Featured Analysis

15 Feb 2018

Commanding the Trend: Social Media as Information Warfare

This article demonstrates how social media is a tool for modern information-age warfare. It builds on analysis of three distinct topics: social networking, propaganda, and news and information sharing. Two case studies are used to show how state and non-state actors use social media to employ time-tested propaganda techniques to

20 Jan 2018

What did Cybersecurity and Cyberwar look like in 1999?

Think all these news stories you are reading about cybersecurity, cyberwar, and cyberconflict are breaking new ground? It is worth taking a read through the several hundred entries meticulously compiled in Mich Kabay’s 1999 Infosec Year in Review which I recently found on an old drive while searching for other

05 Jan 2018

The Two AI Books Chinese President Xi Jinping is Reading

China’s president Xi Jinping further signaled his interest in having China emerge as a dominant artificial intelligence power with the placement of two AI books on his bookshelf during his New Year’s Eve address to the nation. The two books featured on the president’s bookshelf were The Master Algorithm by Pedro

18 Dec 2017

U.S. National Security Strategy 2017

An America that is safe, prosperous, and free at home is an America with the strength, confidence, and will to lead abroad. It is an America that can preserve peace, uphold liberty , and create enduring advantages for the American people. Puting America first is the duty of our government

10 Dec 2017

Trump: Accidental Nuclear Genius?

Love him or hate him, when it comes to North Korea, Trump just may be frustratingly suited for nuclear negotiations. Unpredictability, emotional outbursts, irrationality, and other descriptors that have been applied to the sitting president are likely qualities a president should not have in general. According to Cold War-era nuclear

20 Jul 2017

DHS Issues Report on AI Risk to Critical Infrastructure

Artificial Intelligence (AI) is an emerging risk that will affect critical infrastructure (CI) as it becomes common throughout the United States. The purpose of this research paper is to analyze the narratives about AI to understand the prominence of perceived key benefits and threats from AI adoption and the resulting

30 Mar 2017

Iranian Presidential Elections: Suppressing Dissension through Cyber

Introduction During the next months leading up to Iran’s Presidential elections on 17 May, Iranians will see an increase in cyber espionage leveraged against their systems and accounts. This increase will especially target politically active citizens as well as prolific and politically vocal Iranian-Americans abroad. These attempts by Iran’s intelligence

02 Mar 2017

Defense Science Board Report on Cyber Deterrence

The United States gains tremendous economic, social, and military advantages from cyberspace. However, our pursuit of these advantages has created extensive dependencies on highly vulnerable information technologies and industrial control systems. As a result, U.S. national security is at unacceptable and growing risk. Over the past several years, the United


Home New