Why it’s time to take warnings about using public Wi-Fi, in places like airports, seriously
More Videos
Published
1 year agoon
By
adminOver the years, travelers have repeatedly been warned to avoid public Wi-Fi in places like airports and coffee shops. Airport Wi-Fi, in particular, is known to be a hacker honeypot, due to what is typically relatively lax security. But even though many people know they should stay away from free Wi-Fi, it proves as irresistible to travelers as it is to hackers, who are now updating an old cybercrime tactic to take advantage.
An arrest in Australia over the summer set off alarm bells in the United States that cybercriminals are finding new ways to profit from what are called “evil twin” attacks. Also classified within a type of cybercrime called “Man in the Middle” attacks, evil twinning occurs when a hacker or hacking group sets up a fake Wi-Fi network, most often in public settings where many users can be expected to connect.
In this instance, an Australian man was charged with conducting a Wi-Fi attack on domestic flights and airports in Perth, Melbourne, and Adelaide. He allegedly set up a fake Wi-Fi network to steal email or social media credentials.
“As the general population becomes more accustomed to free Wi-Fi everywhere, you can expect evil twinning attacks to become more common,” said Matt Radolec, vice president of incident response and cloud operations at data security firm Varonis, adding that no one reads the terms and conditions or checks the URLs on free Wi-Fi.
“It’s almost a game to see how fast you can click “accept” and then ‘sign in’ or ‘connect.’ This is the ploy, especially when visiting a new location; a user might not even know what a legitimate site should look like when presented with a fake site,” Radolec said.
Today’s ‘evil twins’ can more easily hide
One of the dangers of today’s twinning attacks is that the technology is much easier to disguise. An evil twin can be a tiny device and can be tucked behind a display in a coffee shop, and the small device can have a significant impact.
“A device like this can serve up a compelling copy of a valid login page, which could invite unwary device users to enter their username and password, which would then be collected for future exploitation,” said Cincinnati-based IT consultant Brian Alcorn.
The site doesn’t even have to actually log you in. “Once you’ve entered your information, the deed is done,” Alcorn said, adding that a harried, weary traveler probably would just think the airport Wi-Fi is having issues and not give it another thought.
People who are not careful with passwords, such as use of pet’s names or favorite sports teams as their password for everything, are even more vulnerable to an evil twin attack. Alcorn says for individuals who reuse username and password combinations online, once the credentials are obtained they can be fed into AI, where its power can quickly give cybercriminals the key.
“You are susceptible to exploitation by someone with less than $500 in equipment and less skill than you might imagine,” Alcorn said. “The attacker just has to be motivated with basic IT skills.”
How to avoid becoming a victim of this cybercrime
When in public places, experts say it’s best to use alternatives to public WiFi networks.
“My favorite way to avoid evil twin attacks is to use your phone’s mobile hotspot if possible,” said Brian Callahan, Director of the Rensselaer Cybersecurity Collaboratory at Rensselaer Polytechnic Institute.
Users would be able to spot an attack if through a phone relying on its mobile data and sharing it via a mobile hotspot.
“You will know the name of that network since you made it, and you can put a strong password that only you know on it to connect,” Callahan said.
If a hotspot isn’t an option, a VPN can also provide some protection, Callahan said, as traffic should be encrypted to and from the VPN.
“So even if someone else can see the data, they can’t do anything about it,” he said.
Airport, airline internet security issues
At many airports, the responsibility for WiFi is outsourced and the airport itself has little if any involvement in safeguarding it. At Dallas Fort Worth International Airport, for example, Boingo is the Wi-Fi provider.
“The airport’s IT team does not have access to their systems, nor can we see usage and dashboards,” For said an airport spokesman. “The network is isolated from DAL’s systems as it is a separate standalone system with no direct connection to any of the City of Dallas’ networks or systems internally.”
