www.newsweek.com
Open in
urlscan Pro
75.2.53.74
Public Scan
URL:
https://www.newsweek.com/2023/01/27/how-hackers-outwit-all-efforts-stop-them-its-cyber-pandemic-1774458.html
Submission: On February 14 via manual from US — Scanned from DE
Submission: On February 14 via manual from US — Scanned from DE
Form analysis
4 forms found in the DOMGET https://www.newsweek.com/search/site/
<form action="https://www.newsweek.com/search/site/" method="get" class="search-block-form--2" accept-charset="UTF-8">
<div>
<div class="container-inline">
<div class="form-item form-type-textfield form-item-search-block-form">
<label class="element-invisible" for="edit-search-block-form--4">Search </label>
<input title="Enter the terms you wish to search for." placeholder="Search" type="text" name="q" value="" size="15" maxlength="128" class="form-text">
</div>
<div class="form-actions form-wrapper edit-actions--2"><input type="submit" name="op" value="Search" class="form-submit"></div>
<input type="hidden" name="form_build_id" value="form-fZ682WsdOVy0CvQPbIUL2T6In25EQtbU6DClgu3ttr8">
<input type="hidden" name="form_token" value="NjTiMzKKqA3lZiZaca71FcNN-AlbGkwHKY6-BFpKd3U">
<input type="hidden" name="form_id" value="search_block_form">
</div>
</div>
</form>
GET https://www.newsweek.com/search/site/
<form action="https://www.newsweek.com/search/site/" method="get" class="search-block-form--2" accept-charset="UTF-8">
<div>
<div class="container-inline">
<div class="form-item form-type-textfield form-item-search-block-form">
<label class="element-invisible" for="edit-search-block-form--4">Search </label>
<input title="Enter the terms you wish to search for." placeholder="Search" type="text" name="q" value="" size="15" maxlength="128" class="form-text">
</div>
<div class="form-actions form-wrapper edit-actions--2"><input type="submit" name="op" value="Search" class="form-submit"></div>
<input type="hidden" name="form_build_id" value="form-fZ682WsdOVy0CvQPbIUL2T6In25EQtbU6DClgu3ttr8">
<input type="hidden" name="form_token" value="NjTiMzKKqA3lZiZaca71FcNN-AlbGkwHKY6-BFpKd3U">
<input type="hidden" name="form_id" value="search_block_form">
</div>
</div>
</form>
<form class="free-signup">
<label for="email_address" class="n-title flex-xs ai-c"><span class="icon-n"></span>Get the best of Newsweek via email</label>
<input type="email" name="email" id="email_address" class="form-text" placeholder="Email address" autocomplete="email">
<input type="hidden" id="utm_source" value="">
<input type="hidden" id="registration_url" value="https://www.newsweek.com/2023/01/27/how-hackers-outwit-all-efforts-stop-them-its-cyber-pandemic-1774458.html">
<input type="hidden" id="site_form" value="page_middle">
<input type="hidden" class="message" value="Thanks For The SignUp">
<input type="hidden" class="newsletter_type" value="Default">
<input type="submit" class="form-submit" value="Free Sign Up">
</form>
<form class="free-signup flex-xs">
<label class="element-invisible" for="sub-email">Email address</label>
<input type="hidden" id="utm_source" value="">
<input type="hidden" id="registration_url" value="https://www.newsweek.com/2023/01/27/how-hackers-outwit-all-efforts-stop-them-its-cyber-pandemic-1774458.html">
<input type="hidden" id="site_form" value="page_footer">
<input type="hidden" class="message" value="Thanks For The SignUp">
<input type="hidden" class="newsletter_type" value="Default">
<input type="email" name="email" class="form-text" id="sub-email" placeholder="Email address" autocomplete="email">
<input type="submit" class="form-submit" value="Free Sign Up">
</form>
Text Content
Mon, Feb 13, 2023 LOGIN Subscribe for $1 Newsweek Search * U.S. * World * Tech & Science * Culture * Autos * Rankings * Health * Life * Opinion * Experts * Education * Podcasts * Vantage * About Us * Announcements * Leadership * CEO Dev Pragad * Archive Mon, Feb 13, 2023 LOGIN Subscribe for $1 Newsweek Search * U.S. * World * Tech & Science * Culture * Autos * Rankings * Health * Life * Opinion * Experts * Education * Podcasts * Vantage * About Us * Announcements * Leadership * CEO Dev Pragad * Archive The world's quirkiest coffee shops—from Milwaukee and Bogota to Hanoi How to save—not cut—Social Security Newsweek Magazine HOW HACKERS OUTWIT ALL EFFORTS TO STOP THEM: "IT'S A CYBER PANDEMIC." By David H. Freedman On 01/18/23 at 5:00 AM EST Share on Facebook Share on Twitter Share on LinkedInShare on RedditShare on Flipboard Share via Email Comments 00:40 U.S. Flights Resume After FAA System Outage: What We Know So Far Tech & Science Cybersecurity Hacking Hack Hackers On the morning of January 11, the Federal Aviation Administration halted all airline takeoffs in the U.S. because of a glitch in a software system critical to flight safety. "There is no evidence of a cyberattack at this point," said the White House press secretary. But would officials know it if it were? And would they disclose it to the public? Those are fair questions, given that in 2015 it took the FAA two months to disclose that hackers had planted malware in one of its computer networks. The federal government keeps tight wraps on what it knows about threats to American businesses and individuals. If hackers did indeed attack the FAA, it would be business as usual in the world