$39 billion Chinese tech giant Didi leaves New York stock exchange after new SEC rules | US State Dept. phones hacked using Israeli NSO Group spyware | Misinformation stokes anti-vaccine fear in PNG
Follow us on Twitter. The Daily Cyber Digest focuses on the topics we work on, including cyber, critical technologies & strategic issues like foreign interference.
Didi’s abrupt decision to leave brings home a stark truth for Wall Street: China doesn’t need it anymore. The world’s No. 2 economy has plenty of its own money and few problems attracting more from elsewhere. China’s friends on Wall Street have lost their sway in Washington at a time when mistrust of Beijing’s intentions is running high. And China’s leaders would rather keep tight control of its companies than open them up to investors on American markets. The New York Times
Apple Inc iPhones of at least nine U.S. State Department employees were hacked by an unknown assailant using sophisticated spyware developed by the Israel-based NSO Group, according to four people familiar with the matter. The hacks, which took place in the last several months, hit U.S. officials either based in Uganda or focused on matters concerning the East African country. The intrusions represent the widest known hacks of U.S. officials through NSO technology. Reuters
In mid-October Dr Clement Malau, a Harvard-educated public health specialist and former secretary of the Papua New Guinea health department, was alarmed to discover he had gone viral. Only he hadn’t. Someone had posted a 20-minute audio clip as a “speech from Dr Clement Malau regarding the vaccine”. By the time Malau was alerted, the clip was super-spreading across Facebook and WhatsApp groups, propelled by high-profile PNG figures. It’s still there, feeding into anti-Covid and anti-vaccine zealotry. The Guardian
ASPI ICPC
China’s “data traps” pose digital supply-chain risks
Quartz
Mary Hui
To Samantha Hoffman, a senior analyst at the Australian Strategic Policy Institute who has researched China’s tech-enhanced authoritarianism extensively, the term “data traps” neatly describes the complex set of problems she has long been studying. “It’s a useful way of encapsulating the problem—which in my view is that we, in democracies, aren’t aware that data is strategically valuable, and what that means,” she said, adding that this is the first time she has come across the phrase “data traps.” While mainstream discussion of data threats posed by China tend to focus on specific apps (like TikTok and WeChat), suppliers (like Huawei), or behaviors (like surveillance and espionage), Hoffman argues that seemingly innocuous technologies and data can pose significant security risks.
Xinjiang: Twitter closes thousands of China state-linked accounts spreading propaganda
The Guardian
Helen Davidson
Twitter has shut down thousands of state-linked accounts in China that seek to counter evidence of human rights abuses in Xinjiang, as part of what experts called an “embarrassingly” produced propaganda operation. More than 30,000 tweets each from two networks were identified, frequently responding to other tweets labelling evidence of abuses as “lies” under the hashtag #StopXinjiangRumours, when the data were analysed by ASPI, it found much of it linked to pornography, Korean soap opera fans, and spam accounts and content. “That’s most likely because they’ve taken over these existing accounts and repurposed them,” said ASPI senior analyst Fergus Ryan, “they take them over and pump out this content that’s generally quite reactive … It’s so ham-handed, and really not done very well”. While 98% of tweets had no likes or retweets, the remainder were often boosted by Chinese diplomats and officials, spreading the content and giving it legitimacy. “The target is not actually people who are sceptical of the Chinese government, but is giving content to people who trust Chinese state media and are sceptical of western mainstream media,” said ASPI researcher Albert Zhang. “It’s propaganda appealing to the base.” Zhang and Ryan also said it also showed there might be a lack of understanding by Chinese propaganda and media purveyors about what is believable or legitimate – as was showcased last month with attempts to rebut concerns about tennis star Peng Shuai.