A spokeswoman for Boingo, which provides service to approximately 60 airports in North America, said it can identify rogue Wi-Fi access points through its network management. “The best way passengers can be protected is by using Passpoint, which uses encryption to automatically connect users to authenticated Wi-Fi for a safe online experience,” she said, adding that Boingo has offered Passpoint since 2012 to enhance Wi-Fi security and eliminate the risk of connecting to malicious hotspots.
Alcorn says evil twin attacks are “definitely” occurring with regularity in the United States, it’s just rare for someone to get caught because they are such stealth attacks. And sometimes hackers use these attacks as a learning model. “Many evil twin attacks may be experimental by individuals with novice-to-intermediate skills just to see if they can do it and get away with it, even if they don’t use the collected information right away,” he said.
The surprise in Australia wasn’t the evil twinning attack itself, but the arrest.
“This incident isn’t unique, but it is unusual that the suspect was arrested,” said Aaron Walton, threat analyst at Expel, a managed services security company. “Generally, airlines are not equipped and prepared to handle or mediate hacking accusations. The typical lack of arrests and punitive action should motivate travelers to exercise caution with their own data, knowing what a tempting and usually unguarded -target it is — especially at the airport.”
In the Australian case, according to Australian Federal Police, dozens of people had their credentials stolen.
According to a press release from the AFP, “When people tried to connect their devices to the free WiFi networks, they were taken to a fake webpage requiring them to sign in using their email or social media logins. Those details were then allegedly saved to the man’s devices.”
Once those credentials were harvested, they could be used to extract more information from the victims, including bank account information.
For hackers to be successful, they don’t have to dupe everyone. If they can persuade only a handful of people – statistically easy to do when thousands of harried and hurried people are milling around an airport – they will succeed.
“We expect WI-Fi to be everywhere. When you go to a hotel, or an airport, or a coffee shop, or even just out and about, we expect there to be Wi-Fi and often freely available WI-FI,” Callahan said. “After all, what’s yet another network name in the long list when you’re at an airport? An attacker doesn’t need everyone to connect to their evil twin, only some people who go on to put credentials into websites that can be stolen.”
The next time you’re at the airport, the only way to be 100% sure you’re safe is to bring your own Wi-Fi.
You may like
Technology
Married millennials, here comes the crypto divorce cliff
Published
8 hours agoon
December 7, 2025By
admin
Fizkes | Istock | Getty Images
Divorce always raises thorny questions of how to divide marital property. In most cases, the remedy is pretty straightforward, requiring a surgical split between the two parties’ assets — although you can’t do that with the family dog or aquarium. But if you thought deciding who gets the dog was complicated, here comes cryptocurrency.
With the crypto wealth accumulation phase still new within many households, and the recent sharp decline in digital assets including bitcoin and ether dinging the confidence of investors who had just seen record highs, the path forward is murky. But for many married Americans, the current price of crypto doesn’t even register as an issue. That’s because the assets are easily squirreled away from an unsuspecting spouse.
“In divorce cases, crypto is creating the same headaches we’ve long seen with offshore accounts, except now the assets can be moved instantly and invisibly,” said Mark Grabowski, professor of cyber law and digital ethics at Adelphi University and author of several books about cryptocurrencies. He added that the problem is that ownership isn’t determined by a name on an account — it’s determined by who holds the private keys.
“If one spouse controls the wallet, they effectively control the assets,” Grabowski said.
Lawyers now have to subpoena exchanges, trace transactions on the blockchain, and determine whether coins were purchased before or during the marriage.
“Without that transparency and given the lack of reporting standards, it’s easy for one spouse to hide or underreport holdings. Courts are still catching up,” Grabowski said.
In theory, though, a crypto divorce should work like any other. Renee Bauer, a divorce attorney who has dealt with crypto splits, says the biggest question couples fight about is simple on the surface: who gets the wallet?
“That question opens the door to a mess of complications that traditional property division never had to deal with,” Bauer said.
The first challenge is figuring out what actually exists.
