{&quot;img_url&quot;:&quot;https://pbs.substack.com/media/FGrjyteX0A4w_0Q.jpg&quot;,&quot;link_url&quot;:&quot;https://t.co/n5g11m081m&quot;,&quot;alt_text&quot;:null}],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:0,&quot;retweet_count&quot;:2,&quot;like_count&quot;:12,&quot;impression_count&quot;:0,&quot;expanded_url&quot;:{},&quot;video_url&quot;:null,&quot;belowTheFold&quot;:true}" data-component-name="Twitter2ToDOM"></div><div><hr></div><h2>Quick Clicks</h2><ul><li><p><a href="https://www.infosecurity-magazine.com/news/darpa-announces-smoke-program/">DARPA announces new SMOKE program</a></p></li><li><p><a href="https://www.wsj.com/articles/defense-intelligence-agency-expected-to-lead-militarys-use-of-open-source-data-11639142686?mod=flipboard">DIA expected to lead military use of open-source data</a></p></li><li><p><a href="https://www.nature.com/articles/d41586-021-03697-8">DeepMind AI tackles one of chemistry&#8217;s most valuable techniques</a></p></li><li><p><a href="https://www.cbc.ca/news/politics/navy-classified-electronics-lost-1.6277938">Loss of secret data puts navy&#8217;s handling of devices under investigation &#8212; again</a></p></li><li><p><a href="https://www.wsj.com/articles/is-mit-research-helping-the-chinese-military-pla-genocide-mcgovern-institute-partnerships-repression-11639149202">Is MIT&#8217;s research helping the Chinese military?</a></p></li></ul><div><hr></div><p><em>That&#8217;s it for this Friday Brief. Thanks for reading, and if you think someone else would like this newsletter, please share it with your friends and followers. Have a great weekend!</em></p>]]></content:encoded></item><item><title><![CDATA[Should We Have "Expert" Twitter?]]></title><description><![CDATA[A Kitchen Sync Conversation with Dr. Yuval Levin]]></description><link>https://www.thekitchensync.tech/p/should-we-have-expert-twitter</link><guid isPermaLink="false">https://www.thekitchensync.tech/p/should-we-have-expert-twitter</guid><dc:creator><![CDATA[Klon Kitchen]]></dc:creator><pubDate>Thu, 16 Dec 2021 11:00:52 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/45527951/f40b7d64595c83248fa7c274ae4167c5.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><strong><a href="https://www.aei.org/profile/yuval-levin/">Yuval Levin</a></strong> is the director of Social, Cultural, and Constitutional Studies at the American Enterprise Institute (AEI). He also holds the Beth and Ravenel Curry Chair in Public Policy. The founding and current editor of National Affairs, he is also a senior editor of The New Atlantis and a contributing editor to National Review.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aboI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9375bd27-5e1c-4572-9f4c-74be80ae4d9e_5739x3826.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aboI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9375bd27-5e1c-4572-9f4c-74be80ae4d9e_5739x3826.jpeg 424w, https://substackcdn.com/image/fetch/$s_!aboI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9375bd27-5e1c-4572-9f4c-74be80ae4d9e_5739x3826.jpeg 848w, https://substackcdn.com/image/fetch/$s_!aboI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9375bd27-5e1c-4572-9f4c-74be80ae4d9e_5739x3826.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!aboI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9375bd27-5e1c-4572-9f4c-74be80ae4d9e_5739x3826.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aboI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9375bd27-5e1c-4572-9f4c-74be80ae4d9e_5739x3826.jpeg" width="1100" height="733" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/9375bd27-5e1c-4572-9f4c-74be80ae4d9e_5739x3826.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:733,&quot;width&quot;:1100,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:5637767,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aboI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9375bd27-5e1c-4572-9f4c-74be80ae4d9e_5739x3826.jpeg 424w, https://substackcdn.com/image/fetch/$s_!aboI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9375bd27-5e1c-4572-9f4c-74be80ae4d9e_5739x3826.jpeg 848w, https://substackcdn.com/image/fetch/$s_!aboI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9375bd27-5e1c-4572-9f4c-74be80ae4d9e_5739x3826.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!aboI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9375bd27-5e1c-4572-9f4c-74be80ae4d9e_5739x3826.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: AEI</figcaption></figure></div><p>Dr. Levin and scholars in the Social, Cultural, and Constitutional Studies research division study the foundations of self-government and the future of law, regulation, and constitutionalism. They also explore the state of American social, political, and civic life, while focusing on the preconditions necessary for family, community, and country to flourish.</p><p>Dr. Levin served as a member of the White House domestic policy staff under President George W. Bush. He was also executive director of the President&#8217;s Council on Bioethics and a congressional staffer at the member, committee, and leadership levels.</p><p>He joined me recently for a fascinating chat about technology, society, and our nation&#8217;s future. </p><p>I hope you enjoy the conversation!</p><p>Klon</p>]]></content:encoded></item><item><title><![CDATA[Friday Brief for 10 December 2021]]></title><description><![CDATA[What I saw in CA; Stuff I hope we're doing; & Google and Microsoft get offensive]]></description><link>https://www.thekitchensync.tech/p/friday-brief-for-10-december-2021</link><guid isPermaLink="false">https://www.thekitchensync.tech/p/friday-brief-for-10-december-2021</guid><dc:creator><![CDATA[Klon Kitchen]]></dc:creator><pubDate>Fri, 10 Dec 2021 11:00:52 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/45036866/e1bec78f0f8603b1c303e3b45ca61b4a.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Uh2b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 424w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 848w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1272w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png" width="737" height="121.605" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:165,&quot;width&quot;:1000,&quot;resizeWidth&quot;:737,&quot;bytes&quot;:12912,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 424w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 848w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1272w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><div><hr></div><h4>Tech Terms</h4><blockquote><p><strong><a href="https://www.techopedia.com/definition/33729/cryptomining#:~:text=Cryptomining%20is%20the%20process%20of,to%20record%20all%20financial%20transactions.&amp;text=The%20renter%20is%20allowed%20to,the%20maintenance%20of%20the%20rig.">Cryptomining</a> &#8212; </strong>the process of validating a cryptocurrency transaction.</p></blockquote><div><hr></div><h2>What I saw in California</h2><p><strong>What&#8217;s New: </strong>I spent the last four days in Los Angeles and San Francisco, CA meeting with engineers, founders/executives, and venture capitalists to get their perspectives on all things tech and foreign policy.</p><p><strong>Why This Matters: </strong>I&#8217;m encouraged by the growing consensus concerning China, national defense, and the need for deliberate efforts to ensure American prosperity and security.</p><p><strong>Key Points:</strong></p><ul><li><p>Pre-COVID, I would visit &#8220;The Valley&#8221; about once a quarter. It provides a way for me to stay current on what&#8217;s happening in the tech and start-up world and to tend relationships.</p></li><li><p>This is my first trip back in almost two years and it didn&#8217;t take long for me to realize why these trips are so valuable.</p></li></ul><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>There are two camps on China and one is much bigger than the other.</strong> Long-gone are the days when techies view China as a bottomless money bag or consequence-free source of human capital. Virtually everyone I met with understands that tensions between Washington and Beijing are deep and persistent. While a few were exasperated by what they see as Americans&#8217; pollyannish persnicketiness on things like human rights and the rule-of-law, the vast majority expressed support for resisting Chinese aggression and coercive economics. Even those inclined to be more accommodating of Beijing, recognized that it&#8217;s actually the Chinese Communist Party who is provoking most of the challenges for business in China and that there&#8217;s little reason to believe better days are ahead in the near-term.