Read our new report: #StopXinjiangRumors: The CCP’s decentralised disinformation campaign
India needs a 20-year semiconductor strategy
Hindustan Times
Pranay Kotasthane, Arjun Gargeyas
At the inaugural Sydney Dialogue, Prime Minister Narendra Modi emphasised that semiconductors will be a crucial layer in India’s technology stack. Hinting at an upcoming policy specifically for semiconductor manufacturing units (fabs), he said, “We are preparing a package of incentives to become a key manufacturer of semiconductors”.
Regulation, not ban: on cryptocurrencies
The Hindu
Prime Minister Narendra Modi had in a video address to the Sydney Dialogue earlier this month said: “It is important that all democratic nations work together on this [cryptocurrency] and ensure it does not end up in wrong hands.”
India-ITU Joint Cyberdrill 2021 commences
India Press Release
Mr K. Rajaraman, Chairman Digital Communication Commission and Secretary of DoT addressed the eminent gathering of experts. During his inaugural address, he recalled the message of Prime Minister of India, Mr Narendra Modi delivered during ‘Sydney Dialogue’. Referring to important transitions taking place in India, he emphasized the need to work towards the development of a trusted manufacturing base and trusted supply chains as well as to deepen intelligence and operational cooperation on cyber security and protect critical information infrastructure.
Australia
Australia needs a strategic investment fund for advanced technology
The Strategist
Craig Mudge, Oliver Mayo
Australia is up with the best in the science of quantum computing, with the leaders, the scientists and the results. But new approaches are needed to address deficiencies in its defence and intelligence technology. In a time of highly uncertain geopolitics, power balances are changing, and Australia must deepen, strengthen and add to its capabilities in advanced technologies.
Craig Kelly: MP banned from Facebook appointed to parliament’s social media inquiry
The Guardian
Josh Taylor
The federal MP Craig Kelly – who has been permanently banned from Facebook and criticised for the online distribution of “seriously misleading” information about Covid-19 vaccines – has been appointed to a parliamentary committee looking into social media and online safety.
U.S. white supremacists blamed in Australia for covid vaccine misinformation among Aboriginals
The Washington Post
Amy Cheng
The leader of Western Australia has blamed white supremacists in the United States for spreading online misinformation about coronavirus vaccines among Aboriginal people in his state. Premier Mark McGowan, whose state is home to the city of Perth, told reporters Thursday that the groups did not have the best interests of Australia’s First Nations people at heart and “wouldn’t be unhappy if bad outcomes occurred” to them. He urged Indigenous people to listen to medical experts about vaccines instead. McGowan said he was made aware of the misinformation by local leaders. A senior Aboriginal affairs official in Western Australia, Wanita Bartholomeusz, said some misinformation was coming from Facebook groups, including one that had a cover image of former U.S. president Donald Trump.
University of Sydney contract could open health records to Chinese
The Australian
Sharri Markson, Remy Varga
The University of Sydney has decided not to declare to the Australian government it is close to awarding a multimillion-dollar contract to a Chinese government-funded company in an apparent breach of foreign disclosure laws. The confidential tender process for health equipment worth $14m has come to the attention of Australian intelligence sources who say there is substantial concern the Chinese company, Shanghai United Imaging Healthcare, which has an artificial intelligence arm, could gain access to NSW government health data.
China
The Case of Tennis Star Peng Shuai Reveals the Real Purpose of China's Censorship
WIRED
Rui Zhong
Most critical analysis of Chinese social media censorship focuses on the increasing number of words, phrases, or topics censored or filtered. But the function of censorship is far broader than this piecemeal approach suggests, encompassing also the destruction of online spaces and communities. Censors don’t focus solely on keywords. Organizational capacity and the ability to assemble in virtual spaces are key factors in how the party assesses political risk, and in how law enforcement in general decide how to throttle activities by groups outside of mainstream politics.
Xinjiang: On technology and crimes against humanity
SupChina
Darren Byler
The camp system in Xinjiang — the largest internment of a religious minority since World War II — is the first to employ a comprehensive digital surveillance system across an entire population, a "super panoptic" that uses automated, real-time assessments of massive amounts of data to sort populations based on their racial phenotypes and digital records.
