Directed-Energy: The Next Revolution
The size of the army matters—but technology wins wars. At the height of the Roman Empire, Roman Legions armed with arrows, long-staffs, and shields devastated […] More
The size of the army matters—but technology wins wars. At the height of the Roman Empire, Roman Legions armed with arrows, long-staffs, and shields devastated […] More
Directed-energy weapons have been an ambition of militaries across the world, since Archimedes focused the sun to set fire to Roman ships in 212 B.C. […] More
What could possibly make the F-35 an even more advanced jet fighter? Lasers, according to the U.S. Air Force. The USAF plans, which would put […] More
On December 1, Congress authorized sweeping new government hacking and surveillance authorities by allowing changes to Rule 41 of the Federal Rules of Criminal Procedure […] More
What if the U.S. government could force entry—in other words, hack—into electronic devices around the world, using only one warrant, even if the owners of […] More
With the growth of cybercrime facilitated by the global nature of the Internet, law enforcement is adapting their toolsets to better tackle the challenges presented […] More
When it comes to attribution—especially when foreign intelligence agencies are involved—plausible deniability is easy. However, the public has come to expect courtroom-quality evidence before believing […] More
Last month, China’s legislature passed the Cybersecurity Law, which is due to take effect next summer. The controversial law has received a number of criticisms […] More
Do Chinese authorities need more laws to surveil people? From the earliest days of the Chinese Communist Party, authorities have kept the closest of eyes […] More
Is a future where people can be arrested for crimes they have not yet committed dystopian or utopian? While this scenario remains the fodder of […] More
The world has seen an enormous surge in the amount of data available, particularly human-generated digital exhaust from our Internet and communications habits. But only […] More
What if it were possible to predict where a crime took place before it actually occurred – even determining the identity of the culprit in […] More
Cyberspace has grown into a vital domain of everyday life—we work, socialize, play, and conduct financial transactions online. Our lives now have a digital touch, […] More
The use of biometrics to authenticate identity has been the subject of great debate for years, with opposing sides arguing its value for security, privacy, […] More
Amidst a rash of data breaches where compromised passwords provided the vector of attack – think Target, Anthem, OPM, or more recently, the Democratic National […] More
Should humans delegate the responsibility of decisions over life and death to computer algorithms? The answer is not as simple as it seems—and it is […] More
Discussions on artificial intelligence (AI) too often revolve around concerns about the sensationalist threat of “killer robots,” usually featured in science-fiction films or computer games. […] More
New technologies are changing the face of future warfare and few will be as impactful as the fusion of artificial intelligence into weapons systems. The […] More
Search