</p></li><li><p><strong>There are a </strong><em><strong>LOT</strong></em><strong> of smart, capable people working these issues.</strong> Perhaps more than any previous visit, the last few days illustrated just how powerful the American system really is. Meeting after meeting I sat with people who are leaders in their respective fields and who have the time and means to do pretty much whatever they want. And you know what they&#8217;re thinking about? The same stuff I am and they are bringing some real horsepower to the challenge. Because China policy is inseparable from broader economic, social, and political realities, there are titans within each of these spheres who are gathering resources, shaping events, and moving the needle in very real ways. It&#8217;s another example of how powerful the U.S. private sector is and why it is such a key partner in the defense of democracy.</p></li><li><p><strong>The new defense industrial base is taking shape.</strong> Companies like <a href="https://www.anduril.com/">Anduril</a>, <a href="https://rebelliondefense.com/">Rebellion Defense</a>, <a href="https://www.skydio.com/defense">Skydio</a>, and others are winning contracts and building amazing capabilities. Secretary of Defense Lloyd Austin <a href="https://www.defense.gov/News/Speeches/Speech/Article/2861931/remarks-by-secretary-of-defense-lloyd-j-austin-iii-at-the-reagan-national-defen/">recently explained</a> the Pentagon&#8217;s plans to out-innovate the nation&#8217;s rivals &#8212; including more government/industry R&amp;D partnerships, expanded Small Business Innovation Research (SBIR), and the development of regional &#8220;tech hubs&#8221; around the nation &#8212; and certainly there is a growing ecosystem of lean, agile, and creative companies to work with. I&#8217;m pumped.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-10-december-2021?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-10-december-2021?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h2>Three things I hope we&#8217;re doing now</h2><p><strong>What&#8217;s New: </strong>A number of ongoing projects are causing me to think more concretely about a possible conflict over Taiwan.</p><p><strong>Why This Matters: </strong>There are three specific things I hope we&#8217;re already doing as we plan for this contingency. And if we&#8217;re not, I hope some of the readers of this newsletter will take these ideas and implement them.</p><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>We should be threat-hunting on Taiwanese networks.</strong> At the point where China is prepared to take action against Taiwan, you can be assured that it will have spent considerable effort in penetrating Taipei&#8217;s critical infrastructure, military nodes, and other networks and in laying the groundwork to disable or otherwise compromise these same assets. Even before the start of hostile actions, Beijing is likely already engaged in intelligence gathering, preparation of the battlefield, and pre-positioning other cyber capabilities. If we have not already, the U.S. should work out an agreement with Taiwan whereby we assist them now in discovering, removing, and mitigating malign Chinese cyber actors and activities on Taiwanese networks. This would likely require unprecedented formal access to these networks; however, it will be too late for such threat-hunting once the shooting starts.</p></li><li><p><strong>We should be identifying and securing TSMC&#8217;s &#8220;brain trust.&#8221;</strong> It takes more than money and equipment to design and manufacture cutting-edge integrated chips. You must also have the intellectual capital and practical experience that comes with being the world&#8217;s most important semiconductor company. In the event of a Chinese invasion or other hostile action against Taiwan, it will not be enough for the U.S. to have alternative factories in the United States and elsewhere. The world will also need the &#8220;brain trust&#8221; that is currently the beating heart of the <a href="https://www.tsmc.com/english">Taiwan Semiconductor Manufacturing Company</a>. The United States should be working with Taipei to identify these critical personnel and to develop scenarios for ensuring their safety if/when things go sideways.</p></li><li><p><strong>We should be securing the full integrated chip (IC) chain. </strong>Securing the design and manufacturing of advanced integrated circuits consists of thousands of individual steps. Each of them needs to be freed from Chinese influence if we are to have real security. Even more, as new fabrication facilities (&#8220;fabs&#8221;) in the United States and elsewhere are constructed, robust counterintelligence and industrial espionage measures must be taken. In the same way that the Russians famously bugged the U.S. embassy during the Cold War, it should be assumed that Beijing will take any measure it can to compromise new semiconductor facilities. This will require using similar procedures and approaches as those used in the construction of the nation&#8217;s most sensitive sites &#8212; like military bases, intelligence agency facilities, and nuclear weapons depots. It will do us no good to build these new fabs only to discover they&#8217;ve been compromised and must be razed to the ground.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-10-december-2021?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-10-december-2021?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h2>Google &amp; Microsoft get offensive</h2><p><strong>What&#8217;s New: </strong>Google and Microsoft announced this week that they had taken separate actions against two groups of hackers.</p><p><strong>Why This Matters: </strong>Private companies are assuming a larger role in cybersecurity and will feature more prominently going forward.</p><p><strong>Key Points:</strong></p><ul><li><p>On Tuesday, <a href="https://blog.google/technology/safety-security/new-action-combat-cyber-crime/">Google said</a> it had disrupted a group who hijacked more than 1 million devices, using them to steal private data and to mine cryptocurrency.</p></li></ul><blockquote><p>&#8220;Today, we took action to disrupt Glupteba, a sophisticated botnet which targets Windows machines and protects itself using blockchain technology &#8230; After a thorough investigation, we determined that the Glupteba botnet currently involves approximately one million compromised Windows devices worldwide, and at times, grows at a rate of thousands of new devices per day. Glupteba is notorious for stealing users&#8217; credentials and data, mining cryptocurrencies on infected hosts, and setting up proxies to funnel other people&#8217;s internet traffic through infected machines and routers.&#8221;</p></blockquote><ul><li><p>Just one day prior, <a href="https://blogs.microsoft.com/on-the-issues/2021/12/06/cyberattacks-nickel-dcu-china/">Microsoft said</a> it disrupted a Chinese syndicate dubbed &#8220;Nickel,&#8221; who it said was targeting human rights groups, think tanks, and government agencies in the United States and more than 28 other nations.</p></li></ul><blockquote><p>&#8220;The Microsoft Threat Intelligence Center (MSTIC) has been tracking Nickel since 2016 and <a href="https://www.microsoft.com/security/blog/2021/12/06/nickel-targeting-government-organizations-across-latin-america-and-europe/">analyzing this specific activity</a> since 2019 &#8230; There is often a correlation between Nickel&#8217;s targets and China&#8217;s geopolitical interests.&#8221;</p></blockquote><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>These two companies have serious cybersecurity firepower.</strong> Google&#8217;s Threat Analysis Group (TAG) <a href="https://blog.google/threat-analysis-group/countering-threats-iran/">is reportedly tracking</a> more than 270 government-backed bad guys that are operating in more than 50 countries. In just the last year, TAG has issued more than 50K warnings, a 33% increase from 2020. Microsoft&#8217;s Digital Crimes Unit (DCU) is another powerhouse, consisting of an international team of business, legal, and technical experts tasked with &#8220;meaningfully disrupting the operational infrastructure used by cybercriminals, through civil legal actions or technical measures.&#8221; </p></li><li><p><strong>Even more capabilities are on the way.</strong> In August, these same two companies committed to spending more than $30 billion on cybersecurity. The folks in Redmond are putting $20 billion into &#8220;advanced security solutions&#8221; over the next five years and the search giant will cough up $10 billion for &#8220;expanding zero-trust programs, helping secure the software supply chain and enhancing open-source security.