Elon Musk Needs China. China Needs Him. The Relationship Is Complicated.
The Wall Street Journal
Lingling Wei, Rebecca Elliott, Trefor Moss
With the U.S. tightening technology exports to China in 2018, President Xi Jinping defiantly pledged to make China the world’s future innovation and industrial center. Key to his plan was Elon Musk.
The West Still Has Leverage on China's Tech Strategy
Foreign Policy
Ryan Fedasiuk, Emily Weinstein
The Chinese Communist Party (CCP) has constructed a strategy that is predicated on both passively absorbing and actively acquiring technology from abroad. Although the tech outflow from the United States to China has undercut U.S. national security, stymying it is easier said than done—and Beijing’s playbook is evolving in response to heightening tensions between the two countries. In a new framework we’re calling “E.P.I.C.,” we attempt to lay out the four key resources at the heart of U.S.-China competition today. These resources—equipment, personnel, information, and capital—represent the foundational tools that China uses in its push to amass comprehensive national power.
China Wants to Write the Tech Rules for 5G. Experts Say That’s a Big Problem
Defense One
Patrick Tucker
You may not know the International Telecommunication Union or the 3rd Generation Partnership Project, but they and similar bodies set security standards for the internet of today and tomorrow. Experts say Beijing has been stacking the boards of such groups to benefit China and undermine the rest of the world’s data privacy and information security.
USA
With Its Exit, Didi Sends a Signal: China No Longer Needs Wall Street
The New York Times
Alexandra Stevenson, Paul Mozur
The decades-long, trillion-dollar love affair between China and Wall Street is coming to an end. Didi Chuxing, a $39 billion company that is China’s answer to Uber, said on Friday that it would delist its shares from the New York Stock Exchange. Just six months ago, Didi was a Wall Street darling, raising billions of dollars from American pension funds and international investors in a splashy New York initial public offering.
U.S. SEC mandates Chinese companies detail ownership structure, audits
Reuters
Katanga Johnson
Chinese companies that list on U.S. stock exchanges must disclose whether they are owned or controlled by a government entity, and provide evidence of their auditing inspections, the Securities and Exchange Commission (SEC) said on Thursday. The rule advances a process that could lead to more than 200 companies being kicked off U.S. exchanges and could make some Chinese companies less attractive to investors.
U.S. State Department phones hacked with Israeli company spyware - sources
Reuters
Christopher Bing, Joseph Menn
Apple Inc iPhones of at least nine U.S. State Department employees were hacked by an unknown assailant using sophisticated spyware developed by the Israel-based NSO Group, according to four people familiar with the matter. The hacks, which took place in the last several months, hit U.S. officials either based in Uganda or focused on matters concerning the East African country, two of the sources said.
Israeli Company’s Spyware Is Used to Target U.S. Embassy Employees in Africa
The New York Times
Katie Benner, David E. Sanger, Julian E. Barnes
The iPhones of 11 U.S. Embassy employees working in Uganda were hacked using spyware developed by Israel’s NSO Group, the surveillance firm that the United States blacklisted a month ago because it said the technology had been used by foreign governments to repress dissent, several people familiar with the breach said on Friday.
DHS eyes Chinese airline employees suspected of spying
Yahoo! News
Jana Winter, Zach Dorfman
Crew members of a Chinese state commercial airline are suspected of spying at U.S. airports, according to a Department of Homeland Security intelligence bulletin obtained by Yahoo News. DHS employees observed the potential intelligence gathering while U.S. officials were conducting inspections of Chinese science researchers leaving the country.
Suspected Chinese hackers breach more US defense and tech firms
CNNPolitics
Sean Lyngaas
A suspected Chinese hacking campaign has breached four more US defense and technology companies in the last month, and hundreds more US organizations are running the type of vulnerable software that the attackers have exploited, according to research shared with CNN. The apparent espionage activity, which the National Security Agency helped investigate when it emerged in recent months, is more extensive than previously known and has seen the hackers steal passwords from targeted organizations with a goal of intercepting sensitive communications.
