Commercial Cyber Espionage and Barriers to Digital Trade in China

Total Page:16

File Type:pdf, Size:1020Kb

Commercial Cyber Espionage and Barriers to Digital Trade in China COMMERCIAL CYBER ESPIONAGE AND BARRIERS TO DIGITAL TRADE IN CHINA HEARING BEFORE THE U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION ONE HUNDRED FOURTEENTH CONGRESS FIRST SESSION MONDAY, JUNE 15, 2015 Printed for use of the United States-China Economic and Security Review Commission Available via the World Wide Web: www.uscc.gov UNITED STATES-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION WASHINGTON: 2015 U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION Hon. WILLIAM A. REINSCH, Chairman Hon. DENNIS C. SHEA, Vice Chairman Commissioners: CAROLYN BARTHOLOMEW DANIEL M. SLANE PETER BROOKES SEN. JAMES TALENT ROBIN CLEVELAND DR. KATHERINE C. TOBIN JEFFREY L. FIEDLER MICHAEL R. WESSEL SEN. CARTE P. GOODWIN DR. LARRY M. WORTZEL MICHAEL R. DANIS, Executive Director The Commission was created on October 30, 2000 by the Floyd D. Spence National Defense Authorization Act for 2001 § 1238, Public Law No. 106-398, 114 STAT. 1654A-334 (2000) (codified at 22 U.S.C. § 7002 (2001), as amended by the Treasury and General Government Appropriations Act for 2002 § 645 (regarding employment status of staff) & § 648 (regarding changing annual report due date from March to June), Public Law No. 107-67, 115 STAT. 514 (Nov. 12, 2001); as amended by Division P of the “Consolidated Appropriations Resolution, 2003,” Pub L. No. 108-7 (Feb. 20, 2003) (regarding Commission name change, terms of Commissioners, and responsibilities of the Commission); as amended by Public Law No. 109- 108 (H.R. 2862) (Nov. 22, 2005) (regarding responsibilities of Commission and applicability of FACA); as amended by Division J of the “Consolidated Appropriations Act, 2008,” Public Law Nol. 110-161 (December 26, 2007) (regarding responsibilities of the Commission, and changing the Annual Report due date from June to December); as amended by the Carl Levin and Howard P. “Buck” McKeon National Defense Authorization Act for Fiscal Year 2015, P.L. 113-291 (December 19, 2014) (regarding responsibilities of the Commission). The Commission’s full charter is available at www.uscc.gov. iii September 01, 2015 The Honorable Orrin Hatch President Pro Tempore of the Senate, Washington, D.C. 20510 The Honorable John A. Boehner Speaker of the House of Representatives, Washington, D.C. 20515 DEAR SENATOR HATCH AND SPEAKER BOEHNER: We are pleased to notify you of the Commission’s June 15, 2015 public hearing on “Commercial Cyber Espionage and Barriers to Digital Trade in China.” The Floyd D. Spence National Defense Authorization Act (amended by Pub. L. No. 109-108, section 635(a) and amended by Pub. L. No. 113-291, Section 1259 B) provides the basis for this hearing. At the hearing, the Commissioners received testimony from the following witnesses: Samm Sacks, China Analyst, Eurasia Group; Matthew Schruers, Vice President for Law & Policy, Computer & Communications Industry Association; Paul M. Tiao, Partner, Hunton & Williams; Dennis F. Poindexter, author of The Chinese Information War, Espionage, Cyberwar, Communications Control and Related Threats to United States Interests; and Jen Weedon, Manager, Threat Intelligence and Strategic Analysis, FireEye and Mandiant, Inc. The hearing examined China’s use of standards, regulation, and censorship as a market-entry barrier. It also examined China’s use of cyber espionage to gather information for commercial purposes, including turning over U.S. intellectual property to competing Chinese state-owned enterprises. Lastly, the Commission also heard expert witnesses address the OPM breach and related hacking of federal agencies. We note that prepared statements for the hearing, the hearing transcript, and supporting documents submitted by the witnesses are available on the Commission’s website at www.USCC.gov. Members and the staff of the Commission are available to provide more detailed briefings. We hope these materials will be helpful to the Congress as it continues its assessment of U.S.-China relations and their impact on U.S. security. The Commission will examine in greater depth these issues, and the other issues enumerated in its statutory mandate, in its 2015 Annual Report that will be submitted to Congress in November 2015. Should you have any questions regarding this hearing or any other issue related to China, please do not hesitate to have your staff contact Communications Director and Congressional Liaison, Anthony Demarino, at (202) 624-1496 or via email at [email protected]. Sincerely yours, Hon. William A. Reinsch Hon. Dennis C. Shea Chairman Vice Chairman iv CONTENTS MONDAY, JUNE 15, 2015 COMMERCIAL CYBER ESPIONAGE AND BARRIERS TO DIGITAL TRADE IN CHINA Opening Statement of Vice Chairman Dennis C. Shea (Hearing