&#8221;</p></li><li><p><strong>Cybersecurity is a team sport (and we&#8217;ve got a strong team).</strong> Most of the public dialogue about &#8220;big tech&#8221; is overwhelmingly characterized by perceived slights and political grievances. This means that really important developments like those in this story are often missed. But it&#8217;s worth noting that one of the reasons that our nation enjoys any level of cybersecurity is due to the actions of these same companies. They obviously have self-interested reasons for these actions, but so do we and I&#8217;m thankful that we have such capable, well-resourced teams working to secure our data, our networks, and our nation.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-10-december-2021?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-10-december-2021?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h2>Let&#8217;s Get Visual</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.visualcapitalist.com/what-are-nfts-mapping-the-nft-ecosystem/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XQrY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4edf7a49-fa2d-48c2-9c8b-9a34d34cae2a_1200x11495.jpeg 424w, https://substackcdn.com/image/fetch/$s_!XQrY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4edf7a49-fa2d-48c2-9c8b-9a34d34cae2a_1200x11495.jpeg 848w, https://substackcdn.com/image/fetch/$s_!XQrY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4edf7a49-fa2d-48c2-9c8b-9a34d34cae2a_1200x11495.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!XQrY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4edf7a49-fa2d-48c2-9c8b-9a34d34cae2a_1200x11495.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XQrY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4edf7a49-fa2d-48c2-9c8b-9a34d34cae2a_1200x11495.jpeg" width="855" height="8192" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/4edf7a49-fa2d-48c2-9c8b-9a34d34cae2a_1200x11495.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:8192,&quot;width&quot;:855,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;What are NFTs? The NFT Ecosystem, Explained&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:&quot;https://www.visualcapitalist.com/what-are-nfts-mapping-the-nft-ecosystem/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="What are NFTs? The NFT Ecosystem, Explained" title="What are NFTs? The NFT Ecosystem, Explained" srcset="https://substackcdn.com/image/fetch/$s_!XQrY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4edf7a49-fa2d-48c2-9c8b-9a34d34cae2a_1200x11495.jpeg 424w, https://substackcdn.com/image/fetch/$s_!XQrY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4edf7a49-fa2d-48c2-9c8b-9a34d34cae2a_1200x11495.jpeg 848w, https://substackcdn.com/image/fetch/$s_!XQrY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4edf7a49-fa2d-48c2-9c8b-9a34d34cae2a_1200x11495.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!XQrY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F4edf7a49-fa2d-48c2-9c8b-9a34d34cae2a_1200x11495.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Visual Capitalist</figcaption></figure></div><div><hr></div><h2>Nerd Humor</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://thelifeofsharks.tumblr.com/post/661940181752053760" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!j1Fd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9e07805c-0af8-4a9a-8a77-5451c54f7ef2_500x337.jpeg 424w, https://substackcdn.com/image/fetch/$s_!j1Fd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9e07805c-0af8-4a9a-8a77-5451c54f7ef2_500x337.jpeg 848w, https://substackcdn.com/image/fetch/$s_!j1Fd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9e07805c-0af8-4a9a-8a77-5451c54f7ef2_500x337.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!j1Fd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9e07805c-0af8-4a9a-8a77-5451c54f7ef2_500x337.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!j1Fd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9e07805c-0af8-4a9a-8a77-5451c54f7ef2_500x337.jpeg" width="598" height="403.052" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/9e07805c-0af8-4a9a-8a77-5451c54f7ef2_500x337.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:337,&quot;width&quot;:500,&quot;resizeWidth&quot;:598,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:&quot;https://thelifeofsharks.tumblr.com/post/661940181752053760&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="image" title="image" srcset="https://substackcdn.com/image/fetch/$s_!j1Fd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9e07805c-0af8-4a9a-8a77-5451c54f7ef2_500x337.jpeg 424w, https://substackcdn.com/image/fetch/$s_!j1Fd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9e07805c-0af8-4a9a-8a77-5451c54f7ef2_500x337.jpeg 848w, https://substackcdn.com/image/fetch/$s_!j1Fd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9e07805c-0af8-4a9a-8a77-5451c54f7ef2_500x337.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!j1Fd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F9e07805c-0af8-4a9a-8a77-5451c54f7ef2_500x337.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2>Quick Clicks</h2><ul><li><p><a href="https://arstechnica.com/science/2021/12/after-a-thorough-review-nasa-awards-additional-astronaut-flights-to-spacex/">SpaceX will provide more astronaut rides</a></p></li><li><p><a href="https://www.sciencealert.com/ai-is-discovering-patterns-in-pure-mathematics-that-have-never-been-seen-before">AI is finding new patterns in &#8220;pure mathematics&#8221;</a></p></li><li><p><a href="https://www.nytimes.com/2021/12/05/us/politics/us-military-ransomware-cyber-command.html">CYBERCOM admits actions against ransomware groups</a></p></li><li><p><a href="https://breakingdefense.com/2021/12/pentagon-creates-new-overseer-for-innovation-chief-digital-and-artificial-intelligence-officer/" title="Permanent link to Pentagon creates new overseer for innovation: chief digital and artificial intelligence officer">Pentagon creates new overseer for innovation: chief digital and artificial intelligence officer</a></p></li><li><p><a href="https://www.technologyreview.com/2021/12/08/1041557/deepmind-language-model-beat-others-25-times-size-gpt-3-megatron/">DeepMind says its new language model can beat others 25 times its size</a></p></li></ul><div><hr></div><p><em>That&#8217;s it for this Friday Brief. Thanks for reading, and if you think someone else would like this newsletter, please share it with your friends and followers. Have a great weekend!</em></p>]]></content:encoded></item><item><title><![CDATA[Friday Brief for 3 December 2021]]></title><description><![CDATA[Space heats up; Cyber spillover in the Middle East; & "C" speaks out]]></description><link>https://www.thekitchensync.tech/p/friday-brief-for-3-december-2021</link><guid isPermaLink="false">https://www.thekitchensync.tech/p/friday-brief-for-3-december-2021</guid><dc:creator><![CDATA[Klon Kitchen]]></dc:creator><pubDate>Fri, 03 Dec 2021 11:00:39 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/44737544/a6af1aaa9d19f1efce61bb09c075e38b.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Uh2b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 424w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 848w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1272w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png" width="737" height="121.605" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:165,&quot;width&quot;:1000,&quot;resizeWidth&quot;:737,&quot;bytes&quot;:12912,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 424w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 848w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1272w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><div><hr></div><h4>Tech Terms</h4><blockquote><p><strong>Web 3.0 &#8212; </strong><em>It&#8217;s complicated; but, you&#8217;re going to be hearing more about this and so here&#8217;s the best concise introduction I could find (5min 18sec).</em></p></blockquote><div id="youtube2-gk1KxtJ-l5E" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;gk1KxtJ-l5E&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/gk1KxtJ-l5E?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h2>Heads Up</h2><p>This week I published an essay with The Hoover Institution/Lawfare Blog &#8212; <em><strong><a href="https://www.lawfareblog.com/business-knowing-private-market-data-and-contemporary-intelligence">The Business of Knowing: Private Market Data and Contemporary Intelligence</a></strong></em> (see the attached PDF below). </p><p><strong>Bottom Line:</strong> Many U.S. federal agencies are purchasing private market data. This paper argues that U.S. government access to at least some private market data &#8212; and the limiting of foreign access to this same information &#8212; is essential for national security. It also argues, however, for a refined awareness that acknowledges the privacy we have already lost and that implements greater government oversight and accountability.