FBI says the Cuba ransomware gang made $43.9 million from ransom payments
The Record by Recorded Future
Catalin Cimpanu
The US Federal Bureau of Investigations said today that the operators of the Cuba ransomware have earned at least $43.9 million from ransom payments following attacks carried out this year. In a flash alert sent out on Friday, the Bureau said the Cuba gang has “compromised at least 49 entities in five critical infrastructure sectors, including but not limited to the financial, government, healthcare, manufacturing, and information technology sectors.”
The China Initiative, US crackdown on Chinese economic espionage, is a mess. We have the data to show it.
MIT Technology Review
Eileen Guo, Jess Aloe, Karen Hao
Now, an investigation by MIT Technology Review shows that the China Initiative has strayed far from its initial mission. Instead of focusing on economic espionage and national security, the initiative now appears to be an umbrella term for cases with almost any connection to China, whether they involve state-sponsored hackers, smugglers, or, increasingly, academics accused of failing to disclose all ties to China on grant-related forms. To date, only about a quarter of defendants charged under the initiative have been convicted, and about half of those defendants with open charges have yet to see the inside of an American courtroom.
Opinion | A shadow war in space is heating up fast
The Washington Post
Josh Rogin
Right now, Space Force is dealing with what Thompson calls “reversible attacks” on U.S. government satellites (meaning attacks that don’t permanently damage the satellites) “every single day.” Both China and Russia are regularly attacking U.S. satellites with non-kinetic means, including lasers, radio frequency jammers and cyber attacks, he said.
Two Cheers for DoD’s New Data and AI Leadership Initiative
Council on Foreign Relations
Lauren A. Kahn Michael C. Horowitz
The Department of Defense (DoD) is considering organizational changes designed to create a more integrated approach to data and artificial intelligence, including the creation of a Chief Data and Artificial Intelligence Officer (CDAO). If the reorganization occurs, the CDAO will oversee several pre-existing offices, including the office of the Chief Data Officer, the Joint Artificial Intelligence Center (JAIC), and the Defense Digital Service (DDS). Consolidated oversight through creating an empowered CDAO could help ensure DoD has the tools it needs to excel and ensure U.S. defense innovation leadership moving forward.
On the Australian Sanctions Regime
United States Department of State
The United States commends Australia on passing legislation that strengthens its sanctions regime to address more comprehensively human rights abuses, corruption, malicious cyber activity, violations of international humanitarian law, and Weapons of Mass Destruction (WMD) proliferation globally — all of which threaten international peace and security. The new legislation will enhance U.S.-Australia cooperation on defending human rights and combatting corruption
Facebook sold ads comparing vaccine to Holocaust
CNN
Donie O'Sullivan
Facebook has sold ads promoting anti-vaccine messages, comparing the US government's response to Covid-19 to Nazi Germany, casting doubt on the result of the 2020 election, and even pushing political violence. The ads have been run by merchandise companies that have spent hundreds of thousands of dollars on Facebook over the last few years.
Far-right activists using Twitter new rule against anti-extremist researchers
The Washington Post
Drew Harwell
Neo-Nazis and far-right activists are coaching followers on how to use a new Twitter rule to persuade the social media platform to remove photos of them posted by anti-extremism researchers and journalists who specialize in identifying episodes of real-world hate. Advocates said they worry the new policy will suppress efforts to document the activities of the far right and will prove to be a gift to members of hateful movements eager to keep their identities concealed.
Meta builds tool to stop the spread of ‘revenge porn’
NBC News
Olivia Solon
Facebook’s parent company, Meta, has worked with the U.K.-based nonprofit Revenge Porn Helpline to build a tool that lets people prevent their intimate images from being uploaded to Facebook, Instagram and other participating platforms without their consent.