Co-Chair) .......................................................................................................02 Opening Statement of Commissioner Carte P. Goodwin (Hearing Co-Chair) .......................................................................................................04 Panel I: Barriers to Digital Trade and Costs to U.S. Firms Panel I Introduction by Commissioner Carte P. Goodwin (Hearing Co-Chair) .......................................................................................................05 Statement of Matthew Schruers Vice President for Law & Policy Computer & Communications Industry Association .....................................................06 Prepared Statement .........................................................................................................08 Statement of Samm Sacks China Analyst, Eurasia Group ........................................................................................18 Prepared Statement .........................................................................................................20 Panel I: Question and Answer............................................................................................28 Panel II: Commercial Cyber Espionage Panel II Introduction by Vice Chairman Dennis C. Shea (Hearing Co-Chair) .......................................................................................................46 Statement of Paul M. Tiao Partner, Hunton & Williams ..........................................................................................47 Prepared Statement .........................................................................................................50 Statement of Dennis F. Poindexter author of The Chinese Information War, Espionage, Cyberwar, Communications Control and Related Threats to United States Interests ..................................................55 Prepared Statement .........................................................................................................57 Statement of Jen Weedon Manager, Threat Intelligence and Strategic Analysis, FireEye and Mandiant, Inc. .......62 Prepared Statement .........................................................................................................65 Panel II: Question and Answer ..........................................................................................73 2 COMMERCIAL CYBER ESPIONAGE AND BARRIERS TO DIGITAL TRADE IN CHINA MONDAY, JUNE 15, 2015 U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION Washington, D.C. The Commission met in Room 608 of the Dirksen Senate Office Building in Washington, DC at 9:00 a.m., Commissioner Carte P. Goodwin and Vice Chairman Dennis Shea (Hearing Co- Chairs), presiding. OPENING STATEMENT OF VICE CHAIRMAN DENNIS C. SHEA HEARING CO-CHAIR VICE CHAIRMAN SHEA: Well, good morning, everyone, and thank you for being here today. Before I go any further, I'd like to thank Senate Budget Committee Chairman Mike Enzi for the use of this hearing room and also thank the staff of the Senate Budget Committee for helping make this possible. This morning's hearing is the last of seven in our 2015 Annual Report cycle. We have an excellent line-up of witnesses on a very important and I must say timely topic. Our hearing today concerns cyber espionage and barriers to digital trade in China. I thank the witnesses for their written testimony submitted in advance for the record and now posted on our Web site at uscc.gov. Only two months ago President Obama declared a national emergency as a result of the quote, "increasing prevalence and severity of malicious cyber-enabled" attacks that "constitute an unusual and extraordinary threat to the national security, foreign policy, and economy of the United States." And only two weeks ago the nation learned that an attack on the Office of Personnel Management resulted in the theft of the personal information of four million current and former federal workers and retirees. Especially worrisome is the fact that the attackers apparently obtained the records of federal workers who have received security clearances from the OPM, which conducts about 80 percent of the security investigations and clearances for the federal workforce. This intrusion indicates a high degree of planning and sophistication. It followed a pattern that has become all too familiar: the use of zero-day malware that eluded commercial anti-spyware detection and servers or routing indicators located in China. And, of course, the standard denials from the government in Beijing that it does not conduct espionage on the United States because that would be illegal. I would like to ask the panelists to please keep to our seven-minute rule, seven minutes to summarize your written testimony. This provides us the time for an in-depth question and answer period--and we're not bashful about asking
Recommended publications
