
Chinese Drone ‘Swarms’ Could Overwhelm U.S. at Sea
Since the time of the first kinetic attack by an unmanned aircraft in October of 2001, the United States has relied heavily on drone technology […] More
Since the time of the first kinetic attack by an unmanned aircraft in October of 2001, the United States has relied heavily on drone technology […] More
From the time of the first kinetic strike by an unmanned aircraft in October of 2001, the United States has relied heavily on remote-controlled drone […] More
U.S. companies got a disturbing preview of just how Russia might be able to steal their secrets, with news that Kaspersky Lab anti-virus software was […] More
Following a U.S. government-wide ban last month and recent news reports alleging that Kaspersky Lab enabled Russian intelligence to swipe highly classified NSA material from […] More
After reports that highly classified intelligence material was taken from a NSA contractor’s private computer through the individual’s use of Kaspersky Lab’s antivirus software, all […] More
Russian state-sponsored hackers reportedly stole details in 2015 on how the U.S. spies on foreign intelligence targets through cyber espionage, as well as how it […] More
How governments view powerful tools like the internet often determines how they treat them. In the West, governments have sought to let citizens freely and […] More
It is a problem for the U.S. that many of the core concepts that guide internet policy date to the 1990s. One such concept is […] More
The year was 1648. Europe had just negotiated the Peace of Westphalia, ending the 30 years of war that had ensnared the continent. The series […] More
In the nearly seven years since the U.S. Department of Defense declared cyberspace a “domain” of warfare – alongside land, air, sea, and space – […] More
Military and intelligence professionals around the world view cyberspace differently. In the West, it is thought of as a facilitating factor that can be leverage […] More
One of the opening rounds of an information war between the Kremlin and a democratic country came from Melvin Redick, a fake Facebook account designed […] More
The United States has no peer competitors in conventional military power. But its adversaries are increasingly turning to asymmetric methods for engaging in conflict. Cyber-enabled information warfare […] More
Much of the discussion surrounding Russian cyber-enabled information operations against Western societies focuses on technology, such as bots amplifying messages on social media and the […] More
While maritime accidents are bound to occur, the consistency and regional concentration of the U.S. Navy mishaps in the Asia-Pacific beg for explanation. Cyber vulnerabilities […] More
Recent fatal accidents involving two vessels in the U.S. Seventh Fleet led to a spate of speculation about whether somehow the navigation in these ships […] More
There has been a recent wave of high-sea collisions in the Asia-Pacific involving U.S. naval vessels – most notably the USS Fitzgerald and USS John […] More
Hunger and political instability go hand in hand. Fighting and droughts across Somalia, South Sudan, Yemen, and parts of Nigeria have caused dire situations and […] More
Search