</p><blockquote><p>&#8220;The American people and their government leaders cannot avoid these realities. Instead, they must adapt to them by refining our institutions and the critical balance between liberty and security. These changes necessarily require uncomfortable choices that bring with them no ironclad assurances of safety. But while an evolution as discussed in this paper does not guarantee success, a lack of adaptation will guarantee failure.&#8221;</p></blockquote><div class="file-embed-wrapper" data-component-name="FileToDOM"><div class="file-embed-container-reader"><div class="file-embed-container-top"><image class="file-embed-thumbnail" src="https://cdn.substack.com/image/fetch/w_400,h_600,c_fill,f_auto,q_auto:best,fl_progressive:steep,g_auto,ar_1.5/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F781494ee-fa04-407a-9798-64f081ba324b_480x384.png"></image><div class="file-embed-details"><div class="file-embed-details-h1">The Business Of Knowing: Private Market Data and Contemporary Intelligence</div><div class="file-embed-details-h2">506KB &#8729; PDF file</div></div><a class="file-embed-button wide" href="https://www.thekitchensync.tech/api/v1/file/71c598d4-7e7d-40c5-a0b3-b3b8866c68d5.pdf"><span class="file-embed-button-text">Download</span></a></div><a class="file-embed-button narrow" href="https://www.thekitchensync.tech/api/v1/file/71c598d4-7e7d-40c5-a0b3-b3b8866c68d5.pdf"><span class="file-embed-button-text">Download</span></a></div></div><div><hr></div><h2>Space Is Heating Up</h2><p><strong>What&#8217;s New: </strong>Josh Rogin has an interesting <a href="https://www.washingtonpost.com/opinions/2021/11/30/space-race-china-david-thompson/">editorial in the Washington Post</a>, arguing the United States is already battling its adversaries in space every day.</p><p><strong>Why This Matters: </strong>&#8220;While Washington officials and experts <a href="https://www.rand.org/blog/2020/10/how-to-avoid-a-space-arms-race.html">warn of the risks</a> of an arms race in space, the United States&#8217; adversaries are constantly conducting operations against U.S. satellites that skirt the line between intelligence operations and acts of war.&#8221;</p><p><strong>Key Points:</strong></p><ul><li><p>Rogin cites a conversation with Gen. David Thompson, Space Force&#8217;s vice chief of space operations, who warned that China could soon become the dominant power in the dark domain.</p></li></ul><blockquote><p>&#8220;The threats are really growing and expanding every single day. And it&#8217;s really an evolution of activity that&#8217;s been happening for a long time,&#8221; says Thompson. &#8220;We&#8217;re really at a point now where there&#8217;s a whole host of ways that our space systems can be threatened &#8230; [the Chinese are] fielding operational systems at an incredible rate.&#8221;</p></blockquote><ul><li><p>Both Russia and China regularly target American satellites with cyber attacks, jammers, and even lasers.</p></li></ul><blockquote><p>Rogin reports, &#8220;In 2019, Russia deployed a small satellite into an orbit so close to a U.S. &#8220;national security satellite&#8221; that the U.S. government didn&#8217;t know whether it was attacking or not, Thompson said. Then, the Russian satellite backed away and conducted a weapons test. It released a small target and then shot it with a projectile.&#8221;</p></blockquote><ul><li><p>This summer, the RAND Corporation issued <a href="https://www.rand.org/pubs/research_reports/RRA943-1.html">a study on how to deter China in space</a> that included the following findings:</p><ul><li><p>&#8220;Because of China's ambitions in space, deterring them requires the imposition of significant costs for aggressive action in space. Imposing political costs on China for aggressive action can be bolstered through strategic coordination between the United States and its allies.&#8221;</p></li><li><p>&#8220;China's view of space as a critical U.S. vulnerability makes U.S. space capabilities attractive targets for attack. Highlighting China's own reliance on space-based capabilities should be a part of a tailored deterrence strategy.&#8221;</p></li></ul></li></ul><div class="file-embed-wrapper" data-component-name="FileToDOM"><div class="file-embed-container-reader"><div class="file-embed-container-top"><image class="file-embed-thumbnail" src="https://cdn.substack.com/image/fetch/w_400,h_600,c_fill,f_auto,q_auto:best,fl_progressive:steep,g_auto,ar_1.5/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fb3504f68-4f22-4d99-970a-5aa3be174b73_133x200.webp"></image><div class="file-embed-details"><div class="file-embed-details-h1">Tailoring Deterrence for China in Space</div><div class="file-embed-details-h2">597KB &#8729; PDF file</div></div><a class="file-embed-button wide" href="https://www.thekitchensync.tech/api/v1/file/bfbbb66c-bdcb-4394-9ad2-c72ac23a5330.pdf"><span class="file-embed-button-text">Download</span></a></div><a class="file-embed-button narrow" href="https://www.thekitchensync.tech/api/v1/file/bfbbb66c-bdcb-4394-9ad2-c72ac23a5330.pdf"><span class="file-embed-button-text">Download</span></a></div></div><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>Space security is only growing in importance.</strong> The national security equities in space are clear &#8212; without our off-planet assets, virtually none of our military capabilities, from submarines to fighter jets, will know who, when, where, or how to operate. But space is equally important economically, as commercial applications come online and proliferate. In 2019, <a href="https://apps.bea.gov/scb/2019/12-december/pdf/1219-commercial-space.pdf">one report </a>said global space activity was more than $414.8 billion, with commercial space constituting 79% of total activity. This means space is yet another domain where government and industry interests are intermingled and will require strong cooperation to secure.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-3-december-2021?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-3-december-2021?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h2>Cyber Spillover Between Iran and Israel</h2><p><strong>What&#8217;s New: </strong>Online hostilities between Iran and Israel are expanding into civilian targets.</p><p><strong>Why This Matters: </strong>As the two nations square off in cyberspace, the threat of escalation and unintended consequences is rising.</p><p><strong>Key Points:</strong></p><ul><li><p>Jerusalem and Tehran have been in &#8220;<a href="https://www.nytimes.com/2021/11/27/world/middleeast/iran-israel-cyber-hack.html?smid=tw-share">persistent cyber engagement</a>&#8221; for years, but recent developments are bringing this shadow war into the light.</p></li><li><p><a href="https://www.timesofisrael.com/amid-ongoing-cyberwar-iran-uses-new-tactic-doxing-israeli-foes/">Last week</a>, Fars News &#8212; a media outlet run by Iran&#8217;s Islamic Revolutionary Guard Corps (IRCG) &#8212; published the name, image, birthdate, email, social media handles, phone number, and home address of an Israeli security expert they accused of specializing in anti-Iran hacking operations.</p></li><li><p>This doxing<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a> was proceeded by an attack carried out last month by the Iranian hacking group, Black Shadow, who shut down a number of Israeli websites and stole user data from the Israeli LGBT dating site, &#8220;Atraf.&#8221;</p></li><li><p>Also last month, Tehran accused Israel of conducting a cyberattack that shut down most of Iran&#8217;s gas stations for nearly two weeks.</p></li><li><p>Separate, but relatedly, <a href="https://www.nytimes.com/2021/11/18/us/politics/iranian-hackers-voter-intimidation-indicted.html">U.S. authorities are warning </a>that Iran continues to target U.S. critical infrastructure, including hospitals. </p></li></ul><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>It&#8217;s all fun and games until somebody gets hurt.</strong> Most of this activity is pretty standard. That is not to say, though, that it isn&#8217;t important or risky. Cyber is an attractive means of attack because it has the veneer of deniability and because it offers the ability to inflict coercive pain on a target typically without the death and destruction that accompanies &#8220;kinetic&#8221; options. However, things can always go sideways and the current engagement tempo between these two nations could easily get out of hand, with implications well beyond their respective borders. I&#8217;m all for playing hardball, but it&#8217;s better for everyone if we keep the game between the lines.