Oversight Board opens public comments for policy advisory opinion on cross-check
Oversight Board
In October, the Board accepted a request from Meta, in the form of a policy advisory opinion, to review the company’s cross-check system and make recommendations on how it can be changed. Shortly after, Meta released more details about this request and today the Board is opening public comments for this policy advisory opinion. Beyond reviewing individual cases to remove or restore content, the Board can accept policy advisory opinion requests from Meta. After receiving input from external stakeholders, the Board provides detailed recommendations on changes Meta should make on its policies on a given topic.
Big Tech Privacy Moves Spur Companies to Amass Customer Data
The Wall Street Journal
Suzanne Vranica
New privacy protections put in place by tech giants and governments are threatening the flow of user data that companies rely on to target consumers with online ads. As a result, companies are taking matters into their own hands. Across nearly every sector, from brewers to fast-food chains to makers of consumer products, marketers are rushing to collect their own information on consumers, seeking to build millions of detailed customer profiles.
Marietje Schaake calls bulls--- on Silicon Valley’s self-regulation mantra
POLITICO
Ryan Heath, Olivia Reingold, Irene Noguchi
It seems like there’s bipartisan compromise for once in Washington, D.C., and it’s over one commitment: It’s time to reel in Big Tech. But Marietje Schaake has been sounding that alarm for years. Once one of the youngest members of the European Parliament, Schaake now helps lead the academic discussion around how to regulate some of the biggest companies in the world, like Facebook and Apple, as a policy fellow at Stanford University. She tells POLITICO’s Ryan Heath how she aims to reform Silicon Valley from within, and what it’s like when some of her students take jobs at tech giants.
Summit for Democracy: Masih Alinejad and cross-border harassment
The Sydney Morning Herald
Chris Zappone, Eryk Bagshaw
These operations captured the public’s attention, showcasing the cavalier confidence with which authoritarian regimes now act. But the spotlight on them obscured another reality: that of daily harassment by authoritarian regimes of their critics living overseas. Aided by new technology and the growing appetites of authoritarian regimes to shape global opinions, this insecure world is a new reality for citizens of democracies.
What is the Alliance for the Future of the Internet?
Protocol
Issie Lapowsky
The White House is set to announce plans this week for its much-anticipated Alliance for the Future of the Internet, a bid to rally a coalition of democracies around a vision for an open and free web. But behind the scenes, digital rights advocates, foreign governments and even other U.S. officials have spent the last month scrambling to push the White House to rethink its initial plans, leaving the fine points of the proposal in flux with days to go before the big reveal.
Clearview AI on track to win U.S. patent for facial recognition technology
POLITICO
Alexandra S. Levine
Clearview AI has gotten the green light on a federal patent for its facial recognition technology — an award that the company says is the first to cover a so-called “search engine for faces” that crawls the internet to find matches. Clearview’s software — which scrapes public images from social media to help law enforcement match images in government databases or surveillance footage — has long faced fire from privacy advocates who say it uses people’s faces without their knowledge or consent.
South-East Asia
Massive cybersecurity skills shortage in ASEAN
Techwire Asia
Rebecca Oi
The skills shortage in tech, especially in cybersecurity is a concern in Southeast Asia, and the demand for professionals with these essential skills has never been higher. The growing need for digital skills is most acute in developing countries, especially in the ASEAN region. Meanwhile, the cybersecurity skills shortage is especially prevalent in Malaysia and Indonesia, seeing rapid internet adoption rates and a growing need to protect data from cybercriminals.
New Zealand & The Pacific
‘The fear of this vaccine is real’: how Papua New Guinea’s Covid strategy went so wrong
The Guardian
Jo Chandler
Someone had posted a 20-minute audio clip as a “speech from Dr Clement Malau regarding the vaccine”, the orator sliding between English and Tok Pisin – PNG Pidgin – to deliver an eloquent, tub-thumping rant against Covid-19. By the time Malau was alerted, the clip was super-spreading across Facebook and WhatsApp groups, propelled by high-profile PNG figures. It’s still there, feeding into anti-Covid and anti-vaccine zealotry.
