Beijing Adds Veneer of Legal Legitimacy on Censorship
Do Chinese authorities need more laws to surveil people? From the earliest days of the Chinese Communist Party, authorities have kept the closest of eyes […] More
Do Chinese authorities need more laws to surveil people? From the earliest days of the Chinese Communist Party, authorities have kept the closest of eyes […] More
The world has seen an enormous surge in the amount of data available, particularly human-generated digital exhaust from our Internet and communications habits. But only […] More
What if it were possible to predict where a crime took place before it actually occurred – even determining the identity of the culprit in […] More
Is a future where people can be arrested for crimes they have not yet committed dystopian or utopian? While this scenario remains the fodder of […] More
Cyberspace has grown into a vital domain of everyday life—we work, socialize, play, and conduct financial transactions online. Our lives now have a digital touch, […] More
The use of biometrics to authenticate identity has been the subject of great debate for years, with opposing sides arguing its value for security, privacy, […] More
Amidst a rash of data breaches where compromised passwords provided the vector of attack – think Target, Anthem, OPM, or more recently, the Democratic National […] More
For this year’s Thanksgiving Day feature, The Cipher Brief revisits its coverage of the innovation and procurement challenges behind the F-35 Lighting II. As production […] More
For this year’s Thanksgiving Day feature, The Cipher Brief revisits its coverage of the innovation and procurement challenges behind the F-35 Lighting II. As production […] More
The Department of Defense’s (DoD) Third Offset Strategy has been a subject of considerable confusion since its rollout in late 2014, with Deputy Secretary of […] More
Since Deputy Secretary of Defense Robert Work discussed the Third Offset at a talk given in January of 2015, the concept has been the focus of numerous […] More
The balance between privacy and security in the digital age will be a key cybersecurity challenge for the next administration, according to former Homeland Security […] More
Should humans delegate the responsibility of decisions over life and death to computer algorithms? The answer is not as simple as it seems—and it is […] More
Discussions on artificial intelligence (AI) too often revolve around concerns about the sensationalist threat of “killer robots,” usually featured in science-fiction films or computer games. […] More
New technologies are changing the face of future warfare and few will be as impactful as the fusion of artificial intelligence into weapons systems. The […] More
The Putin government of Russia is conducting cyberspace-enabled Information Operations, including political “destabilizing operations” (a form of warfare), against the United States. Moscow is competing […] More
There is growing evidence that non-state actors are incorporating drone technology into their unconventional tactics, prompting concerns from militaries on how they can effectively counter […] More
Last month, Kurdish forces in northern Iraq shot down an Islamic State drone booby-trapped with explosives that later killed two Peshmerga soldiers as they inspected […] More
Search