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-3-december-2021?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-3-december-2021?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h2>&#8220;C&#8221; Speaks</h2><p><strong>What&#8217;s New: </strong>Richard Moore, Britain&#8217;s new Chief of the Secret Intelligence Service (MI6), recently <a href="https://www.gov.uk/government/speeches/cs-speech-to-the-international-institute-for-strategic-studies">spoke about human intelligence in the digital age</a>.</p><p><strong>Why This Matters: </strong>This is Moore&#8217;s first public speech as Chief of MI6, or &#8220;C,&#8221; and it is telling how much this speech focuses on technological disruption and China.</p><p><strong>Key Points:</strong></p><ul><li><p>&#8220;&#8230;We live in a world transformed by digital connectivity, and stand on the cusp of revolutionary advances in technology which will affect the manner in which we live and work in ways we cannot fully foresee.&#8221;</p></li><li><p>&#8220;Others would speak to you about the benefits associated with these new discoveries&#8230; and they are myriad. But I am paid to look at the threat side of the ledger. MI6 deals with the world as it is, not as we would like it to be. And the &#8216;digital attack surface&#8217; that criminals, terrorists and hostile states seek to exploit against us is growing exponentially.&#8221;</p></li><li><p>&#8220;According to some assessments, we may experience more technological progress in the next ten years than in the last century, with a disruptive impact equal to the industrial revolution. As a society, we have yet to fully internalise (<em>sic</em>) this stark fact and its potential impact on global geopolitics. But it is a white-hot focus for MI6.&#8221;</p></li><li><p>&#8220;The tectonic plates are shifting as China&#8217;s power, and its willingness to assert it, grows &#8230; The Chinese Intelligence Services are highly capable and continue to conduct large scale espionage operations against the UK and our allies. This includes targeting those working in government, industries, or on research of particular interest to the Chinese state.&#8221;</p></li><li><p>&#8220;Adapting to a world affected by the rise of China is the single greatest priority for MI6. We are deepening our understanding of China across the UK intelligence community, and widening the options available to the government in managing the systemic challenges that it poses.&#8221;</p></li><li><p>&#8220;Our adversaries are pouring money and ambition into mastering artificial intelligence, quantum computing and synthetic biology, because they know that mastering these technologies will give them leverage. An intelligence service needs to be at the vanguard of what is technologically possible.&#8221;</p></li><li><p>&#8220;We can not match the scale and resources of the global tech industry, so we shouldn&#8217;t try. Instead we should seek their help &#8230; I cannot stress enough what a sea-change this is in MI6&#8217;s culture, ethos and way of working &#8230; We must become more open, to stay secret.&#8221;</p></li></ul><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>Moore is right. </strong>Glad to see these views taking hold in places where it really matters.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-3-december-2021?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-3-december-2021?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h2>Let&#8217;s Get Visual</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.visualcapitalist.com/visualizing-the-accumulation-of-human-made-mass-on-earth/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!KsdF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faf5a1346-7167-43c4-bc53-71dcde08eeb5_1200x3407.png 424w, https://substackcdn.com/image/fetch/$s_!KsdF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faf5a1346-7167-43c4-bc53-71dcde08eeb5_1200x3407.png 848w, https://substackcdn.com/image/fetch/$s_!KsdF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faf5a1346-7167-43c4-bc53-71dcde08eeb5_1200x3407.png 1272w, https://substackcdn.com/image/fetch/$s_!KsdF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faf5a1346-7167-43c4-bc53-71dcde08eeb5_1200x3407.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!KsdF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faf5a1346-7167-43c4-bc53-71dcde08eeb5_1200x3407.png" width="1200" height="3407" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/af5a1346-7167-43c4-bc53-71dcde08eeb5_1200x3407.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:3407,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3455027,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:&quot;https://www.visualcapitalist.com/visualizing-the-accumulation-of-human-made-mass-on-earth/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!KsdF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faf5a1346-7167-43c4-bc53-71dcde08eeb5_1200x3407.png 424w, https://substackcdn.com/image/fetch/$s_!KsdF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faf5a1346-7167-43c4-bc53-71dcde08eeb5_1200x3407.png 848w, https://substackcdn.com/image/fetch/$s_!KsdF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faf5a1346-7167-43c4-bc53-71dcde08eeb5_1200x3407.png 1272w, https://substackcdn.com/image/fetch/$s_!KsdF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faf5a1346-7167-43c4-bc53-71dcde08eeb5_1200x3407.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Visual Capitalist</figcaption></figure></div><p></p><div><hr></div><h2>Nerd Humor</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!REMu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb6a2f15-df26-43db-9ced-15c1e690703b_1280x1376.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!REMu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb6a2f15-df26-43db-9ced-15c1e690703b_1280x1376.jpeg 424w, https://substackcdn.com/image/fetch/$s_!REMu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb6a2f15-df26-43db-9ced-15c1e690703b_1280x1376.jpeg 848w, https://substackcdn.com/image/fetch/$s_!REMu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb6a2f15-df26-43db-9ced-15c1e690703b_1280x1376.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!REMu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb6a2f15-df26-43db-9ced-15c1e690703b_1280x1376.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!REMu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb6a2f15-df26-43db-9ced-15c1e690703b_1280x1376.jpeg" width="1280" height="1376" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/cb6a2f15-df26-43db-9ced-15c1e690703b_1280x1376.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1376,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:227305,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!REMu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb6a2f15-df26-43db-9ced-15c1e690703b_1280x1376.jpeg 424w, https://substackcdn.com/image/fetch/$s_!REMu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb6a2f15-df26-43db-9ced-15c1e690703b_1280x1376.jpeg 848w, https://substackcdn.com/image/fetch/$s_!REMu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb6a2f15-df26-43db-9ced-15c1e690703b_1280x1376.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!REMu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb6a2f15-df26-43db-9ced-15c1e690703b_1280x1376.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">By Drew Panckeri, with <a href="https://www.cartooncollections.com/collections/wired">cartooncollections.com</a></figcaption></figure></div><div><hr></div><h2>Quick Clicks</h2><ul><li><p><a href="https://www.nytimes.com/2021/11/23/technology/samsung-chip-plant-texas.html">Samsung will build $17B chip plant in Texas</a></p></li><li><p><a href="https://www.nytimes.com/2021/11/30/technology/dorsey-twitter-big-tech-ceos.html">Dorsey&#8217;s departure hints at &#8220;big tech&#8221; restlessness</a></p></li><li><p><a href="https://www.justice.gov/usao-edmi/pr/international-hacking-group-members-sentenced-sim-hijacking-conspiracy-resulted-theft">SIM hackers sentenced</a></p></li><li><p><a href="https://breakingdefense.com/2021/11/exclusive-pentagon-weighing-reorganization-of-ai-data-offices/">Pentagon may reorganize AI and data offices</a></p></li><li><p><a href="https://www.bloomberg.com/news/articles/2021-12-01/china-plans-to-ban-loophole-used-by-tech-firms-for-foreign-ipos">China closing foreign funding loophole for tech companies</a></p></li></ul><div><hr></div><p><em>That&#8217;s it for this Friday Brief. Thanks for reading, and if you think someone else would like this newsletter, please share it with your friends and followers. Have a great weekend!