Director, Center for Technology Policy DJI Mavic 2 pro is on display during 2020 Drone World Congress at Shenzhen Convention and Exhibition Center on September 13, 2020 in Shenzhen, Guangdong Province of China. VCG / Contributor / Getty Images
Key Takeaways
Considering the obvious security threat posed by Chinese-made drones, you’d think banning federal agencies from buying them would be an easy lift for Congress.
For mysterious reasons, that language was removed from the version of the NDAA that the House and Senate Armed services committees agreed on last week.
In all likelihood, it is now up to President Trump to restrict the federal purchase and operation of Chinese drones and the threat they pose to America.
The National Institute of Standards and Technology has published requirements that can help organizations protect controlled unclassified information against nation-state backed threats.
NDIA POLICY POINTS GLOBAL DEFENSE MARKET
China’s Naval Buildup Alarms Maritime Leaders
2/5/2021
Photo: iStock
Director of National Intelligence John Ratcliffe in December published an op-ed in the Wall Street Journal expounding on the threat China poses to not just the United States, but also the world.
While Ratcliffe explained that intelligence indicates that China “intends to dominate [the world] economically, militarily and technologically,” his piece focused on China’s underhanded economic and technological activity.
Although these aspects are vital for U.S. policymakers and the defense industry to understand, China’s open commitment to a military buildup cannot be understated. Policymakers and the defense industry must be acutely aware of China’s naval expansion and maritime activities if the United States is to maintain its global leadership position.
By Justin Katz
While both public- and private-sector entities are still reeling from the consequences from the SolarWinds Orion hack, the National Institute of Standards and Technology this week published new tools to help organizations defend sensitive information against nation-state backed threats.
The tools are mostly aimed at non-governmental entities responsible for housing sensitive, but unclassified government information. The security controls largely fall into one of three categories: structuring systems to be resistant against malicious actors, improving an organization s ability to detect threats and mitigate potential damage and ensuring an organization can recover from an attack. We developed SP 800-171 in response to major cyberattacks on U.S. critical infrastructure, and its companion document SP 800-172 is designed to mitigate attacks from advanced cyber threats such as the advanced persistent threat actor, said Ron Ross, a computer scientist and a NIST fell