of cybersecurity. On the same day, according to research firm Cybersecurity Ventures, hackers posted more than 120,000 records stolen from the San Francisco Bay Area transit system's police department, took down the websites of eight major Danish banks, including the central bank, and broke into military and government agencies in several Southeast Asian and European countries. They also hijacked the cloud-computing platforms of Microsoft and Salesforce, making off with millions of dollars worth of untraceable cryptocurrency. That's just on January 11. Every day of the year, hackers unleash a stream of major attacks against government agencies, companies and individuals. Last year, they took down emergency services, threatened regional power grids, disrupted patient care at major hospitals, brought trains to a halt, took over radio stations to sow panic among listeners with a fake crisis, set off air-raid alerts and attacked U.S. nuclear scientists. So far this year, hackers broke into the communications firm Slack and stole email addresses of more than 200 million Twitter users. FAA shutdown is "wake-up call" for cyberattacks: Ex-NATO chief Read more FAA shutdown is "wake-up call" for cyberattacks: Ex-NATO chief More than 70 million Americans are hit by cybercrimes every year, according to computer security research firm Purplesec, often leaving people defrauded, spied on or publicly humiliated by having private photos and other information published online. More than two-thirds of small businesses have been victimized by hackers at least once. Some experts believe that just about every large organization and government agency has been breached—that's how enormous and constant cyberattacks have become. Last year, 22 billion personal and business records were exposed in hacks on U.S. companies, according to a study by security consultancy Flashpoint—and that doesn't include breaches that were unidentified or unreported, which may well represent the majority of hacks. Get the best of Newsweek via email As bad as it's been, it's getting worse. According to security firms that track attacks, the number of breaches, which had been growing by 15 percent a year, jumped by 38 percent in 2022. There are many reasons why hackers seem to have the upper hand. For one, they've become institutionalized, with backers such as Russia, China and other nations providing shelter and funding to massive ranks of hackers in their countries. The targets are also growing more numerous, as billions of people hook up tens of billions of new gadgets to the internet, each providing an entry point to computer networks. And powerful new hacker tricks and tools—some of them powered by artificial intelligence—are springing up almost daily on the black market. Mark Ostrowski. Courtesy of Check Point As a result, hackers now have the ability to flood computers everywhere with an endless stream of potent attacks. "We're talking about trillions of events," says Mark Ostrowski, who heads engineering for major computer security vendor Check Point Software Technologies. Most people are vaguely aware that computer crime is rife but have no idea how severe the problem has become and how quickly it's expanding. Many attacks are kept under wraps, keeping the problems out of sight. Even CEOs of major companies sometimes lack a clear idea what their industries are facing. Last year, the newly created U.S. Office of the National Cyber Director held a forum to brief CEOs on some classified intelligence on cyber threats. The CEOs' reaction: "Complete shock," says principal deputy national cyber director Kemba Walden. The U.S. government, with all its cyber warfare prowess, has failed to protect its own citizens and businesses, for whom the prospect of relief is nowhere in sight. "It's a cyber pandemic," Ostrowski says, "and it's going to get worse before it gets better." DEADLY THREATS It wasn't supposed to be like this. Two decades ago, experts wrote off hacking as temporary growing pains of the nascent internet. Security professionals were slowly but surely getting hacking under control with improved tools and practices. "The vast majority of hackers do not have the necessary skills and knowledge" to do much damage, said a 2004 report from the U.S. Institute of Peace, a federal bipartisan think tank, and "the ones who do, generally do not seek to wreak havoc." Where have these assurances left us today? "We have a saying in the industry," says Marc Rivero, a senior security researcher with cybersecurity software firm Kaspersky Labs. "Ninety-five percent of organizations have been breached, and the other five percent just don't know they were breached." The bottom line, agree most experts, is that no computer, or any device or machine with a computer chip, can today be considered fully safe. 4 Strategies Healthcare Leaders Must Employ to Make Their IT Security Stron Read more 4 Strategies Healthcare Leaders Must Employ to Make Their IT Security Stron Security professionals, forever playing catch-up, seem helpless to get the problem under control. "The criminals are two steps ahead of us," says David Maimon, director of the Evidence-based Cybersecurity Research Group at Georgia State University as well as a researcher with the Hebrew