South and Central Asia
Quad spearheading 3 broad initiatives for Indo-Pacific: Harsh Vardhan Shringla
The Economic Times
Dipanjan Roy Chaudhury
Foreign secretary Harsh Vardhan Shringla on Thursday pointed out that the Quad nations have taken three initiatives: First, improve well-being of people in the Indo-Pacific Region. Second, addressing contemporary issues such as cyber security and 5G where Quad seeks to adopt and implement shared standards, principles and norms; and promote secure and trustworthy equipment and infrastructure. And, third, collaborate on initiatives such as the fellowship programmes.
UK
Is the UK government’s new IoT cybersecurity bill fit for purpose?
Tech Crunch
Carly Page
In an effort to try to improve the security credentials of consumer IoT devices, the U.K. government this week introduced the Product Security and Telecommunications Infrastructure bill (PSTI) in Parliament, legislation that requires IoT manufacturers, importers, and distributors to meet certain cybersecurity standards. On the face of it, the PSTI bill sounds like a step in the right direction, and the ban on default passwords especially has been widely commended by the cybersecurity industry as a “common sense” measure. But others say the measures — particularly the ban on easy-to-guess passwords — haven’t been thought through, and could potentially create new opportunities for threat actors to exploit.
Europe
Facebook could be sued by consumer groups, EU court adviser says
Reuters
Foo Yun Chee
Facebook could be sued by consumer groups for privacy violations, an adviser to Europe's top court said on Thursday, in a German online gaming case that could pave the way for similar action across the EU. The case started in 2012 and is one of several privacy and antitrust headaches facing Facebook in Europe, where regulators have introduced legislation to curb the power of so-called tech giants and ensure more transparency.
Russia
The Fall of a Russian Cyberexecutive Who Went Against the Kremlin
Bloomberg
Irina Reznik, Henry Meyer, Jordan Robertson
It was the height of Sachkov’s success. He’d started Group-IB as a college student and built it from a tiny consulting firm into one of Russia’s most prominent security businesses. The company had hundreds of employees and was trying to expand into the U.S., Europe, the Middle East, and Asia. Sachkov traveled the world, cutting a glamorous figure in smartly tailored suits. In a dramatic reversal of fortunes, the once-globetrotting executive is now languishing behind bars after being arrested in September and accused of treason. Sachkov, 35, denies the charges. He faces up to 20 years in a labor camp.
The Americas
Macri, Ex-President of Argentina, Is Charged With Illegal Surveillance
The New York TImes
Daniel Politi
A judge in Argentina has charged the former president, Mauricio Macri, with ordering illegal surveillance on relatives of sailors who died in a 2017 submarine accident. In a 171-page indictment issued on Wednesday, Judge Martín Bava wrote that there was enough evidence to put Mr. Macri, 62, on trial, arguing that he was ultimately responsible for espionage targeting family members of the 44 crew members who died aboard the Navy submarine, the San Juan.
Middle East
Israel's cyber defense chief: We know who is attacking us and we know how to get even
CNN
Hadas Gold
In a nondescript office park in the desert town of Be'er Sheva, a "war room" filled with screens showing various maps, rolling information, and graphics inform around a dozen or so staffers, manning computers at the central heart of Israel's civilian cyber defense system. So important is their mission that the room where they track cyberattacks 24 hours a day, seven days a week, is itself a bomb shelter -- meaning even if rockets are raining down, their work does not stop.
Africa
Twitter shuts 3,000 propaganda accounts in Uganda, five other countries
The East African
Twitter on Thursday said it had shut down nearly 3,500 accounts that were posting pro-government propaganda in six countries, including Uganda, China and Russia. The vast majority of the accounts were part of a network that "amplified Chinese Communist Party narratives related to the treatment of the Uyghur population in Xinjiang," Twitter said in a statement.
