U.S.-China Economic and Security Review Commission

May 7, 2019

On April 3, 2019, the Hong Kong government formally introduced its extradition bill before Hong Kong’s legislature, the Legislative Council (LegCo). The bill proposes changes to the territory’s extradition laws to allow ad hoc extraditions to countries and jurisdictions with which Hong Kong does not have such agreements, including mainland China, Macau, and Taiwan. These changes would amend laws governing extradition agreements and mutual legal assistance in criminal matters in force since the 1997 handover of Hong Kong to China. At that time, the laws explicitly prohibited extradition arrangements with mainland China due to fears over its legal system and lack of human rights protections.

Spotlight

Village of Romeoville

Romeoville is a business friendly community of 40,000 residents located 30 miles southwest of Chicago. It’s a thriving community that is home to three institutions of higher learning and over 700 businesses. With connections to major roadways like I-55, I-355, Route 53, and Weber Road, as well as access to the business class aircraft facilities of the Lewis University Airport and the convenience of a Metra station on the Heritage Corridor, the residents and workforce of Romeoville have a bevy of transportation options to utilize.

OTHER WHITEPAPERS
news image

FIDO for e-Government Services

whitePaper | December 13, 2022

The global COVID-19 pandemic closed offices and forced governments to rapidly move services online, if they weren’t already, to serve its citizens. Although usernames and passwords are easy to deploy and easy for citizens to use, they leave systems and users vulnerable to cyberattacks. They are especially vulnerable to phishing attacks designed to steal login credentials and compromise legacy multi-factor authentication (MFA) tools like those using one-time passwords (OTP) and push notifications. With phishing attacks on the rise, it is imperative for governments to support “phishing-resistant” MFA technology that is also accessible, efficient, and cost-effective.

Read More
news image

Ensuring American Leadership in Automated Vehicle Technologies

whitePaper | January 8, 2020

The United States Government is committed to fostering surface transportation innovations to ensure the United States leads the world in automated vehicle (AV) technology development and integration while prioritizing safety, security, and privacy and safeguarding the freedoms enjoyed by Americans. The U.S. Government recognizes the value of industry leadership in the research, development, and integration of AV innovations. Such innovation requires appropriate oversight by the Government to ensure safety, open markets, allocation of scarce public resources, and protection of the public interest. Realizing the full potential of AVs will require collaboration and information sharing among stakeholders from industry, State, local, tribal, and territorial governments, academia, not-for-profit organizations, standards development organizations (SDO), and the Federal Government.

Read More
news image

Military and Security Developments Involving the People's Republic of China 2021

whitePaper | November 3, 2021

The Department of Defense (DoD) annual report to Congress on military and security developments involving the People’s Republic of China (PRC) provides a baseline assessment of the Department’s pacing challenge. The PRC has long viewed the United States as a competitor and has characterized its view of strategic competition in terms of a rivalry among powerful nation states, as well as a clash of opposing systems. As expressed in the Interim National Security Strategic Guidance, the PRC is the only competitor capable of combining its economic, diplomatic, military, and technological power to mount a sustained challenge to a stable and open international system. The PRC is increasingly clear in its ambitions and intentions.

Read More
news image

U.S. Trade in Services: Trends and Policy Issues

whitePaper | January 22, 2020

Trade in “services” refers to a wide and growing range of economic activities. These activities include transport, tourism, financial services, use of intellectual property, telecommunications and information services, government services, maintenance, and other professional services from accounting to legal services. Compared to goods, the types and volume of services that can be traded are limited by factors such as the requirement for direct buyer-provider contact, and other unique characteristics such as the reusability of services (e.g., professional consulting) for which traditional value measures do not account. In addition to services as independent exports, manufactured and agricultural products incorporate and depend on services, such as research and development or shipping of intermediate or final goods. As services account for 71% of U.S. employment, U.S. trade in services, both services as exports and as inputs to other exported products, can have a broad impact across the U.S. economy.

Read More
news image

Restoring trust in audit and corporate governance

whitePaper | June 1, 2022

These are challenging times for the UK, but the economy is recovering well, with record job vacancies and unemployment back at pre-crisis levels. A diverse range of companies and entrepreneurs continue to identify the UK as a great place to start and grow a business. The UK continues to be Europe’s most attractive location for international investment in financial services and is well positioned for continued growth1. To help people cope with rises in the cost of living, we want to see businesses thrive across the whole of the UK, sustaining employment and the economic health of communities.

Read More
news image

SECURING THE SOFTWARE SUPPLY CHAIN

whitePaper | August 15, 2022

Cyberattacks are conducted via cyberspace and target an enterprise’s use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment or infrastructure; or destroying the integrity of the data or stealing controlled information.1 Recent cyberattacks such as those executed against SolarWinds and its customers, and exploits that take advantage of vulnerabilities such as Log4j, highlight weaknesses within software supply chains, an issue which spans both commercial and open source software and impacts both private and Government enterprises. Accordingly, there is an increased need for software supply chain security awareness and cognizance regarding the potential for software supply chains to be weaponized by nation state adversaries using similar tactics, techniques, and procedures (TTPs).

Read More

Spotlight

Village of Romeoville

Romeoville is a business friendly community of 40,000 residents located 30 miles southwest of Chicago. It’s a thriving community that is home to three institutions of higher learning and over 700 businesses. With connections to major roadways like I-55, I-355, Route 53, and Weber Road, as well as access to the business class aircraft facilities of the Lewis University Airport and the convenience of a Metra station on the Heritage Corridor, the residents and workforce of Romeoville have a bevy of transportation options to utilize.

Events