University in Jerusalem. "If they want in, they'll be in." The event that most epitomizes the degree to which hackers can run the table was the 2020 attack on SolarWinds, a software firm. Hackers breached the company's computer networks and planted malware—software that does bad things—in its software products. When clients downloaded SolarWind's product updates, they got the malware, too. "When the software is released, all the computers that use it are immediately compromised," says Kaspersky's Rivero. The SolarWinds attack gave hackers access to the computers of so many companies and even government agencies that the hack is considered by many experts to be the most damaging ever. (Of course, there may be other damaging attacks that were never made public.) Security experts worry that infiltrating software companies as a way to get at their clients is a new strategy that will spawn copycat crimes. "That's going to be a key target for criminals in 2023, for sure," says Rivero. The SolarWinds incident is generally attributed to hackers supported by Russian intelligence agencies. Russia has become a bustling center of hackerdom, in part because the Russian government uses hacking extensively for purposes of warfare. That has been the case in its Ukraine invasion, as well as for spying on and otherwise harming the U.S. and other countries it considers hostile. China and North Korea, too, and to a lesser extent Iran, are known to have extensive state-supported hacking capabilities for disrupting enemies, as does the U.S. China Says U.S. Hacked University With 'Drinking Tea' Cyber-Sniffing Weapon Read more China Says U.S. Hacked University With 'Drinking Tea' Cyber-Sniffing Weapon In some cases these countries are working with sophisticated cyber criminals as well as cultivating their own hacker armies. Russia has been especially tolerant of its thriving ranks of cyber criminals, as long as they focus on targets in other countries. "I don't think there's evidence of Putin directing criminals to commit ransomware attacks, but there hasn't been much interest there in handing over criminals who do," says Troy Hunt, a security consultant who founded the prominent personal-data-breach-tracking website "Have I Been Pwned?" . These developments are raising the concerns about potential attacks on power grids, air traffic control systems and food supply chains, among other targets, potentially with severe consequences. "Targets include nuclear power plants, medical devices, autonomous vehicles and industrial control systems," says Mordechai Guri, who heads research and development at Ben Gurion University's Cyber Security Research Center in Israel. "In extreme cases, they could cause deaths. You can imagine the effect of a cyberattack on autonomous vehicles." Guri is referring to the self-driving cars that are already being tested in several cities and states in the U.S. and elsewhere. Many medical devices, from pacemakers to powerful MRI machines, have some form of network connectivity, as do some traffic lights, elevators and many other devices and machines that could in theory be commandeered to deadly effect. Hacker-inflicted disruptions to the energy grid could kill thousands if they happened during periods of extreme cold or heat. Russia-Ukraine Cyber War Is 'Test Ground' for NATO Read more Russia-Ukraine Cyber War Is 'Test Ground' for NATO Computer hacks have already begun to prove deadly. In 2020, hackers shut down computer systems at Düsseldorf University Hospital in Germany, disrupting emergency care, among other functions. In the ensuing chaos a critically ill patient died before the hospital could arrange for a transfer. Many other institutions have had close calls after being hit by hackers, including Toronto's Hospital for Sick Children, Canada's largest pediatric hospital, which last year lost its ability to access medical tests and imaging or use its phones in a hacker attack. When Long Island's Suffolk County government offices were hit, the automated 911 system went down, forcing emergency personnel to take information down by hand, and leaving them unable to track callers' locations. Suffolk County, New York’s traffic agency and Massachusetts’ ferries were hacked within the last two years. Scott Eisen/Getty A long list of attacks with potentially deadly consequences have taken place in the past two years. Air-raid sirens went off in Israel last year when hackers breached the nation's public-defense system. A month later hackers took over Ukrainian radio stations to falsely report that President Volodymyr Zelenskyy was mortally stricken. In 2021 hackers took over computers at a water-treatment facility in Florida and contaminated the water supply, a life-threatening attack that was barely discovered in time to prevent disaster. A few months later hackers forced the shutdown of the largest oil pipeline in the U.S. for a week until the pipeline operator paid the hackers $4.4 million to back off. Last year more than 100 attacks were launched against various elements of the U.S. power grid. It's no coincidence the attacks are getting more numerous and scarier. In addition to gaining support from Russia and other hostile nations, hackers worldwide are becoming better organized and