  • China, Encryption Policy, and International Influence 3
    A HOOVER INSTITUTION ESSAY China, Encryption Policy, and International Influence ADAM SEGAL Series Paper No. 1610 Hanging over the stand-off between the FBI and Apple over access to an encrypted iPhone used by one of the San Bernardino attackers was the question: What would China do?1 If Apple created unique software that allowed Washington access to the phone, would that open the door for Beijing to make similar demands on the company and all other foreign technology firms operating in China? As Senator Ron Wyden of Oregon argued, “This move by the FBI could snowball around the world. Why in the world would our government want to give repressive regimes in Russia and China a blueprint for forcing American companies to create a backdoor?”2 There was, at least at the rhetorical level, interaction between Chinese and US policymakers on the question of encryption. An early draft of China’s counterterrorism Law and Technology, Security, National law, for example, included provisions requiring the installation of backdoors and the reporting of encryption keys. President Barack Obama criticized these provisions in a March 2015 interview with Reuters, claiming they “would essentially force all foreign companies, including US companies, to turn over to the Chinese government mechanisms where they could snoop and keep track of all the users of those services.” He added, “We’ve made very clear to them [the Chinese government] that this is something they’re going to have to change if they expect to do business with the United States.”3 A few days
    [Show full text]
  • Congressional Directory WEST VIRGINIA
    290 Congressional Directory WEST VIRGINIA WEST VIRGINIA (Population 2010, 1,852,994) SENATORS JOE MANCHIN III, Democrat, of Fairmont, WV; born in Farmington, August 24, 1947; edu- cation: graduated, Farmington High School, Farmington, 1965; B.A., West Virginia University, WV, 1970; businessman; member of the West Virginia House of Delegates, 1982–86; member of the West Virginia State Senate, 1986–96; Secretary of State, West Virginia, 2000–04; elected governor of West Virginia in 2004 and reelected in 2008; chairman of the National Governors Association, 2010; religion: Catholic; married: Gayle Conelly; three children, Heather, Joseph IV, and Brooke; seven grandchildren; committees: Armed Services; Commerce, Science, and Transportation; Energy and Natural Resources; Veterans’ Affairs; elected to the 111th U.S. Sen- ate in the November 2, 2010, special election to the term ending January 3, 2013, a seat pre- viously held by Senator Carte Goodwin, and took the oath of office on November 15, 2010. Office Listings http://manchin.senate.gov https://www.facebook.com/joemanchinIII https://twitter.com/sen–joemanchin 306 Hart Senate Office Building, Washington, DC 20510 ....................................................... (202) 224–3954 Chief of Staff.—Hayden Rogers. FAX: 228–0002 Legislative Director.—Kirtan Mehta. Communications Director.—Jonathan Kott. 900 Pennsylvania Avenue, Suite 629, Charleston, WV 25302 ................................................. (304) 342–5855 State Director.—Mara Boggs. 261 Aikens Center, Suite 305, Martinsburg,
    [Show full text]
  • SAY IT LOUD Black and Proud with Windy City Black Pride and Chicago Windy City Black Pride-SGL
    THE VOICE OF CHICAGO’S GAY, LESBIAN, BI AND TRANS COMMUNITY SINCE 1985 July 7, 2010 • vol 25 no 40 www.WindyCityMediaGroup.com page 6 SAY IT LOUD Black and Proud with Windy City Black Pride and Chicago Windy City Black Pride-SGL The two organizations marked Black Pride with a variety of events, including celebrations in the park, workshops, re- ceptions and a historic HIV forum. Find out more on pages 8 and 19. Photos by Mason Harrison Activist and page 19 Allegations page 16 Artemis Singers page 17 Moving Pictures page 14 The Beekman Boys tJuly 7, 2010 nightspots Raise the Roof Gays love a parade! pages 16-17 pick it up take it home Richard Knight, Jr. reviews two new films—The Kids Are All Right (left) and La Mission (right). Plus, read Richard’s Pride Fest is best! Showing page 28 ChicagoPride for 8 years. page 14 interview with “Kids” director Lisa Cholodenko on page 15, and Lawrence Ferber’s interviews with Julianne Moore (page 14) and la Mission’s Benjamin Bratt and Jeremy Ray valdez (page 16). Brought to you by the combined efforts of page 20 2 July 7, 2010 July 7, 2010 3 index NEWS Byrd replacement & DADT 4 “A GENEROUS, NEARLY Detailing Obama’s deeds 4 Ariz. teen takes action 5 NOTE-PERFECT PORTRAIT OF A Greg Harris’ award 5 MODERN FAMILY. Organization in controversy 6 Exquisitely played by Annette Bening and Julianne Moore.” Passages: Miras 6 MANOHLA DARGIS Office of LGBT Health closing? 7 Tobacco use and LGBTs 7 Historic Black forum 8 AFC and IN-CARE 8 Alvarez’s Pride Awards 9 “HILARIOUS AND HEARTFELT.
