The scourge of ransomware is the inevitable result of decades of schizophrenia about our relationship with information technology and security. Treating this problem in the same fashion as we have those that came before it will only prolong our suffering. Clarity, creativity, and will are required if we are to have any hope of a future where ransomware is an annoyance and not a plague.
Since 2012 Iran has shown increasingly sophisticated capabilities to conduct cyber attacks, including the incredibly destructive attacks against Saudi Aramco, attacks against US banks and infrastructure, attacks against the power grid in Turkey, and attacks against the UK Parliament. Iran has also invested in and used capabilities in disinformation and
OODA Network Expert Michael Tanji provides insightful analysis of the most recent and significant cyber news.
As the story broke about the charges against former U.S. Air Force intelligence specialist who defected to Iran and support targeted hacking against some of her former colleagues, one clear takeaway stood out: even U.S. intelligence officers can fall victim to basic, directed hacking campaigns. The process was simple; the
The DoD released a new summary of its AI strategy this Tuesday (February 12) titled “Harnessing AI to Advance Our Security and Prosperity” and outlining its future plans for AI development and integration. “AI is poised to transform every industry and is expected to impact every corner of the Department,
As China advances its nuclear weapons programs and works to close some of the major nuclear gaps between it and other major powers, some controversy is developing over whether these developments will lead to changes in its “no first strike” nuclear policy. With a kind of naval arms race and
China’s views, strategies, and prospects for A.I. in the areas of economics and national security will play a significant role in world politics and U.S. foreign relations. It is important, therefore, to work to understand them, without overgeneralizing, to the greatest extent possible, as these understands are essential for informing
What do you do when you need to destroy massive of classified information stored on digital devices? If you are the U.S. Navy, you issue a solicitation for incineration services able to reduce 4,000 pounds of IT equipment “to ash.” The devices were housed by projects working on “land-based weapons
A new exclusive report from Reuters traces the shadowy “Project Raven,” a program run by the United Arab Emirates that hired ex-NSA cyberspies to hack the devices of targets around the world. The only named source of the information reportedly became disillusioned with the work when the program began spying
The FAA has declared a “no drone zone” in and around the Mercedes-Benz Stadium in Atlanta, home over Super Bowl LIII on February 3. The limit restricts any drone from flying within one nautical mile of the stadium below 1,000 feet, starting January 31st. The night of the game, the