</em></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p><em>verb </em><strong>INFORMAL</strong></p><p>gerund or present participle: <strong><a href="https://www.google.com/search?q=define+doxing&amp;oq=define+doxing&amp;aqs=chrome..69i57j0i22i30l2j0i390l3.2892j1j7&amp;sourceid=chrome&amp;ie=UTF-8">doxing</a>: </strong>search for and publish private or identifying information about (a particular individual) on the internet, typically with malicious intent.</p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[Friday Brief for 26 November 2021]]></title><description><![CDATA[We're not prepared; DOJ spending stolen bitcoin; & NK hackers target Chinese researchers]]></description><link>https://www.thekitchensync.tech/p/friday-brief-for-26-november-2021</link><guid isPermaLink="false">https://www.thekitchensync.tech/p/friday-brief-for-26-november-2021</guid><dc:creator><![CDATA[Klon Kitchen]]></dc:creator><pubDate>Fri, 26 Nov 2021 11:00:37 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/44462305/5f142a444e5c77b6507c5145f23fee35.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Uh2b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 424w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 848w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1272w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png" width="737" height="121.605" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:165,&quot;width&quot;:1000,&quot;resizeWidth&quot;:737,&quot;bytes&quot;:12912,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Uh2b!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 424w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 848w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1272w, https://substackcdn.com/image/fetch/$s_!Uh2b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F8c37b294-05d6-4c3b-9dd9-2375c281fb4a_1000x165.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mzzA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F958447d0-ebec-48b5-bdf1-d5940b7f1d2b_612x332.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mzzA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F958447d0-ebec-48b5-bdf1-d5940b7f1d2b_612x332.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mzzA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F958447d0-ebec-48b5-bdf1-d5940b7f1d2b_612x332.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mzzA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F958447d0-ebec-48b5-bdf1-d5940b7f1d2b_612x332.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mzzA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F958447d0-ebec-48b5-bdf1-d5940b7f1d2b_612x332.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mzzA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F958447d0-ebec-48b5-bdf1-d5940b7f1d2b_612x332.jpeg" width="612" height="332" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/958447d0-ebec-48b5-bdf1-d5940b7f1d2b_612x332.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:332,&quot;width&quot;:612,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:32185,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mzzA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F958447d0-ebec-48b5-bdf1-d5940b7f1d2b_612x332.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mzzA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F958447d0-ebec-48b5-bdf1-d5940b7f1d2b_612x332.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mzzA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F958447d0-ebec-48b5-bdf1-d5940b7f1d2b_612x332.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mzzA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F958447d0-ebec-48b5-bdf1-d5940b7f1d2b_612x332.jpeg 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Among my many blessings, is you! Thank you for your support and for making The Kitchen Sync such a success. I hope you&#8217;re having a very happy Thanksgiving holiday.</p><div><hr></div><h4>Tech Terms</h4><blockquote><p><strong><a href="https://associationsnow.com/2019/06/tech-talk-25-technology-terms-everyone-should-know/">Payment Card Industry Data Security Standard (PCI DSS)</a> &#8212; </strong><em>A set of security standards that are designed to ensure that all organizations that accept, process, store, or transmit credit card information maintain a secure environment. Failure to comply with PCI requirements can lead to steep fines and penalties, revocation of credit card payment services, or even suspension of accounts.</em></p></blockquote><div><hr></div><h2>To Secure Peace, Prepare for War</h2><p><strong>What&#8217;s New: </strong>There is mounting evidence that China has already achieved significant military capacity and may enjoy technical superiority in a number of critical capabilities.</p><p><strong>Why This Matters: </strong>War with China &#8212; though far from inevitable &#8212; would be so consequential and deadly that it must be prepared for more seriously and systematically than current efforts suggest we are doing.</p><p><strong>Key Points:</strong></p><ul><li><p>Chinese military spending &#8212; when properly accounting for differences in reporting structure, purchasing power, and labor costs &#8212; <a href="https://www.heritage.org/defense/commentary/chinas-defense-spending-larger-it-looks">is approaching 90% of U.S. military spending</a>.</p></li></ul><blockquote><p>&#8220;The Chinese People&#8217;s Liberation Army (PLA) remains one of the world&#8217;s largest militaries, but its days of largely obsolescent equipment are in the past,&#8221; <a href="https://www.heritage.org/military-strength/assessing-threats-us-vital-interests/china">argues the Heritage Foundation&#8217;s 2022 Military Index. </a>&#8220;Nearly two decades of officially acknowledged double-digit growth in the Chinese defense budget have resulted in a comprehensive modernization program that has benefited every part of the PLA.&#8221;</p></blockquote><ul><li><p>Similarly, this year&#8217;s <a href="https://www.dni.gov/files/ODNI/documents/assessments/ATA-2021-Unclassified-Report.pdf">Annual Threat Assessment (ATA) says</a>, &#8220;The PLA Navy and PLA Air Force are the largest in the region and continue to field advanced long-range platforms that improve China&#8217;s ability to project power. The PLA Rocket Force&#8217;s highly accurate short-, medium-, and intermediate-range conventional systems are capable of holding U.S. and allied bases in the region at risk.&#8221;</p></li><li><p>More novel capabilities were most recently demonstrated by the Chinese launch of an earth-orbiting, nuclear-capable hypersonic missile that also <a href="https://www.ft.com/content/a127f6de-f7b1-459e-b7ae-c14ed6a9198c">discharged some sort of projectile </a>during its terminal glide phase &#8212; a capability that some American observers say &#8220;defies physics.&#8221; </p></li></ul><ul><li><p>Regarding cyber, the ATA again makes the challenge very clear: </p></li></ul><blockquote><p>&#8220;We assess that China presents a prolific and effective cyber-espionage threat, possesses substantial cyber-attack capabilities, and presents a growing influence threat &#8230; We continue to assess that China can launch cyber attacks that, at a minimum, can cause localized, temporary disruptions to critical infrastructure within the United States.&#8221;</p></blockquote><ul><li><p><a href="https://www.cnas.org/publications/reports/beating-the-americans-at-their-own-game">Summarizing these trends</a>, Robert O. Work and Greg Grant say the following:</p></li></ul><blockquote><p>&#8220;China is keenly focused on blunting the U.S. military&#8217;s technological superiority, even as it strives to achieve technological parity, and eventually technological dominance &#8230; After considering what the Chinese military has accomplished technologically in little more than two decades and what they plan to do in the decades to come, any objective assessment must at least consider the possibility that the U.S. Joint Force is close to becoming the victim of a deliberate, patient, and robustly resourced military-technical offset strategy.&#8221;</p></blockquote><p><strong>What I&#8217;m Thinking:</strong></p><ul><li><p><strong>Nothing is inevitable and dispassionate analysis is key.</strong> No one knows the future and history is not a math problem to be &#8220;solved.&#8221; War with China is not an inescapable fate, but the likelihood of such a conflict is growing and the U.S. does not exercise unilateral influence over the matter. Many consider the devastation that would undoubtedly occur in a war between the U.S. and China and simply dismiss the possibility as &#8220;insane&#8221; or &#8220;too awful to consider.