“A retirement account comes with statements. A house has an address. Crypto may be sitting in an online exchange or in a hardware wallet that one spouse conveniently forgot to mention,” Bauer said.
Tracing it then becomes part detective work and part digital forensics. Once the digital asset is authenticated, hashing out custody comes next.
“Some spouses want to keep the digital wallet intact, especially if they are the one who managed it during the marriage, while others want a clean monetary split,” Bauer said.
Courts are still figuring out the best way to handle this.
“There is also the security piece. If one spouse hands over private keys, they are effectively turning over total control. If they refuse, the court has to decide how to enforce access,” Bauer said.
She recounts seeing one lawyer who didn’t know much about crypto try to give the other spouse credit for the value of the bitcoin in another asset, not recognizing it’s not so simple, nor fair.
“Many divorce lawyers are slow to catch up and don’t even ask for disclosure. In my state of Connecticut, there isn’t a spot for crypto specifically on the financial affidavits. And for some, that could mean missing a valuable asset if they aren’t looking for it,” Bauer said.
Crypto hunters, PIs of digital asset divorce era
One of the few companies that can help locate a missing asset is BlockSquared Forensics. Ryan Settles, founder and CEO of the Texas-based company, says that the need for his services has increased exponentially since he founded his company in 2023. BlockSquared is dedicated exclusively to the crypto aspects of family law and divorce.
If a spouse (generally women, Settles says) suspects their partner is hiding crypto, their attorney may call in BlockSquared, which does anything from simple asset verification to deep investigations, tracing crypto across continents and into the murky world of wallets and exchanges. Settles’ company will then present the spouse with a “storyboard” that traces and timestamps the movement of cryptocurrencies.
Investigating whether one spouse has crypto is becoming increasingly common, he says, “especially folks involved in high-net-worth divorces and individuals with high net worth.”
Ryan Settles, founder and CEO of the Texas-based company BlockSquared Forensics, which offers services from simple asset verifications to deep investigations, often for women going through divorces who were unaware of spouses’ crypto holdings.
Ryan Settles
Ferreting out crypto in a divorce is only going to become more common. Settles noted that millennials hold the highest amount of crypto, and over the next six months, this age group will be approaching peak divorce years, converging with increased crypto holdings.
Another aspect Settles looks at is tax liability for the spouse, making sure that gets addressed during the divorce.
“There are a significant number of tax issues that most people, even attorneys, are not even familiar with,” Settles says, adding that the number of taxable events and reporting requirements from even a single transaction can come as a surprise to even the most seasoned litigators.
“Most attorneys don’t understand it, don’t understand the terminology. There is a whole lot of trust without verification going on,” Settles said.
Many of his cases involve wives who were not only unaware of their husband’s crypto dabbling, but when the assets are finally split, can be socked with a massive tax bill from capital gains.
“Unlike a savings account, the value of crypto can swing wildly in a single day,” Bauer said. “Selling crypto to divide proceeds can trigger capital gains. Holding it can trigger new arguments when value changes,” Bauer added.
Relatively relaxed Internal Revenue Service reporting requirements for crypto have not helped, though they are set to get stricter starting with the 2025 tax year.
“There are so many pieces. There are a lot of attorneys doing nod and smile and pretend to understand,” Settles said.
But companies like his are usually brought in only when there is a good suspicion of a spouse hiding significant crypto assets, he said. With a retainer fee of $9,000 and investigations that can cost $50,000, Settles says his services often cost more than an attorney.
Hard questions about crypto property splits
Roman Beck, a professor at Bentley University, where he directs the Crypto Ledger Lab, says that because this is a relatively new area, it’s best to look at it as courts not dividing the digital wallet but instead the assets the wallet controls.
“The law treats crypto much less exotically than people think. The starting point is simple: for tax and most property-law purposes, cryptocurrency is treated as property, not as money,” Beck said.
