The Long Game: China’s Grand Strategy to Displace American Order
For more than a century, no US adversary or coalition of adversaries has ever reached sixty percent of US GDP. China is the sole exception, and it is fast emerging into a global superpower that could rival, if not eclipse, the United
States. What does China want, does it have a grand strategy to achieve it, and what should the United States do about it?
In The Long Game, Rush Doshi draws from a rich base of Chinese primary sources, including decades worth of party documents, leaked materials, memoirs by party leaders, and a careful analysis of China’s conduct to provide a history of China’s grand strategy since the end of the Cold War. Taking readers behind the Party’s closed doors, he uncovers Beijing’s long, methodical game to displace America from its hegemonic position in both the East Asia regional and global orders through three sequential “strategies of displacement.”
The Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest weekly security & privacy news.
The National Security Agency (NSA) has released guidance warning that location data from mobile phones and other internet-connected devices can be a security threat for
Get a daily rundown of the top global open source national security stories and previews of the exclusive content available on The Cipher Brief.
Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens disappear completely from public view. He is now known in Hollywood as the guy
The Shadow War: Inside Russia's and China's Secret Operations to Defeat America In The Shadow War, CNN anchor and chief national security correspondent Jim Sciutto
The Shared Security Show brings you news, tips, advice, and interviews with cybersecurity and privacy experts to help you live more secure and private in
From two former military officers and award-winning authors, a chillingly authentic geopolitical thriller that imagines a naval clash between the US and China in the
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in
In T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented
SecurityCheckli.st provides a beginner’s checklist for staying safe on the internet. The list is dynamic and can change. The website allows you to check things
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
Go Incognito is a video-based course teaching users of varying experience levels about privacy, security, and anonymity. The goal is to educate users around the
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in
The VPN Toolkit provides transparent, community-driven VPN tools and utilizes community oversight and contribution to provide unbiased reviews.
The guide to restoring your online privacy. Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers In 2014, the world witnessed the start of a mysterious series
decentralize.today (dt.gl) is a digital media platform that covers all things tech. They publish news, analyses, op-eds and articles across a broad spectrum of topics,
The Promise and the Peril of the Digital Age Microsoft President Brad Smith operates by a simple core belief: When your technology changes the world,
Why and How You Should Take Back Control of Your Data Every minute of every day, our data is harvested and exploited… It is time
Surveillance Self-Defense is a project of the Electronic Frontier Foundation, an independent non-profit working to protect online privacy for nearly thirty years. Surveillance Self-Defense is
Who Has Your Data and Why You Should Care Cyber Privacy demystifies the digital footprints we leave in our daily lives and reveals how our
NOTHING TO HIDE is an independent documentary dealing with surveillance and its acceptance by the general public through the “I have nothing to hide” argument.
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides knowledge and tools to protect your privacy against
Reclaim Your Digital, Financial, and Lifestyle Freedom Written with new privacy-seekers in mind, this step-by-step guide walks you through each dimension of private living, from
Darknet Diaries is a podcast covering true stories from the dark side of the Internet. Stories about hackers, defenders, threats, malware, botnets, breaches, and privacy.
The Original Manual for Living off the Land & Doing It Yourself The definitive book of basic skills and country wisdom for living off the
Data has surpassed oil as the world’s most valuable asset. It’s being weaponized to wage cultural and political warfare. People everywhere are in a battle
America's Battle Against Russia, China, and the Rising Global Cyber Threat With each passing year, the internet-linked attacks on America's interests have grown in both
Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion. This podcast presents ideas to help you become digitally invisible,