An interesting paper from the Australian Strategic Policy Institute looking at issues of entanglement and dual-use technologies.
While hosting a delegation from France, Putin advised that to prevent cyber attacks, nations will have to establish international norms prohibiting such behavior. “This is what I can say about cyberattacks or war of words in the press and other issues. Action always causes reaction. Always. If one does not
In one of my favorite movies of all time, a brilliant mathematician creates a device capable of breaking the encryption used for air traffic control, global banking, and other critical applications. His company Setec Astronomy (an anagram for Too Many Secrets) has created such a powerful secret breaking device that
What cyber threat do China, Russia, and Iran present for the remainder of 2018 and 2019? Matt Devost provides some insight into the geopolitical elements influencing that answer.
Watching the conclusion of the DARPA Cyber Grand Challenge at Def Con in 2016 felt like getting a glimpse into the future. At the time, and in subsequent media interviews (New Scientist, Cipher Brief) I noted that I had been caught by surprise and went into the event expecting incremental
Dr. Clifford Stoll, astronomer, professor, IT security pioneer and author of “The Cuckoo’s Egg,” discusses his ground-breaking work in IT security while at Berkeley, where he stumbled on an intrusion by hackers working on behalf of the KGB. Learn how cybersecurity began from the trailblazing researcher who invented some of
This study centers on how computer-based decision procedures, under the broad umbrella of artificial intelligence (AI), can assist in improving health and health care. Although advanced statistics and machine learning provide the foundation for AI, there are currently revolutionary advances underway in the sub-field of neural networks. This has created
During the Cold War, the Soviet Union engaged in a detailed clandestine urban mapping project designed to develop detailed cartographic material for major United States cities. These efforts are detailed in the book “The Red Atlas: How the Soviet Union Secretly Mapped the World”. As we’ve clearly entered into Cold
This article demonstrates how social media is a tool for modern information-age warfare. It builds on analysis of three distinct topics: social networking, propaganda, and news and information sharing. Two case studies are used to show how state and non-state actors use social media to employ time-tested propaganda techniques to
Think all these news stories you are reading about cybersecurity, cyberwar, and cyberconflict are breaking new ground? It is worth taking a read through the several hundred entries meticulously compiled in Mich Kabay’s 1999 Infosec Year in Review which I recently found on an old drive while searching for other