In divorce, that means bitcoin, ether, stablecoins, and NFTs acquired during the marriage are usually part of the marital estate, just like a brokerage account or a second home, with how that property is split depending on the state.
“Courts don’t split wallets, they split value,” Beck said.
The real legal question is not “Who gets the wallet?” he said, but ‘How do we allocate the economic value the wallet represents, and who is trusted with technical custody afterward?”
This leaves courts and lawyers to do one of three things: split the holdings on-chain, sell and split fiat, or offset with other assets.
“From a technical point of view, a wallet is just a set of private keys, often spread across hardware devices, mobile apps, or even seed phrases on a piece of paper. You cannot safely ‘share’ a hardware wallet or a private key after divorce,” Beck said.
Another wrinkle in a crypto divorce is the volatility of the underlying asset, with price swings in the currency making it more difficult for couples to agree on timing of a split, both as a couple and for the digital assets. In the past two months alone, bitcoin fell from a high over $126,000 to the low $80,000s, a 35% decline, and saw its year-to-date gains wiped out, with plenty of wild daily swings.
If couples are thinking rationally and not emotionally, among the simplest solutions would be splitting the wallet on a chain to create two wallets for each of the divorced partners so they can continue holding their share of cryptos, or drawing up a legal agreement that gives shares of a wallet to each party.
“They would not have to sell immediately,” Beck said.
However, often one party is not familiar with holding a wallet and thus not comfortable with that solution.
Similar to a house jointly owned which a divorcing couple may not want to bring to the market at a bad time, a couple could also agree to turn over crypto holdings to trusted third party to act as agent on behalf of both and to sell the crypto once the market has improved — once a certain agreed upon minimum value has been reached.
But Beck added that while from an economic and technical point of view there is no barrier preventing a divorcing couple from keeping crypto assets using any of these methods to allocate a legal percentage to each partner and delay liquidation until market conditions improved, both parties need to agree, and “most just want to be done,” he said.
Blockchain ledger transparency and the courts
One positive it that despite crypto’s reputation as a haven of anonymity, other aspects of digital assets work well for divorce proceedings.
“Public blockchains like bitcoin and ethereum are transparent ledgers. Every transaction is recorded forever. In other words, on-ledger data analytics turns the blockchain into a very patient financial witness,” Beck said. “That leaves a perfect audit trail if you know how to read the chain. … The real frontier isn’t the law, it’s the forensics,” he added.
Crypto’s adoption by many Americans — surveys in recent years from Gallup and Pew Research estimate that 14% to 17% of U.S. adults have owned cryptocurrency — is forcing family law to become more data-driven.
“The combination of transparent ledgers and powerful analytics gives lawyers and judges better tools to reconstruct financial behavior than they ever had with cash. The policy question going forward is not whether we can trace, but how far courts will go in requiring that level of scrutiny in everyday divorces,” Beck said.
Still, that doesn’t mean people won’t keep trying to hide assets. Settles says that often within 20 minutes he’ll see movement on the ledgers.
“They’ll start scrambling their assets, moving things, hiding things, moving them to tumblers. It’s quite fascinating,” Settles said.
And traceable.
