China’s Intentions: Sovereignty, Stability and Technological Independence
Last month, China’s legislature passed the Cybersecurity Law, which is due to take effect next summer. The controversial law has received a number of criticisms […] More
Last month, China’s legislature passed the Cybersecurity Law, which is due to take effect next summer. The controversial law has received a number of criticisms […] More
Is a future where people can be arrested for crimes they have not yet committed dystopian or utopian? While this scenario remains the fodder of […] More
The world has seen an enormous surge in the amount of data available, particularly human-generated digital exhaust from our Internet and communications habits. But only […] More
What if it were possible to predict where a crime took place before it actually occurred – even determining the identity of the culprit in […] More
Amidst a rash of data breaches where compromised passwords provided the vector of attack – think Target, Anthem, OPM, or more recently, the Democratic National […] More
Cyberspace has grown into a vital domain of everyday life—we work, socialize, play, and conduct financial transactions online. Our lives now have a digital touch, […] More
The use of biometrics to authenticate identity has been the subject of great debate for years, with opposing sides arguing its value for security, privacy, […] More
For this year’s Thanksgiving Day feature, The Cipher Brief revisits its coverage of the innovation and procurement challenges behind the F-35 Lighting II. As production […] More
For this year’s Thanksgiving Day feature, The Cipher Brief revisits its coverage of the innovation and procurement challenges behind the F-35 Lighting II. As production […] More
The Department of Defense’s (DoD) Third Offset Strategy has been a subject of considerable confusion since its rollout in late 2014, with Deputy Secretary of […] More
Since Deputy Secretary of Defense Robert Work discussed the Third Offset at a talk given in January of 2015, the concept has been the focus of numerous […] More
The balance between privacy and security in the digital age will be a key cybersecurity challenge for the next administration, according to former Homeland Security […] More
Should humans delegate the responsibility of decisions over life and death to computer algorithms? The answer is not as simple as it seems—and it is […] More
Discussions on artificial intelligence (AI) too often revolve around concerns about the sensationalist threat of “killer robots,” usually featured in science-fiction films or computer games. […] More
New technologies are changing the face of future warfare and few will be as impactful as the fusion of artificial intelligence into weapons systems. The […] More
The Putin government of Russia is conducting cyberspace-enabled Information Operations, including political “destabilizing operations” (a form of warfare), against the United States. Moscow is competing […] More
Last month, Kurdish forces in northern Iraq shot down an Islamic State drone booby-trapped with explosives that later killed two Peshmerga soldiers as they inspected […] More
Drones have traditionally been used by Western militaries as a tool in counterterrorism efforts, but insurgent and terrorist groups are increasingly turning to small hobby […] More
Search