    [Show full text]
  • A Note on Statistical Inference for Noisy Incomplete 1-Bit Matrix∗
    A Note on Statistical Inference for Noisy Incomplete 1-Bit Matrix∗ Yunxiao Chen1, Chengcheng Li2, and Gongjun Xu2 1Department of Statistics, London School of Economics and Political Science 2Department of Statistics, University of Michigan Abstract We consider the statistical inference for noisy incomplete 1-bit matrix. Instead of observing a subset of real-valued entries of a matrix M, we only have one binary (1-bit) measurement for each entry in this subset, where the binary measurement follows a Bernoulli distribution whose success probability is determined by the value of the entry. Despite the importance of uncertainty quantification to matrix completion, most of the categorical matrix completion literature focus on point estimation and prediction. This paper moves one step further towards the statistical inference for 1-bit matrix completion. Under a popular nonlinear factor analysis model, we obtain a point estimator and derive its asymptotic distribution for any linear form of M and latent factor scores. Moreover, our analysis adopts a flexible missing-entry design that does not require a random sampling scheme as required by most of the existing asymptotic results for matrix completion. The proposed estimator is statistically efficient and optimal, in the sense that the Cramer-Rao lower bound is achieved asymptotically for the model parameters. arXiv:2105.01769v1 [math.ST] 4 May 2021 Two applications are considered, including (1) linking two forms of an educational test and (2) linking the roll call voting records from multiple years in the United States senate. The first application enables the comparison between examinees who took different test forms, and the second application allows us to compare the liberal-conservativeness of senators who did not serve in the senate at the same time.
    [Show full text]
  • Senate Debate Nothing Would Protect Them from In- Time and Again Throughout the on This Bill
    E PL UR UM IB N U U S Congressional Record United States th of America PROCEEDINGS AND DEBATES OF THE 111 CONGRESS, SECOND SESSION Vol. 156 WASHINGTON, WEDNESDAY, SEPTEMBER 29, 2010 No. 133 Senate The Senate met at 9:30 a.m. and was appoint the Honorable TOM UDALL, a Senator that, but I am sure he prepared as he called to order by the Honorable TOM from the State of New Mexico, to perform did as a young boy, learning these UDALL, a Senator from the State of the duties of the Chair. verses of Scripture for his mother and New Mexico. DANIEL K. INOUYE, grandmother. President pro tempore. While he is here on the floor, I wish PRAYER Mr. UDALL of New Mexico thereupon to express my appreciation to him. But The Chaplain, Dr. Barry C. Black, of- assumed the chair as Acting President the appreciation is from everyone who fered the following prayer: pro tempore. was there who is not capable of doing Lord of heaven’s armies, we come to f that because they don’t have the abil- You today seeking Your wise guidance. ity to speak. So I say to my friend the RECOGNITION OF THE MAJORITY Chaplain, we appreciate your spiritual You asked us to embrace Your wisdom, LEADER for it is a treasure more precious than leadership of the Senate and your re- silver or gold. Help us to delight in The ACTING PRESIDENT pro tem- markable qualities as a person. Your sacred word and thrive like trees pore. The majority leader is recog- f nized.