equipped, often functioning more like an interconnected global industry than scattered bands of criminals. "There is now an elaborate, deep and sophisticated hacking supply chain," notes Georgia State's Maimon. "Some write malware, some distribute it, some use it, some sell the results." Hacking group Fancy Bear’s logo on a laptop. Sean Gallup/Getty Most of the transactions happen over the Darknet, the portion of the internet that is encrypted to hide its websites from search engines and anyone without the right passwords. Hacking groups with names like Fancy Bear, Conti and Killnet advertise on the Darknet to sell their ill-gotten data and access, recruit other hackers, buy tools and inside information, and sell their services as cyber mercenaries. "Some hackers will buy affiliation with a group for $50,000 or more, plus a cut of the revenues," says Maimon. Transactions typically happen via Bitcoin, which makes them difficult to trace. Domestic terrorists could take out U.S. power grid—and attacks have started Read more Domestic terrorists could take out U.S. power grid—and attacks have started Business analytics firm Thoughtlab reports that the number of breaches has been increasing at an annual rate of 15 percent, but new data from Check Point indicates the growth rate jumped to 38 percent in 2022. About 200 ransomware attacks are reported each month in the U.S. on average, according to data from Secureworks, which sells computer security tools. Among the more prominent victims of ransomware hacks reported in December alone: the California Department of Finance; the Little Rock, Arkansas, school system; the British Guardian newspaper; and hospitals in Maryland, Texas and Florida. Many more such attacks likely go unreported because victims choose not to go public. A PLAGUE OF CYBERCRIME While the specter of attacks that can kill people and disrupt society may make more ordinary, financially oriented cybercrime seem tame in comparison, the sheer size of the problem is becoming an economic nightmare that's starting to affect lives of people around the world. Hackers, for instance, are becoming adept at intercepting corporate email and changing invoices so that money is sent to their own accounts. "Those attacks are a fast-growing threat," says Mike McLellan, Secureworks director of intelligence. "It's costing companies billions." And while attacks on companies are the most potentially lucrative, hackers are also all too happy to pick our individual pockets, one by one, usually by tricking us into giving them the passwords to our bank, credit card and other financial accounts. Their routines are growing increasingly ingenious and convincing, notes Adam Wandt, vice chair for technology at John Jay College of Criminal Justice. Wandt describes how a friend of his was fooled by a piece of malware into calling a phony customer support number for the financial service he uses; the ensuing "help" drained his life savings. "Even sophisticated people get tripped up all the time by these schemes," says Wandt. "I know people with doctorates in criminal fraud who get taken in." In the past, computer security experts at least didn't have to worry about hackers getting into some of the world's most potentially dangerous equipment, including nuclear power plants and missile systems. That's because these systems, along with computers critical to national defense, are usually "air-gapped"—that is, they lack any sort of wireless or wired connection to the rest of the world. Only someone standing next to these machines could have access to them. Computer equipment at Kasperky Labs. Adrian Bretscher/Getty Guri and colleagues, in a paper published in December in Cornell University's ArXiv, demonstrated how hackers could use electromagnetic waves not unlike radio signals to alter the programming of air-gapped machines. The technique is highly complex, and requires physical access at some earlier point—presumably on the part of a bribed or blackmailed insider—to implant malware simply by briefly inserting a USB thumb drive, for example. But those requirements aren't beyond the capabilities of hostile governments. And as experts at Kaspersky Labs have noted, hackers might be able to direct tiny drones close enough to a target machine to help set up an attack. To be sure, security experts are continually coming up with new tools and techniques for detecting and stopping cyberattacks. But these advances never stop hackers for long. "People ask if we're winning the war against hackers, but it's like asking if we're winning the war against fingernails," says security expert Hunt. "You can cut them back, but they just keep growing." Hackers have easy access to software tools with names like Doppelpaymer, CobaltStrike and Ninja that can automatically sniff out weaknesses in computer systems and sneak in to plant "back doors" that let the hackers do their dirty work without being detected. When security experts foil these tools, hackers immediately come up with new types of attack. "No matter how much innovation we see on the security side, the hackers are always racing to figure out ways to compromise it," says John Jay College's Wandt. "We keep seeing new, outside-the-box attacks that catch us by surprise. Today there