Technology
Week in review: Stocks rise, Meta gets real on metaverse, and Salesforce bounces
Published
1 day agoon
December 6, 2025By
admin
Stocks eked out gains Friday and closed the week higher after the Federal Reserve’s favorite inflation gauge added to the case for an interest rate cut next week. For the week, the S & P 500 rose 0.3%, while the Nasdaq added nearly 1%. Both indexes logged back-to-back weekly gains. The Dow gained roughly 0.5%. On Friday morning, the government’s September personal consumption expenditures price index showed a cooler-than-expected year-over-year increase in the core rate, which excludes food and energy prices. While the PCE report was delayed because of the government shutdown, it was welcome news in a data-starved market ahead of the Fed’s two-day policymaking meeting on Tuesday and Wednesday. .SPX 1M mountain S & P 500’s 1 month performance It has been a couple of weeks since New York Fed President John Williams breathed new life into the possibility of a central bank rate cut. During that time, the S & P 500 rebounded 5% and ended this week just shy of its record-high close of 6,890 on Oct. 28. Here are some of this week’s portfolio highlights. Meta Platforms shares advanced 4% for the week after Bloomberg reported Thursday that the Instagram and Facebook parent was set to cut metaverse spending by up to 30%. It would be a wise move by CEO Mark Zuckerberg, especially if it means the company focuses on technology that can be monetized more quickly, such as Meta’s smart glasses and its AI efforts. Meta has been spending like crazy, and its stock has taken a hit since late October when management increased its capital expenditure guidance alongside strong earnings. Salesforce shares jumped 13% for the week after a big earnings beat. While it was this week’s best-performing portfolio stock, it was still down 22% year to date. That dynamic reflects Salesforce’s struggle to convince investors that generative AI adoption does not pose a threat to the seat-based business model of its core customer relationship management software. Alongside fiscal 2026 third-quarter results, management on Wednesday evening also raised guidance and disclosed more paid deals for Agentforce, the company’s AI platform. On Thursday’s “Mad Money” with Jim Cramer, Salesforce CEO Marc Benioff argued AI is a ” commodity feature ” that boosts the value of the company’s CRM software. CrowdStrike on Tuesday evening reported better-than-expected fiscal 2026 third-quarter results and strong forward guidance. Jim called it a “trophy quarter” after the cybersecurity firm delivered record free cash flow, annual recurring revenue, and operating income. We weren’t fazed when the stock, which was pretty flat for the week, didn’t move on the bullish report. It’s become commonplace to see CrowdStrike — and even our other cyber stock, Palo Alto Networks — trade lower after earnings, only to recover and move higher in the weeks ahead. Following the print, we reiterated our buy-equivalent 1 rating on CrowdStrike and raised our price target to $550 from $520. We sent out three trade alerts this week. On Monday , we bought more Boeing as the stock stabilized after a steep post-earnings decline in November. We didn’t buy shares on the way down because the stock was trading like a falling knife. We wanted to see things calm down before putting more money to work. On Tuesday , we bought more Procter & Gamble shares after they dipped following CFO Andre Schulten’s remarks on a volatile U.S. environment. We see better times ahead for P & G, and we’re building this defensive position in case the AI trade losses steam. On Wednesday , we booked some profits on Goldman Sachs , which closed at a record high Friday. We still love this position long-term. (See here for a full list of the stocks in Jim Cramer’s Charitable Trust.) As a subscriber to the CNBC Investing Club with Jim Cramer, you will receive a trade alert before Jim makes a trade. Jim waits 45 minutes after sending a trade alert before buying or selling a stock in his charitable trust’s portfolio. If Jim has talked about a stock on CNBC TV, he waits 72 hours after issuing the trade alert before executing the trade. THE ABOVE INVESTING CLUB INFORMATION IS SUBJECT TO OUR TERMS AND CONDITIONS AND PRIVACY POLICY , TOGETHER WITH OUR DISCLAIMER . NO FIDUCIARY OBLIGATION OR DUTY EXISTS, OR IS CREATED, BY VIRTUE OF YOUR RECEIPT OF ANY INFORMATION PROVIDED IN CONNECTION WITH THE INVESTING CLUB. NO SPECIFIC OUTCOME OR PROFIT IS GUARANTEED.
Technology
‘Terrifying’: Why U.S. senator in top intel post wants more spying on Chinese companies
Published
1 day agoon
December 6, 2025By
admin


Go back a decade and most Americans had never heard of Huawei. Today, the Chinese telecom giant is a symbol of how quickly China can dominate a strategic technology sector and in the process create new national security and market threats for U.S. government and industry.
