The Cyber-Intelligence Nexus: Russia’s Use of Proxies
What if network defenders knew that a cyber operation occurred during Moscow business hours, that it involved a Russian IP address, and that the cyber […] More
What if network defenders knew that a cyber operation occurred during Moscow business hours, that it involved a Russian IP address, and that the cyber […] More
Since the first CIA Predator drone strike in October 2001, the United States, among others, has sought to expand the technology to facilitate remote warfare. […] More
Remotely controlled aircraft, or drones, have long become common in military settings—possibly most infamously pictured as a U.S. Predator launching Hellfire missiles at suspected terrorists […] More
While receiving significant publicity from global media, the rise of the humanitarian drone is so far more of a whimper than a bang. This article […] More
The cybersecurity industry is currently enamored with concepts of autonomous defense, including elements of machine learning, behavioral analytics, and artificial intelligence—and rightly so. Programed to […] More
Many view cybersecurity as passively blocking attempts to breach networks, but security experts have long advocated more active measures in defense of sensitive networks. Advances […] More
We live in an age where what used to be the figment of science fiction is now a reality, changing the way people go about […] More
Cybersecurity is often discussed in relation to the major global powers: China’s economic espionage, Russian influence operations, and U.S. dragnet global surveillance to thwart terrorism. […] More
Recent years have witnessed a series of increasingly audacious and unprecedented cyber attacks, leading up to the recent accusations of Russian hacking throughout last year’s […] More
Cyber is emerging as Iran’s weapon of choice for dealing with both domestic and foreign opponents. For more than a decade, the Islamic Republic has […] More
President Donald J. Trump’s Administration has suggested massive overhauls in a number of policy areas, but few have remained as shrouded in uncertainty as Trump’s […] More
U.S. failure to fully develop and implement a comprehensive cyber security strategy created the perfect opportunity for Russia to attack the Democratic National Committee computer […] More
In the fall of 2008, a bipartisan group of cybersecurity experts delivered some sage advice to Barack Obama, set to become president in January: “Don’t […] More
War, often rationalized as an extension of policy by violent means, has always been a deeply human experience. It defines much of human history and, […] More
Bob Work, the Deputy Secretary of Defense, will tell you the Third Offset is the next generation of warfare. It may take at least ten […] More
Imagine a weapon that strikes on its own, without the slightest hint of human judgment or compassion. It’s a chilling prospect, and not so far […] More
Surveillance law is absolutely necessary because it compels the government to write down, for all to clearly see, the rules that they must abide by […] More
On November 29, Royal Assent was given to the UK Investigatory Powers Act, after eight months of intensive Parliamentary scrutiny, with hundreds of amendments made, […] More
Search