&#8221; While understandable, this approach is immoral for those tasked with securing the nation and its people. Washington and Beijing are already in a state of confrontation. We must acknowledge and accept that a progression to conflict and possibly even war is possible &#8212; but always with an commitment to defend our way of life and a determined willingness to avoid war if we can do so responsibly.</p></li><li><p><strong>There is good reason to believe we have a false understanding of Chinese capability.</strong> First, the closed nature of Chinese society makes it a difficult intelligence target. Second, <a href="https://www.nytimes.com/2017/05/20/world/asia/china-cia-spies-espionage.html">the U.S. intelligence posture on China has been devastated for years </a>and is slow in its recovery. Third, the fused relationship between the CCP and the nation&#8217;s industry make it difficult to identify the source and status of critical innovations and to limit them. For example, <a href="https://www.thekitchensync.tech/p/friday-brief-for-19-november-2021">as discussed last week</a>, of the 273 known Chinese suppliers of AI to the PLA, just 22 (8%) are limited by U.S. sanctions or other prohibitions. Finally, fourth, China&#8217;s hypersonic missile launch is only the latest technological feat to surprise Western analysts. There is broad concern that Beijing also enjoys parity or superiority in AI, quantum computing, and other emerging technologies. Despite all of this, U.S. policymakers and warplanners are dragging their feet by insufficiently funding our own military, failing to pass even these meager budgets, and refusing to prioritize this issue as it deserves. When asked about the recent hypersonic launch being seen as a &#8220;Sputnik moment,&#8221; Air Force General John Hyten, vice chairman of the Joint Chiefs of Staff, said, &#8220;From a technology perspective, it&#8217;s pretty impressive &#8230; But Sputnik created a sense of urgency in the United States ... The test on July 27 did not create that sense of urgency.&nbsp; I think it probably should create a sense of urgency."</p></li><li><p><strong>We should, therefore, plan for the worst.</strong> We should, I believe, begin by asking the question, &#8220;What would we do <em>now</em> if we knew with absolute certainty that the U.S. would be at war with China in the next 10 years?&#8221; While every contingency cannot be approached this way, the likelihood of this scenario is now sufficiently possible that it should at least form the boundaries of contemporary policy, planning, and strategy. This is made even more advisable by the fact that military strength and preparations provide both a specific deterrence to growing Chinese aggression as well as a general check on broader geopolitical risk. History is replete with examples of nations failing to recognize and to prepare for a war that &#8212; in hindsight &#8212; appears obvious. History also teaches that these failures are typically rooted, not in an inability to read the relevant signs at the time, but in a willful apathy fueled by delusional hopes and false assumptions. These are nation-killers.</p></li><li><p><strong>Three specific actions that can be taken.</strong> First, the Biden administration needs to prepare a serious, detailed national security strategy for China. This strategy should not be a blurry-eyed impression of a world we long for, but a clear-eyed articulation of interests and the steps we will take to secure them. Second, Congress should form a bi-partisan special committee on China, made up of members from the House and Senate. This committee should be tasked with holding hearings and generating a report on the current state of U.S.-China policy, the actions necessary for ensuring U.S. national security in the context of U.S.-China policy, and recommending specific executive and legislative action in this regard. Finally, the Defense Advanced Research Projects Agency (DARPA) should be tasked with a specific program of developing innovative strategies and capabilities specifically aimed at countering China. DARPA&#8217;s founding mission is &#8220;creating strategic surprise for adversaries and preventing strategic surprise to the US.&#8221; The agency is about to have its budget doubled by the U.S. Innovation and Competition Act &#8212; this seems like a worthy expenditure of these resources. </p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-26-november-2021?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-26-november-2021?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h2>U.S. Pays Victims $56 Million In Stolen Crypto</h2><p><strong>What&#8217;s New: </strong>The Department of Justice (DOJ) seized $56 million in cryptocurrency when it arrested a self-described &#8220;number one promoter&#8221; of the BitConnect fraud scheme, according to <a href="https://www.justice.gov/usao-sdca/pr/director-and-promoter-bitconnect-pleads-guilty-global-2-billion-cryptocurrency-scheme">a DOJ statement</a>.</p><p><strong>Why This Matters: </strong>BitConnect is the largest cryptocurrency fraud scheme ever criminally charged, and the U.S. government intends to sell the coins and use the proceeds to compensate victims.</p><p><strong>Key Points:</strong></p><ul><li><p>This week, Glenn Arcaro pleaded guilty to the massive conspiracy to defraud BitConnect investors, in which they invested more than $2 billion.</p></li><li><p>Arcaro is scheduled to be sentenced in early 2022 and faces up to 20 years of prison time.</p></li><li><p>The seized funds are primarily in the form of Bitcoin, but will be converted to fiat currency and used to compensate victims in U.S. dollars.</p></li><li><p>Separate, but relatedly, the IRS has seized $3.5 billion in cryptocurrency this year, accounting for 93% of criminal investigation seizures. </p></li></ul><p><strong>What I&#8217;m Thinking: </strong></p><ul><li><p><strong>Throw the book at this guy and give him the full 20.</strong> The scale of the BitConnect scheme and of the IRS&#8217;s seizures illustrate how bad guys have fully embraced digital cash and how we need to get a hold on this problem now.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-26-november-2021?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-26-november-2021?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h2>North Korean&#8217;s Snooping on Chinese Hackers</h2><p><strong>What&#8217;s New: </strong>Hackers backed by Pyongyang are targeting Chinese cybersecurity researchers and stealing their tools and techniques, <a href="https://www.thedailybeast.com/north-korean-hackers-caught-snooping-on-chinas-cyber-squad?ref=home">according to The Daily Beast.</a></p><p><strong>Why This Matters: </strong>North Korean hackers are under immense pressure to help the regime overcome crippling sanctions, so they&#8217;re always on the lookout for new cyber capabilities.</p><p><strong>Key Points:</strong></p><ul><li><p>The CrowdStrike cybersecurity firm says Kim Jong Un&#8217;s minions lured Chinese researchers with malware-laden files, labeled &#8220;Securitystatuscheck.zip&#8221; and &#8220;_signed.pdf.&#8221;</p></li><li><p>China&#8217;s Ministry of Public Security and the National Information Security Standardization Technical Committee were among the groups who were targeted.</p></li><li><p>The Lazarus Group (aka Stardust Chollima) appears to be behind the operation. </p></li></ul><blockquote><p>&#8220;For vulnerability research in particular that would be interesting&#8212;it in effect allows you to collect and steal weapons that you can use for other operations. It could also give them insight into new techniques that they&#8217;re not aware of and how research is being conducted,&#8221; said CrowdStrike&#8217;s VP of Intelligence Adam Meyers. &#8220;It also lets you know what the security posture looks like in other countries.&#8221;</p></blockquote><p><strong>What I&#8217;m Thinking: </strong></p><ul><li><p><strong>There&#8217;s no honor among thieves.</strong> North Korea is a tier-one cybersecurity threat and they&#8217;re highly motivated because these types of operations are critical for the nation&#8217;s primary means of supporting itself: cybercrime. While going after China always has some inherent risk, Beijing also understands this is all part of the game. That doesn&#8217;t mean that Xi Jinping won&#8217;t turn a few screws if and when he feels the need to do so. But, I don&#8217;t think this is a huge deal in the context of the broader North Korea-China relationship. </p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thekitchensync.tech/p/friday-brief-for-26-november-2021?