Democratic Senator Mark Warner of Virginia, the top Democrat on the Senate Select Committee on Intelligence, is now worried about another Chinese company that he predicts will eclipse Huawei in both scale and consequence: BGI. It is not building cell towers or smartphones for the 5G era. It is collecting DNA.
“If Huawei was big, BGI will be even bigger,” Warner said at the CNBC CFO Council Summit in Washington, D.C. on Wednesday.
BGI is one of the largest genomics companies in the world. It operates DNA sequencing laboratories in China and abroad. It processes genetic data for hospitals, pharmaceutical firms and researchers across dozens of countries, according to a recent report by the National Security Commission on Emerging Biotechnology.
The company began as a Beijing-based research entity, the Beijing Genomics Institute, tied closely to China’s national genome projects. It later expanded into a global commercial powerhouse, selling DNA sequencing, prenatal testing, cancer screening, and large-scale population genetic analysis, according to an NBC News report.
Through subsidiaries, BGI says it operates in the U.S. Europe, and Japan. In several countries, it helped built national genetic databases and pandemic testing systems.
A man visits the booth of BGI at the Healthy Life Chain area of the third China International Supply Chain Expo CISCE in Beijing, capital of China, July 16, 2025.
Xinhua News Agency | Xinhua News Agency | Getty Images
U.S. intelligence officials believe that global footprint gives BGI access to one the largest collections of genetic data on Earth. Lawmakers have warned that genetic data is not just medical information. At scale, it becomes a strategic asset spurring a “DNA arms race,” according to a Washington Post report. DNA profiles can reveal ancestry, physical traits, disease risk, and family relationships, and when linked with artificial intelligence, the data can also be used for surveillance, tracking and long-term biological research tied to national security, according to the Washington Post’s reporting.
At the CNBC event this week, Warner continued to press for more focus on BGI. “They are hoovering up DNA data,” Warner said. “This level of experimentation on humans and intellectual property theft, we all should be concerned about it.”
Congressional investigators have previously warned that BGI maintains close ties to the Chinese Communist Party and Chinese military, according to a report from the House Select Committee on the CCP. They argue that China makes little distinction between commercial data and state security needs.
The ‘super soldier’ fear
One of the biggest fears tied to BGI and China’s broader biotech push is the possibility of a genetically enhanced soldier. U.S. officials have publicly claimed that China has explored human performance enhancement and military biotechnology. U.S. defense analysts say China’s research spans population DNA collection, military databases, and AI-driven human performance modeling, according to a Wall Street Journal op-ed written by U.S. Director of the Central Intelligence Agency John Ratcliffe in 2020, when he was Director of National Intelligence during President Trump’s first term.
Warner directly referenced those concerns this week.
“It’s terrifying,” Warner said.
Troops make preparations before a military parade in Beijing, capital of China, Sept. 3, 2025.
Xinhua News Agency | Xinhua News Agency | Getty Images
Warner described China as a great nation and great competitor, and as a former telecom executive (he was among the founders of Nextel), he said what Huawei was able to execute on — producing good products at inexpensive prices before the U.S. and Western competitors were prepared — is a cautionary tale.
The BGI story looks uncomfortably familiar to Warner.
“Go back in time eight or nine years, and most people had never heard of Huawei,” he said.
Huawei rose by combining massive state support, global market access and aggressive pricing, not only outcompeting Western firms on scale and cost, but positioning itself inside the world’s telecom infrastructure before governments understood the security implications. Huawei was first placed on a U.S. trade blacklist in 2019, which banned U.S. firms from selling some technology to the Chinese tech giant over national security concerns. Chip restrictions on Huawei have since become even stricter.
But Warner said by the time the U.S. moved to restrict Huawei, “[we started to] lose a little.”
Much of the 5G backbone had already been shaped by Chinese technology.
During a separate interview with Javers at the CNBC CFO Council Summit, the Republican Chairman of the House committee on the Chinese Communist Party, Michigan congressman John Moolenaar, said “We’ve seen how they run the play of excess capacity, price manipulation, driving people out of business in different areas; they’re going to continue to run that play,” he said. “We want to be friendly with China, but China is not our friend. They are our foremost adversary,” he added.