    [Show full text]
  • CHAPTER 6: Governance and Order in a Networked World
    6 GOVERNANCE AND ORDER IN A NETWORKED WORLD Niall Ferguson “ s the world slouching toward a grave systemic crisis?” asked the his- Itorian Philip Zelikow at the annual gathering of the Aspen Strategy Group earlier this summer, the kind of “deep system- wide crisis . when people all over the world no longer think the old order work[s].” Among the reasons he gave for anticipating such a crisis was “the digital revolution and the rise of a networked world.” To grasp the scale and nature of this coming crisis, we must begin by recognizing how drasti- cally the balance of power has shift ed in our time from hierarchically ordered empires and superpowers (the euphemism for empire developed to suit American and Soviet sensibilities) to distributed networks. To be sure, the formal “org. chart” of global power is still dominated by the vertically structured super- polities that gradually evolved out of the republics and monarchies of early modern Europe, the colonies they established in the New World, and the older empires of Asia. Th ough not the most populous nation in the world, the United States is certainly the world’s most powerful state, despite—or perhaps because of—the peculiarities of its political system. Its nearest rival, the People’s Republic of China, is usually seen as a profoundly diff erent kind of state, for while the United States has two major parties, the People’s Republic has one, and only one. Th e US government is founded on the separation 159 119106-Shultz_BeyondDisruption.indd9106-Shultz_BeyondDisruption.indd 159159 33/23/18/23/18 77:12:12 PMPM 160 Niall Ferguson of powers, not least the independence of its judiciary; the PRC subordi- nates all other institutions, including the courts, to the dictates of the Communist Party.
    [Show full text]
  • 2010 Post-Election Briefing US House of Representatives
    2010 Post-Election Briefing US House of Representatives 111th Congress 112th Congress 255 Democrats 238 Republicans +60 178 Republicans 190 Democrats 2 vacancies Undecided: 7 seats © 2010 Venable LLP 2 Prospective House Leadership Speaker Minority Leader John Boehner (OH) Nancy Pelosi (CA) Majority Leader Minority Whip Eric Cantor (VA) Steny Hoyer (MD) Majority Whip Kevin McCarthy (CA) Assistant Leader Conference Chair James Clyburn (SC) Jeb Hensarling (TX) Caucus Chair Freshman Representative John Larson (CT) ? © 2010 Venable LLP 3 Prospective Chairman Prospective House Committees Ranking Member Agriculture Rep. Frank Lucas (R-OK) Rep. Collin Peterson (D-MN) Appropriations Rep. Jerry Lewis (R-CA) ? Rep. Hal Rogers (R-KY) Armed Services Rep. Buck McKeon (R-CA) ? Budget Rep. Paul Ryan (R-WI) ? Education and Labor Rep. John Kline (R-MN) Rep. George Miller (D-CA) Energy and Commerce Rep. Fred Upton (R-MI) Rep. Henry Waxman (D-CA) © 2010 Venable LLP 4 Prospective Chairman Prospective House Committees Ranking Member Financial Services Rep. Spencer Bachus (R-AL) Rep. Barney Frank (D-MA) Homeland Security Rep. Peter King (R-NY) Rep. Bennie Thompson (D-MS) Judiciary Rep. Lamar Smith (R-TX) Rep. John Conyers (D-MI) Oversight and Government Reform Rep. Darrell Issa (R-CA) Rep. Edolphus Towns (D-NY) Transportation Rep. John Mica (R-FL) ? Ways and Means Rep. Dave Camp (R-MI) Rep. Sandy Levin (D-MI) © 2010 Venable LLP 5 US Senate 111th Congress 112th Congress 57 Democrats 51 Democrats 41 Republicans 47 Republicans 2 Independents 2 Independents Undecided: • Alaska © 2010 Venable LLP 6 Prospective Senate Leadership Majority Leader Minority Leader Harry Reid (NV) Mitch McConnell (KY) Majority Whip Minority Whip Dick Durbin (IL) Jon Kyl (AZ) 7 Prospective Chairman Prospective Senate Committees Ranking Member Agriculture Sen.