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thekitchensync.tech/p/friday-brief-for-26-november-2021?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h2>Let&#8217;s Get Visual</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.visualcapitalist.com/going-beyond-crypto-exploring-the-digital-asset-ecosystem/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dCbZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7c285742-0605-4de0-a997-8d0cb3dd83e6_2400x7544.jpeg 424w, https://substackcdn.com/image/fetch/$s_!dCbZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7c285742-0605-4de0-a997-8d0cb3dd83e6_2400x7544.jpeg 848w, https://substackcdn.com/image/fetch/$s_!dCbZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7c285742-0605-4de0-a997-8d0cb3dd83e6_2400x7544.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!dCbZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7c285742-0605-4de0-a997-8d0cb3dd83e6_2400x7544.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dCbZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7c285742-0605-4de0-a997-8d0cb3dd83e6_2400x7544.jpeg" width="1456" height="4577" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/7c285742-0605-4de0-a997-8d0cb3dd83e6_2400x7544.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:4577,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:5067441,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:&quot;https://www.visualcapitalist.com/going-beyond-crypto-exploring-the-digital-asset-ecosystem/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dCbZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7c285742-0605-4de0-a997-8d0cb3dd83e6_2400x7544.jpeg 424w, https://substackcdn.com/image/fetch/$s_!dCbZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7c285742-0605-4de0-a997-8d0cb3dd83e6_2400x7544.jpeg 848w, https://substackcdn.com/image/fetch/$s_!dCbZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7c285742-0605-4de0-a997-8d0cb3dd83e6_2400x7544.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!dCbZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F7c285742-0605-4de0-a997-8d0cb3dd83e6_2400x7544.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Visual Capitalist</figcaption></figure></div><div><hr></div><h2>Nerd Humor</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!agnR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fedcaf116-6214-418f-b10c-4ff419c880eb_1600x1500.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!agnR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fedcaf116-6214-418f-b10c-4ff419c880eb_1600x1500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!agnR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fedcaf116-6214-418f-b10c-4ff419c880eb_1600x1500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!agnR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fedcaf116-6214-418f-b10c-4ff419c880eb_1600x1500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!agnR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fedcaf116-6214-418f-b10c-4ff419c880eb_1600x1500.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!agnR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fedcaf116-6214-418f-b10c-4ff419c880eb_1600x1500.jpeg" width="1456" height="1365" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/edcaf116-6214-418f-b10c-4ff419c880eb_1600x1500.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1365,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:176377,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!agnR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fedcaf116-6214-418f-b10c-4ff419c880eb_1600x1500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!agnR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fedcaf116-6214-418f-b10c-4ff419c880eb_1600x1500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!agnR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fedcaf116-6214-418f-b10c-4ff419c880eb_1600x1500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!agnR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fedcaf116-6214-418f-b10c-4ff419c880eb_1600x1500.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">By Brooke Bourgeois, with <a href="https://www.cartooncollections.com/collections/wired">cartooncollections.com</a></figcaption></figure></div><div><hr></div><h2>Quick Clicks</h2><ul><li><p><a href="https://www.wired.com/story/iran-2020-election-interference/">How Iran tried to undermine the 2020 election</a></p></li><li><p><a href="https://www.nytimes.com/2021/11/18/world/middleeast/iran-drone-al-tanf-syria.html">Strike on U.S. base was Iranian response to Israel</a></p></li><li><p><a href="https://www.wired.com/story/the-us-space-force-wants-to-clean-up-junk-in-orbit/">Space Force wants to clean up space junk</a></p></li><li><p><a href="https://www.wsj.com/articles/ford-enters-semiconductor-business-amid-chip-shortage-impact-11637242202?mod=rss_Technology">Ford, GM step into chip business</a></p></li><li><p><a href="https://www.wsj.com/articles/australia-to-beef-up-high-tech-prowess-after-security-pact-with-u-s-11637129732?mod=rss_Technology">Australia is beefing up its tech prowess after AUKUS</a></p></li></ul><div><hr></div><p><em>That&#8217;s it for this Friday Brief. Thanks for reading, and if you think someone else would like this newsletter, please share it with your friends and followers. Have a great weekend!</em></p>]]></content:encoded></item><item><title><![CDATA[Two Swamp Creatures Walk Into a Bar]]></title><description><![CDATA[A Kitchen Sync Conversation with Dr. Michael Strain]]></description><link>https://www.thekitchensync.tech/p/two-swamp-creatures-walk-into-a-bar</link><guid isPermaLink="false">https://www.thekitchensync.tech/p/two-swamp-creatures-walk-into-a-bar</guid><dc:creator><![CDATA[Klon Kitchen]]></dc:creator><pubDate>Wed, 24 Nov 2021 11:00:32 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!z5UA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F27cd9747-1c91-4bd0-8479-2984863cb1ae_2100x1500.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong><a href="https://www.aei.org/profile/michael-r-strain/">Michael R. Strain</a></strong><a href="https://www.aei.org/profile/michael-r-strain/">&nbsp;</a>is the director of Economic Policy Studies, and the Arthur F. Burns Scholar in Political Economy at the American Enterprise Institute (AEI), where he oversees the Institute&#8217;s work in economic policy, financial markets, international trade and finance, tax and budget policy, welfare economics, health care policy, and related areas.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!z5UA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F27cd9747-1c91-4bd0-8479-2984863cb1ae_2100x1500.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!z5UA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F27cd9747-1c91-4bd0-8479-2984863cb1ae_2100x1500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!z5UA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F27cd9747-1c91-4bd0-8479-2984863cb1ae_2100x1500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!z5UA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F27cd9747-1c91-4bd0-8479-2984863cb1ae_2100x1500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!z5UA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F27cd9747-1c91-4bd0-8479-2984863cb1ae_2100x1500.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!z5UA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F27cd9747-1c91-4bd0-8479-2984863cb1ae_2100x1500.jpeg" width="1456" height="1040" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/27cd9747-1c91-4bd0-8479-2984863cb1ae_2100x1500.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1040,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:517454,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!z5UA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F27cd9747-1c91-4bd0-8479-2984863cb1ae_2100x1500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!z5UA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F27cd9747-1c91-4bd0-8479-2984863cb1ae_2100x1500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!z5UA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F27cd9747-1c91-4bd0-8479-2984863cb1ae_2100x1500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!z5UA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F27cd9747-1c91-4bd0-8479-2984863cb1ae_2100x1500.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Dr. M&#8230;</figcaption></figure></div>
      <p>
          <a href="https://www.thekitchensync.tech/p/two-swamp-creatures-walk-into-a-bar">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>