Geospatial intelligence, or the collection and analysis of the physical features of the Earth, has long been an integral aspect of both strategic national security efforts as well as tactical combat. The U.S. National Geospatial-Intelligence Agency (NGA) has been at the forefront of confronting national security challenges, from terror groups ...

Raytheon, one of the U.S. government’s largest defense contractors, is known for making bold competitive moves. Just a couple of days ago, the company claimed victory after successfully firing a high-energy laser from an Apache helicopter. A sign of things to come with the natural evolution of technology and warfare. ...

The explosion of data in a digital world has exposed people to volumes of information as never before. But just as this data will increase exponentially with time, so too will the number of questions that can be posed against these expansive datasets. To find insight buried in this immense ...

"Rise of the Machines: A Cybernetic History" (2016) tells the story of cybernetics, a control theory of man and machine devised by mathematician Norbert Wiener after WWII. Author Thomas Rid, who is a professor in the Department of War Studies at King’s College London, shows how cybernetics was and still ...

The cybersecurity industry, much like other sectors, is dealing with an influx of data. In response, security experts hope to harness the power of artificial intelligence and machine learning to effectively and efficiently augment their ability to detect, predict, and contain threats to their networks. The Cipher Brief spoke with ...

We live in an age where what used to be the figment of science fiction is now a reality, changing the way people go about their daily lives. Advances in artificial intelligence and machine learning are the new frontier, and their inception creates just as many risks as opportunities. In ...

The cybersecurity industry is currently enamored with concepts of autonomous defense, including elements of machine learning, behavioral analytics, and artificial intelligence—and rightly so. Programed to be able to study all vulnerabilities in the public domain, autonomous bots (autbots)—not to be confused with bots simply conducting repetitive tasks like guessing default ...

Many view cybersecurity as passively blocking attempts to breach networks, but security experts have long advocated more active measures in defense of sensitive networks. Advances in artificial intelligence and machine learning could make such efforts scalable to the vast connectivity of the modern age. The Cipher Brief spoke with David ...