    [Show full text]
  • April 27, 2016 Hearing Transcript
    CHINA'S 13TH FIVE-YEAR PLAN HEARING BEFORE THE U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION ONE HUNDRED FOURTEENTH CONGRESS SECOND SESSION Wednesday, April 27, 2016 Printed for use of the United States-China Economic and Security Review Commission Available via the World Wide Web: www.uscc.gov UNITED STATES-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION WASHINGTON: 2016 U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION HON. DENNIS C. SHEA, Chairman CAROLYN BARTHOLOMEW, Vice Chairman Commissioners: PETER BROOKES HON. JAMES TALENT ROBIN CLEVELAND DR. KATHERINE C. TOB IN HON. BYRON L. DORGAN MICHAEL R. WESSEL JEFFREY L. FIEDLER DR. LARRY M. WORTZEL HON. CARTE P. GOODWIN MICHAEL R. DANIS, Executive Director The Commission was created on October 30, 2000 by the Floyd D. Spence National Defense Authorization Act for 2001 § 1238, Public Law No. 106-398, 114 STAT. 1654A-334 (2000) (codified at 22 U.S.C. § 7002 (2001), as amended by the Treasury and General Government Appropriations Act for 2002 § 645 (regarding employment status of staff) & § 648 (regarding changing annual report due date from March to June), Public Law No. 107-67, 115 STAT. 514 (Nov. 12, 2001); as amended by Division P of the “Consolidated Appropriations Resolution, 2003,” Pub L. No. 108-7 (Feb. 20, 2003) (regarding Commission name change, terms of Commissioners, and responsibilities of the Commission); as amended by Public Law No. 109- 108 (H.R. 2862) (Nov. 22, 2005) (regarding responsibilities of Commission and applicability of FACA); as amended by Division J of the “Consolidated Appropriations Act, 2008,” Public Law Nol. 110-161 (December 26, 2007) (regarding responsibilities of the Commission, and changing the Annual Report due date from June to December); as amended by the Carl Levin and Howard P.
    [Show full text]
  • How China's Government, Businesses, and Populace
    Behind the Great Firewall: How China’s Government, Businesses, and Populace Compete to Shape the Chinese Internet An STS Research Paper presented to the faculty of the School of Engineering and Applied Science University of Virginia by James Houghton May 5, 2020 On my honor as a University student, I have neither given nor received unauthorized aid on this assignment as defined by the Honor Guidelines for Thesis-Related Assignments. Signed: _________________________________________________ Approved: ____________________________________________ Date _______________________ Peter Norton, Department of Engineering and Society 1 Behind the Great Firewall: How China’s Government, Businesses, and Populace Compete to Shape the Chinese Internet Introduction Chinese citizens are subject to some of the strictest censorship in the world. The Chinese government blocks nearly all of Google’s services, Facebook, Twitter, and even some academic journals. Even today, political expression is limited, and whistleblowers are silenced (Griffiths, 2020). Although many in China remain complacent due to highly integrated applications like WeChat, a small minority is vocal about combating censorship. The relationship between Chinese authorities and web users is complex and requires investigation. The Communist Party of China (CPC) has built what is now called the Great Firewall of China (GFW), a web traffic monitoring and censorship system. The CPC routinely uses it to scan for and block content it deems sensitive or inappropriate (Zheng, 2017). Although some people working in academia and business may have methods, by exemption or otherwise, of bypassing some of the GFW restrictions, the CPC has plugged many of its holes in recent years, impeding research and business opportunities. However, nearly all Chinese web users including students do not seek to access the uncensored web, and many businesses thrive with the lack of much foreign intervention.
    [Show full text]
  • West Virginia Politics and Government 2Nd Edition Pdf, Epub, Ebook
    WEST VIRGINIA POLITICS AND GOVERNMENT 2ND EDITION PDF, EPUB, EBOOK Richard A Brisbin | 9780803262430 | | | | | West Virginia Politics and Government 2nd edition PDF Book McWhorter R. Boreman R [4]. Constitutional Politics pp. It primarily brings extra administrative duties. The Legislature pp. It purports itself to be the busiest appellate court of its type in the United States, in part because West Virginia is one of only 11 states to not have an intermediate appellate court. The Budget Process pp. The concluding chapter assesses the future of governance in the state. You can help by adding to it. Phelps R. Caperton D. Jacob D. Watts D. White R. Each of the state's 55 counties has a county commission , consisting of three commissioners elected for six years but with terms so arranged that one is up for reelection every two years, which is the legislative and fiscal authority. Table of Contents. The session may be extended by concurrent resolution adopted by a two-thirds vote of each house. Albert B. Davis D. Aretas B. Meadows D. Intergovernmental Relations and the Political Agenda pp. Heiskell, III R [10]. Mario Palumbo D [10]. Morgan, Robert E. William Chapman Revercomb R. Contact Contact Us Help. A governor may only serve two consecutive terms. West Virginia Politics and Government 2nd edition Writer Clucas, Mark Henkels, and Brent S. The final day of the regular session usually includes last-minute legislation in order to meet a constitutionally- imposed deadline of midnight. Requires Adobe Digital Editions. Policy Controversies and the Capacity of the State Government pp. England R.