isn't a single piece of security software that hackers can't get around." Georgia State's Maimon warns that while cyber criminals are getting better at their tricks, computer users aren't getting better at seeing through them. Maimon ran a study in which a group of users were trained on how to avoid falling for phishing schemes, and then two weeks later he sent them all a phony email note with a suspect link that could have easily led to malware. A quarter of the people in the study clicked on it. Meanwhile, hackers only need to wring a click from one person to infiltrate an organization of thousands. David Maimon. Carolyn Pruden Richardson Part of the problem, says Maimon, is that there is a serious shortage of highly skilled people on the security side. Cybersecurity Ventures reports that the number of unfilled computer security positions rose from one million in 2013 to 3.5 million in 2021, and is expected to stay high through 2025. That leaves badly understaffed security groups facing off against millions of hackers around the world, many of whom are no less than brilliant. One reason for the imbalance is pay. "The good guys can't make as much as the bad guys," says Maimon. Machine learning, a form of artificial intelligence (AI), is starting to lend a hand to the security side, notes Check Point's Ostrowski. "It's our only hope for keeping up with the trillions of attacks we see," he says. There's just one problem, he adds: Hackers are turning to machine learning tools, too. "We're already seeing an AI arms race in computer security," he says. Check Point recently demonstrated how hackers might already be enlisting "ChatGPT," a popular, publicly accessible AI system that can understand plain-English requests in order to come up with everything from slick-sounding essays to fully functioning software code. Check Point's researchers showed the program can also create multiple types of new hacking attacks such as malware and phishing emails. The U.S. government is trying to step up its game in foiling hackers by, among other things, creating the Office of the National Cyber Director in the White House in 2021. So far, the office's main activity has been holding the executive forums, such as one recently aimed at the electric vehicle industry. Principal deputy director Walden wouldn't provide details of the threats, exactly how the agency will help bolster defenses against them, or how much money will be spent on the effort. But she noted the agency would be issuing a public report soon, and is planning to develop a safe-computing information campaign. "We want to provide that education piece for everyone from preschoolers to grandmothers," she says. FOLLOW THE MONEY Hackers have an enormous incentive to keep at it: Stolen information is valuable. That's why Australia has suffered two major hacking attacks since September, one involving the theft of the drivers-license-related personal data of half the nation's drivers, the other lifting the health records of 40 percent of the population. "That means hackers know about millions of people's drug and alcohol dependence, abortions and sexually-transmitted diseases, among other highly personal information," says Hunt. The hackers didn't do it out of sheer maliciousness. They did it because they can make an enormous fortune selling it—to other criminals, for example, who can use the personal information to pull off identity theft, blackmail and other crimes. Or they can threaten to publish it as part of a ransomware play. "The basic idea is to get the data first, and then figure out later what it might be worth," says Secureworks' McLellan. Security experts hunt malware. Stephen Morton/Bloomberg/Getty Although the value of stolen data depends on a number of factors, Secureworks has tracked the going prices on the Darknet for some of the data stolen in recent months around the world: a bundle of 2,000 U.S. tax returns goes for $3,000; a batch of credit card data goes for $20 to $100 per card; 487 million WhatsApp phone numbers fetches $16,500; and passwords to the computer systems of a major U.S. corporation go for $2,000. McLellan adds that if stolen information includes proprietary technical details on a high-tech product, then Russia, China and other less-scrupulous national governments are likely to be eager buyers—if they didn't sponsor the hack in the first place. Pretty much anything that's kept on a computer can be up for grabs to the right buyer. In December two men in New York were arrested on charges of conspiring with Russian hackers to break into the taxi dispatch system at Kennedy Airport, allowing them to sell front-of-the-line access to taxi drivers for $10 a pop. They collected as much as $10,000 before they were nabbed. Meanwhile, the range of hackable targets is rapidly expanding daily, especially thanks to the growing number of devices that are getting hooked up to wireless networks. As more and more everyday devices from door locks to cars to cameras become internet-connected, they can be weaponized to track, rob or cause physical damage. "We all have an average of seven devices hooked up to the Internet, and it's more all the time," says Maimon. Home security cameras, smart watches, car information systems—all have