The Soviet Union was a military and ideological competitor, but China, in tech domain after domain, Warner says — from telecom and 5G to AI, quantum computing and biotech — is a different kind of competitor.
Warner now sees BGI following a similar model in biotechnology. Like Huawei, BGI scaled rapidly with state support. The Washington, D.C.-based think tank Foundation of Defense of Democracies called upon lawmakers of both parties earlier this year to restrict BGI’s access to U.S. institutions.
Congress has been trying to pass various versions of the BIOSECURE Act, which would limit the ability of Chinese biotechs to operate in the U.S. Some U.S. hospitals and research institutions with ties to Chinese genomics firms are under federal pressure, according to the Associated Press, though some medical professionals within the U.S. say they risk losing key research support for core medical goals. BGI told the AP that the bill is “a false flag targeting companies under the premise of national security. We strictly follow rules and laws, and we have no access to Americans’ personal data in any of our work,” it said.
U.S. intel has moved too slowly, and disrupted key spying alliances
Warner said the U.S. intelligence apparatus has moved too slowly to recognize the biotech threat. He says that intelligence agencies focus too much on foreign governments and militaries, with less attention placed on commercial technology sectors. But in a world where technology supremacy is national security, Warner says more of our intelligence efforts need to reflect this shift.
Only in the past two to three years, he says, has the U.S. seriously expanded spying into AI, semiconductors, and biotechnology. Warner says we need a more “advanced approach” in this area, and he gave as one recent example when China’s largest chipmaker SMIC stunned U.S. officials by producing a six-nanometer chip despite sweeping U.S. export controls. The breakthrough showed that Washington had underestimated both China’s technical qualities and ability to work around restrictions. “We got caught off guard with the SMIC six-nanometer chip,” Warner said.
Warner is also worried that tracking China’s tech rise requires a type of deep cooperation with U.S. allies that the Trump administration has squandered, such as the global intelligence-sharing network called the “Five Eyes” alliance.
Those relationships are now under strain, he said, and key partners including the United Kingdom, the Netherlands, and France have gone public in saying they are reluctant to share intel with the U.S. “They feel like we may be politicizing the intel product and that is not good news for America,” Warner said.
Underlying his concerns about the technology competition with China in areas including AI and biotech is the U.S. ceding the global lead in standards setting. For decades, the U.S. shaped the rules for wireless networks, satellites, and internet infrastructure. That dominance help Americans lead global markets, Warner said, but now China is aggressively positioning itself as the international standards setter.
Warner described the U.S. role in international bodies as one of the “secret sauces” in the era of America’s dominance of the global economy and technology, allowing the U.S. to leverage innovations occurring around the globe, “even if it didn’t arise in America.”
Across technology domains, influencing standards and protocols is critical to not only maintaining a competitive edge but also establishing ethical boundaries. “Will it be us or the Chinese?” Warner said. “The Chinese come in with clearly a less humanist approach. It’s been effective in lots of domains. We see it on standards-setting bodies. China floods the zone with lots of engineers, almost buying off the votes. We’ve got to reengage for American business and government,” he said.
Trending
-
Sports2 years agoStory injured on diving stop, exits Red Sox game
-
Sports3 years ago‘Storybook stuff’: Inside the night Bryce Harper sent the Phillies to the World Series
-
Sports2 years agoGame 1 of WS least-watched in recorded history
-
Sports3 years agoButton battles heat exhaustion in NASCAR debut
-
Sports3 years agoMLB Rank 2023: Ranking baseball’s top 100 players
-
Sports4 years ago
Team Europe easily wins 4th straight Laver Cup
-
Environment3 years agoJapan and South Korea have a lot at stake in a free and open South China Sea
-
Environment1 year agoHere are the best electric bikes you can buy at every price level in October 2024