    [Show full text]
  • Cuaderno De Documentacion
    SECRETARIA DE ESTADO DE ECONOMÍA, MINISTERIO SECRETARÍA GENERAL DE POLÍTICA ECONÓMICA DE ECONOMÍA Y ECONOMÍA INTERNACIONAL Y HACIENDA SUBDIRECCIÓN GENERAL DE ECONOMÍA INTERNACIONAL CUADERNO DE DOCUMENTACION Número 91º ANEXO XI Alvaro Espina Vocal Asesor 6 de Septiembre de 2010 BACKGROUND0BU PAPERS: 1. A1B Keynesian success story, Spiegel On Line…7 2. The2B Economist as policitcal philosopher, Economicprincipals.com by David Warsh…13 3. What3B Germany knows about debt, The New York Times by Tyler Cowen…15 4. Germany’s4B super competitiveness: a helping hand from eastern Europe, Vox by Dalia Marin…17 5. Krugman5B on Cowen and Germany, Marginal Revolution, by Paul Krugman…19 6. What’s6B Germany’s secret?, The Economist, by Tyler Cowen…21 7. A7B generation of overoptimistic equity analysts, McKinsey Quarterly…23 8. Equity8B analysts: Still too bullish, Mckinsey&Company by Marc Goedhart, Rishi Raj and Abhishek Saxena…24 9. Bundesbank9B says Ireland will destroy eurozone, Eurointelligence…28 10. Senate10B set to end stalemate and extend jobless aid, The New York Times by Carl Hulse…31 11. Euro1B back at $1.30, Eurointelligence…34 12. Part12B 5A. What happens if things go really badly? $15 trillion of sovereign debt in default, Calculated Risk …37 13. The13B pundit delusion, The New York Times by Paul Krugman…40 14. Why14B I worry, The Conscience of a Liberal by Goldman Sachs…41 15. Whay15B the battle is joined over tightening, Ft.com by Martin Wolf…51 16. The16B great austerity debate, Ft.com …53 17. It17B is far too soon to end expansion by Brad Delong…55 18. Today’s18B Keynesians have learnt nothing, Ft.com by Niall Ferguson…57 19.
    [Show full text]
  • Hotspot Analysis: Synthesis 2017: Cyber-Conflicts in Perspective CSS CYBER DEFENSE PROJECT
    CSS CYBER DEFENSE PROJECT Hotspot Analysis: Synthesis 2017: Cyber-conflicts in perspective Zürich, September 2018 Version 1 Risk and Resilience Team Center for Security Studies (CSS), ETH Zürich Synthesis 2017: Cyber-conflicts in perspective Author: Marie Baezner © 2018 Center for Security Studies (CSS), ETH Zürich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zürich CH-8092 Zürich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zürich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group; Myriam Dunn Cavelty, Deputy Head for Research and Teaching; Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Baezner, Marie (2018): Hotspot Analysis: Synthesis 2017: Cyber-conflicts in perspective, September 2018, Center for Security Studies (CSS), ETH Zürich. 1 Synthesis 2017: Cyber-conflicts in perspective Table of Contents 1 Introduction 4 2 Beyond cybercrime: The politicization of cyberspace 5 2.1 Integration of cybersecurity at the policy level 5 2.2 Political and national security dimension 5 Strategic choice of target 5 Strategic attribution on the rise 6 2.3 Little innovation in cyberweapons 7 2.4 Restraint 7 3 Context matters: Cybermeans are adjunct, not stand-alone 8 3.1 Internationalized civil war: Syria 8 3.2 Asymmetric military operation between states: Ukraine 8 3.3 Strategic relationship between powers: USA- Russia, Elections in Europe, and China-USA 8 4 Determining the legitimate use of cybermeans: shaping behavioral norms 9 4.1 Disagreements on the purpose of intelligence 9 4.2 Disagreements on information warfare 9 5 Conclusion 10 6 Annex 1 11 7 Annex 2 18 8 Glossary 23 9 Abbreviations 23 10 Bibliography 24 2 Synthesis 2017: Cyber-conflicts in perspective regarding legitimate and illegitimate uses of cyberspace Executive Summary in strategic interactions.
    [Show full text]