Spy Tool Was Deployed in State-Sponsored Hack of Ugandans
The New York TImes
Abdi Latif Dahir
Apple warned two Ugandan journalists and an opposition figure last week that their iPhones may have been hacked by a state-sponsored surveillance entity, the targeted people said on Saturday, and at least one attack appeared to have employed spyware from an Israeli company blacklisted by the United States. The latest revelations add Uganda to the list of countries where journalists, human rights activists and lawyers have been targeted using the sophisticated Israeli-made spyware, known as Pegasus.
Data centres are taking root in Africa
The Economist
Most of Africa’s data are currently stored elsewhere, zipping down undersea cables that often make landfall in the French city of Marseille. From the continent’s southern tip it can take 180 milliseconds for a message to reach Europe and back—long enough to frustrate people trying to trade shares or play games. But a flurry of investment in data centres is now bringing the internet closer to users, laying the ground for a digital revolution.
Misc
Study Shows How Russian, Chinese Disinformation About COVID-19 Evolved During The Pandemic
RadioFreeEurope/RadioLiberty
Reid Standish
China and Russia have pushed disinformation and propaganda about the origins of COVID-19, unproven cures for the disease, and the efficacy of vaccines aimed at winning over foreign audiences and sowing distrust toward Western governments since the emergence of the deadly virus in the Chinese city of Wuhan two years ago, a new study shows.
Public Displays of Resignation: Saying ‘I Quit’ Loud and Proud
The New York TImes
Emma Goldberg
For Gabby Ianniello, it was the blisters from putting on stilettos every morning for her real estate job, which had called employees back to the office last fall. For Giovanna Gonzalez, it was those three little letters, R.T.O., coming from her investment management boss. For Tiffany Knighten, it was finding out that a teammate’s annual salary was over $10,000 higher than hers for a role at her level. They were fed up. They were ready to resign. And they wanted their TikTok followers to know.
Events
ASPI Presents: Benchmarking Critical Technologies: Building an evidence base for an informed critical technologies strategy | Australian Strategic Policy Institute
ASPI
A new report by ASPI’s International Cyber Policy Centre - ‘Benchmarking Critical Technologies: Building an evidence base for an informed critical technologies strategy’ - examines the development of four key critical technologies across some of the world’s leaders and emerging leaders in critical technologies; Australia, China, India, Japan and the United States. The report focuses on biotechnology and energy sectors and seeks to better understand each country’s respective strengths, weaknesses and national capabilities. Join report author Dr Samantha Hoffman for a discussion on the report's findings, including opportunities that could emerge from increased strategic collaboration on critical technology capabilities and policy formulation. This event will include a moderated panel discussion with Professor Tanya Monro, Chief Defence Scientist, Louise Talbot, Deputy Coordinator, Critical Technology Policy and Coordination Office at Department of the Prime Minister and Cabinet, and Dr Samantha Hoffman. The panel will be moderated by Karly Winkler, Senior Analyst with ASPI's International Cyber Policy Centre.
Jobs
ICPC Senior Analyst or Analyst - China
ASPI ICPC
ASPI’s International Cyber Policy Centre (ICPC) has a unique opportunity for exceptional and experienced China-focused senior analysts or analysts to join its centre. This role will focus on original research and analysis centred around the (growing) range of topics which our ICPC China team work on. Our China team produces some of the most impactful and well-read policy-relevant research in the world, with our experts often being called upon by politicians, governments, corporates and civil society actors to provide briefings and advice. Analysts usually have at least 5 years, often 7-10 years’ of work experience. Senior analysts usually have a minimum of 15 years relevant work experience and, in addition to research, they take on a leadership role in the centre and tend to be involved in staff and project management, fundraising and stakeholder engagement.