Taking Aim at Smart Guns
In the wake of a series of high-profile mass shootings, President Barack Obama initiated an executive action directing the Department of Defense, the Department of […] More
In the wake of a series of high-profile mass shootings, President Barack Obama initiated an executive action directing the Department of Defense, the Department of […] More
Gun technology itself hasn’t changed for the last 100 years, but now we are starting to see a new period of innovation through the integration […] More
The trend of making conventional objects “smart” is continuing unabated, and now even firearms are beginning to have computers integrated into them. The Cipher Brief […] More
The current conflict between Apple and the FBI over developing a means to circumvent security features on the iPhone has reignited the tense debate about […] More
The current dispute between Apple and the FBI amplifies the ongoing debate between U.S. tech firms and law enforcement agencies about encryption. At issue in […] More
Apple should not be coerced into hacking into the San Bernardino shooter’s iPhone, and we must get to a point as a society where law […] More
The Unmanned Aerial Vehicle (UAV) industry is growing rapidly, and this is causing some concern about individuals using UAVs for illicit purposes. The Cipher Brief […] More
In February, Hollywood Presbyterian Hospital very publicly paid $17,000 to regain access to its files after being infected with a type of malware called ransomware. […] More
Healthcare providers represent an attractive target for hackers due to the wealth of information they store about their patients. The Cipher Brief Spoke to Greg […] More
On February 5th, Hollywood Presbyterian Medical Center lost access to its computers after being infected with ransomware – a type of malware that hold files […] More
Technologies meant to counter unmanned aerial vehicles (UAVs) are becoming more numerous as people become more concerned about bad actors using UAVs for illicit purposes. […] More
Growing interest in unmanned aerial vehicles (UAV or drone) has caused a surge in the creation of technologies and systems meant to disable or destroy […] More
Deterrence theory formed the foundation of the narratives and the strategies that shaped the Cold War, and many now seek to apply classical deterrence to […] More
Commercially available unmanned aerial vehicles (UAVs), popularly known as drones, appear to be changing the game in regards to aviation. The market for drones has […] More
Apple’s dispute with the FBI has caused a resurgence of the debate about encryption in the United States, but the tech industry is working on […] More
Quantum computing is poised to usher in a new era in computing by allowing access to unprecedented speed and new problem solving capabilities. The Cipher […] More
Debates about encryption have been a hot button issue for some time, as privacy advocates and law-enforcement agencies debate about the merits of privacy versus […] More
The court order demanding Apple create an encryption-breaking tool was never about a single iPhone. A disclosure in a federal court yesterday revealed that the […] More
Search