AUTHOR ARCHIVES

Lily Kuo

Lily Kuo is a reporter at Quartz covering emerging markets. She previously reported general news for Reuters. Her work has appeared in the Los Angeles Times, The New York Times, the South China Morning Post in Hong Kong and the China Post in Taiwan. She holds a dual master’s degree in international affairs from Peking University and the London School of Economics. She graduated from the University of North Carolina at Chapel Hill.
Results 11-20 of 35

China Is Building a $46B Railroad Through Pakistan's Insurgency

April 20, 2015 Chinese president Xi Jinping visits Islamabad this week, where he will sign agreements to spend almost $46 billion on energy and infrastructure projects to be built along an “economic corridor” between Kashgar in China’s western province of Xinjiang and Pakistan’s Gwadar Port, soon to be operated by a Chinese state-owned...

Kenji Goto's Death Is Forcing Japan To Rethink Fighting Terrorism

February 2, 2015 Japanese citizens awoke Sunday to a harrowing video purporting to show the beheading of Japanese journalist Kenji Goto at the hands of terror group Islamic State (also known as ISIS or ISIL). While members of the group vowed that the “nightmare for Japan” had just begun, Japanese prime minister Shinzo...

China’s Sketchy App Stores Now Serve up iPhone Malware

November 6, 2014 FROM NEXTGOV arrow A US security company has raised the alarm about a new breed of malware that has infiltrated hundreds of thousands of Apple devices, including Macs and iPhones. But unless you’re downloading pirated software from Chinese app stores, you probably don’t have anything to worry about. The “Wirelurker” malware was flagged...

How a Simple Note-Taking App Became the New Anti-Censorship Tool in China

October 17, 2014 FROM NEXTGOV arrow HONG KONG—Mainland Chinese readers may have found one way around China’s tight grip over news and information about the pro-democracy protests that have swept Hong Kong for the last three weeks— a California-based app best known for its personal to-do lists, clipping web-pages, and sharing notes between coworkers. Words including...

The Islamic State Threat May Be Extending to the Asia-Pacific

September 18, 2014 Australian security forces raided hundreds of homes in Sydney and Brisbane today on intelligence that militants were planning a public beheading in the name of the Islamic State. It’s the latest sign that the extremist group also known as ISIL, which has taken over large swathes of Iraq and Syria,...

Obama’s Next Technology Guru May Be This Staunch Supporter of Women in Tech

August 29, 2014 FROM NEXTGOV arrow Megan Smith, a former Google executive, is a top choice for the role of the White House’s chief technology officer, Bloomberg reported today. If Smith takes the job that would mean the third person to hold the position created by president Barack Obama in 2009 would be a woman, a...

China Has a Lot to Lose in Iraq

June 27, 2014 More than 1,000 stranded Chinese workers are being evacuated from war-torn northern Iraq today via helicopters and buses, according to Chinese state media, as a violent Sunni insurgency threatens to tear the country apart. The emergency operation highlights China’s heavy investment in Iraq, as well as the drawbacks of China’s...

China Responds to the Latest Hacking Accusations by Calling America “The Matrix”

June 11, 2014 FROM NEXTGOV arrow Following a report (registration required) that a new hacker unit in Shanghai with ties to China’s People’s Liberation Army has been targeting American, European, and Japanese networks, China’s foreign ministry hit back with a pop culture reference meant to highlight America’s hypocrisy. When asked about China’s response to the report...

China and the US Are Racing to Turn Poor, Naive Millennials into Spies

May 9, 2014 Chinese state media are accusing an “unnamed foreign country” of recruiting spies at Chinese universities and through popular blogs and social media. This week, a series of news reports claim that unsuspecting Chinese, some of them as young as 16 years old, are being lured into working for foreign intelligence...

Inside China's $132 Billion Military Budget

March 6, 2014 China’s newly announced 802.2 billion yuan ($131.57 billion) defense budget certainly makes an impression, especially when it’s accompanied by the government’s muscular assertion that peace in the region can only be “maintained by strength,” and a promise that China’s military would respond to all provocations. The new military spending figures...

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.