The U.S. government needs to develop a strategy to protect its citizens that includes a unique identifying number or code and a method for protecting these identity keys in online transactions.
Jul 6, 2015 The RAND Blog
While Tor has many benefits, it is also used to hide criminal activity online such as the recent cyber attacks against JPMorgan Chase and Sony Pictures. The U.S. government should share the IP addresses of Tor network nodes with U.S. critical infrastructure and financial firms so that future cyber attacks could be prevented.
Dec 17, 2014 The RAND Blog
There is no legal reason why a DoD sensor should be excluded from use in an interagency technology demonstration or in an actual counterdrug operation as long as a valid request for support is made by an appropriate law enforcement official and no personally identifiable or private information on U.S. citizens is collected.
Jun 6, 2014
It is paramount that U.S. and European officials and the people of Ukraine understand the true situation on the ground and the extent of covert Russian operations in eastern Ukraine.
Apr 29, 2014 U.S. News & World Report
The U.S. and its allies could help Libyans communicate with the outside world by deploying cellphone base stations on aircraft or tethered balloons, write Dan Gonzales and Sarah Harting.
Mar 5, 2011 The New York Times