Follow Obama's Lead on Cybersecurity
In the fall of 2008, a bipartisan group of cybersecurity experts delivered some sage advice to Barack Obama, set to become president in January: “Don’t […] More
In the fall of 2008, a bipartisan group of cybersecurity experts delivered some sage advice to Barack Obama, set to become president in January: “Don’t […] More
War, often rationalized as an extension of policy by violent means, has always been a deeply human experience. It defines much of human history and, […] More
Bob Work, the Deputy Secretary of Defense, will tell you the Third Offset is the next generation of warfare. It may take at least ten […] More
Imagine a weapon that strikes on its own, without the slightest hint of human judgment or compassion. It’s a chilling prospect, and not so far […] More
Surveillance law is absolutely necessary because it compels the government to write down, for all to clearly see, the rules that they must abide by […] More
On November 29, Royal Assent was given to the UK Investigatory Powers Act, after eight months of intensive Parliamentary scrutiny, with hundreds of amendments made, […] More
On January 1st, the United Kingdom began the implementation of the Investigatory Powers Act, widely considered the most comprehensive—and intrusive—surveillance law in the Western world. […] More
As the most expensive procurement program in history, the F-35 program exemplifies both the promise and pitfalls of developing and deploying an advanced weapons platform. […] More
Butch Cassidy graphically demonstrated that there ain’t no rules in a knife fight. Well, so far, there ain’t no rules in cyberspace or precious few […] More
Editor’s Note: Over the coming days, The Cipher Brief presents some of our most incisive coverage on key issues of 2016 and a look ahead […] More
What if the U.S. government could force entry—in other words, hack—into electronic devices around the world, using only one warrant, even if the owners of […] More
With the growth of cybercrime facilitated by the global nature of the Internet, law enforcement is adapting their toolsets to better tackle the challenges presented […] More
On December 1, Congress authorized sweeping new government hacking and surveillance authorities by allowing changes to Rule 41 of the Federal Rules of Criminal Procedure […] More
Do Chinese authorities need more laws to surveil people? From the earliest days of the Chinese Communist Party, authorities have kept the closest of eyes […] More
Last month, China’s legislature passed the Cybersecurity Law, which is due to take effect next summer. The controversial law has received a number of criticisms […] More
Is a future where people can be arrested for crimes they have not yet committed dystopian or utopian? While this scenario remains the fodder of […] More
The world has seen an enormous surge in the amount of data available, particularly human-generated digital exhaust from our Internet and communications habits. But only […] More
What if it were possible to predict where a crime took place before it actually occurred – even determining the identity of the culprit in […] More
Search