suffered prominent hacks, and far more hacks of these devices have likely been left undiscovered or unreported. Four Cyber Self-defense Moves for Retailers in the New Year Read more Four Cyber Self-defense Moves for Retailers in the New Year As the number of connected devices grows, so will the number of hacks, and the types of information that can be stolen. One new vulnerability that came to light in December was the discovery by a researcher that Google Home smart speakers can be taken over by hackers not only to listen into conversations, but also to gain remote access to smart door locks and other home devices that are networked with the speakers. "If it's online, it's vulnerable," says Maiamon. More interconnected gadgets generates more data that needs to be stored remotely in the cloud—vast forests of computer servers operated by Amazon, Google, Microsoft and other tech giants. While those companies provide access to advanced security tools that can protect that data, the software developers who make use of the cloud don't always properly deploy them, leaving enormous stores of aggregated data less than fully protected and ripe for hackers. "Thanks to the cloud, it's never been easier to quickly build applications and screw them up so they're not safe," says Hunt. Troy Hunt at the NDC Conference in London in 2016. Courtesy of Troy Hunt In the end, contends Hunt, the only safe piece of data today is data that isn't kept on any computer, anywhere. "We need to start minimizing our digital footprints," he says. "Every time you sign up for a service, they want your phone number and birthdate. We have to stop giving away that information." The public is not up in arms over the high risk of hacking because most people aren't aware of how large those risks have become and how little can be done to reduce them. Experts and the government can continue to plug the new security holes that hackers will continue to find, as they have for decades, and to try to track hackers down and bring them to justice. In most cases, this is a lost cause. For one thing, it is difficult to trace attacks back through a vast global forest of internet connections. And Russian, Chinese and millions of other hackers are well protected from international law enforcement. "It's the nature of the internet that the attackers can be anywhere," says Hunt. "The chances of recourse are none." And the government and experts can and will keep telling people to have better passwords that they never share, to be more careful about what they click on in email notes, and to use extra sign-in precautions such as those that require facial or fingerprint recognition or send a verification note to your phone or a special "authenticator" app. But most people don't want the inconvenience of these precautions. When companies or government agencies try to force people to take them, people often find ways around them. "You end up with 'shadow IT,' like when people use Gmail instead of company email to avoid the inconvenience of the extra protections," says Ostrowski. The route to full computer security may in the end be less about plugging holes in our defenses, and more about unplugging. But if that's the case, then the picture isn't likely to improve any time soon. How many of us are really ready to swear off the online world and smart devices? Not many, according to analytics firm Statista, which reports that the number of devices connected to the Internet, currently at just under 15 billion, is expected to double over the next eight years. The future is looking more and more chaotic and dangerous. Photo-illustration by Newsweek; Source Images by PM Images/Getty; Aleksei Lagunov/Getty In the Magazine * The world's quirkiest coffee shops—from Milwaukee and Bogota to Hanoi Downtime Food & Drink The world's quirkiest coffee shops—from Milwaukee and Bogota to Hanoi * Natasha Lyonne sees through the lies in Peacock's 'Poker Face' Downtime Culture Natasha Lyonne sees through the lies in Peacock's 'Poker Face' * How to save—not cut—Social Security Periscope Business How to save—not cut—Social Security * What to do if you are nearing retirement and are financially unprepared Periscope Business What to do if you are nearing retirement and are financially unprepared Request Reprint & Licensing or Submit Correction or view Editorial Guidelines CHOOSE YOUR SUBSCRIPTION PREMIUM * Newsweek magazine delivered to your door * Unlimited access to Newsweek.com * Ad free Newsweek.com experience * iOS and Android app access * All newsletters + podcasts FROM $9.99 DIGITAL+ Ad Free * Unlimited access to Newsweek.com * Ad free Newsweek.com experience * iOS and Android app access * All newsletters + podcasts FROM $1 NEWSLETTER BEST OF NEWSWEEK VIA EMAIL Join half a million readers enjoying Newsweek's free newsletters Email address Newsweek © 2023 NEWSWEEK DIGITAL LLC * * * * Editions: * U.S. Edition * 日本 * Polska * România * About Us * Masthead * Diversity * Announcements * Archive * Careers * Corrections * Contact Us * Policies and Standards * Mission Statement * Advertise * Copyright * Terms & Conditions * Privacy Policy * Cookie Policy * Terms of Sale * Leadership * CEO Dev Pragad * Newsletters * Do Not Sell My Personal Information * GDPR Privacy Settings