Millions of people leave behind online footprints each day, giving law enforcement and intelligence experts the chance to construct a profile of who is more likely to commit violence in the name of a murderous ideology.
Dec 28, 2015 Newsweek
While the U.S. Cyber Command is preparing the nation's defenses for the coming ramp-up in cyberwarfare-like attacks, the messages spread instantly by hordes of attackers through social media may not be receiving the attention they deserve.
Jul 23, 2015 U.S. News & World Report
What remains vitally needed is legislation that would grant at least one capable government organization the authority to track cyber-intruders and -criminals with the same freedom and speed of maneuver that these adversaries enjoy, while protecting the civil liberties and freedoms that allowed the establishment of the Internet.
Jan 22, 2015 U.S. News & World Report
Security protections on vehicles have not kept pace with systems that control safety features, navigation capabilities, and wireless communication functions. Onboard computer networks will likely become much more attractive to hackers, whether their aim is to steal a car, eavesdrop on a conversation, stalk a potential victim, or cause a devastating traffic accident.
Jun 30, 2014 The San Francisco Chronicle
Despite the value of intelligence, surveillance, and reconnaissance (ISR) systems, the amount of data they generate has become overwhelming. If the Navy does not change the way it processes information, it will reach an ISR “tipping point”—as soon as 2016.
Jun 23, 2014 Future Force
The failure to find the missing aircraft demonstrates anew the serious gaps in data coordination and challenges public assumptions about the thoroughness and simplicity of searching the world’s data for answers.
May 1, 2014 U.S. News & World Report
For American audiences and policymakers alike, cyber activities in Crimea provide a chilling reminder that cyberspace is emerging as a 21st-century global battlefield.
Apr 7, 2014 U.S. News & World Report
Reports earlier this year that the U.S. Department of Defense leased a Chinese satellite to support military operations in Africa sparked concern that the arrangement could compromise control over U.S. military communications, or, worse, allow Chinese intelligence gatherers access to privileged military data.
Nov 8, 2013 U.S. News & World Report
The Army's Distributed Common Ground System (DCGS) program has been getting much attention from Congress, and its future was the subject of a heated exchange between the Army's Chief of Staff General Raymond Odierno and Representative Duncan Hunter in May.
Aug 21, 2013 The RAND Blog
A truly monumental attack that could cripple key U.S. computer systems — something akin to the Stuxnet worms attack on Iran's nuclear infrastructure, for example — would take many months of planning, significant expertise, and a great deal of money to pull off, writes Isaac Porche.
May 6, 2011 RAND.org and GlobalSecurity.org
The highly sophisticated Stuxnet computer worm suspected of sending Iran's nuclear centrifuges into self-destruction mode forces a difficult debate on whether longstanding firewalls in our country's democracy should be breached for the sake of national security, writes Isaac Porche.
Dec 9, 2010 Bulletin of the Atomic Scientists