Russia has executed deliberate intrusions into U.S. critical infrastructure since at least 2011. These systems have included government entities, commercial facilities, water resource plants, and aviation institutions. What actions or policies can the U.S. execute to improve security?
Jun 24, 2019 Inside Sources
Nation-states and their proxies are regularly spying and attacking in cyberspace across national borders. The U.S. and other Western societies that are being targeted should do three things: Be less vulnerable, be able to recognize and mitigate the impact of attacks faster, and be prepared to respond in kind to all levels of offense.
Mar 3, 2018 U.S. News & World Report
More than 100,000 personnel in the Army National Guard and the U.S. Army Reserve have some degree of cyber competence, including thousands with deep or mid-level expertise. They could help defend the cyber terrain on which America's national security, prosperity, and democracy depend.
Apr 18, 2017 TechCrunch
Autonomous vehicles require exquisite software. To make this software secure, industry and government should consider educational standards and licensure requirements for the engineers who create it.
Sep 27, 2016 VentureBeat
To prevail against ISIS in cyberspace, the United States and its cyber soldiers will have to be capable of reacting quickly, while being guided by an overarching strategy. Secretary of Defense Carter urged U.S. Cyber Command to intensify the fight against ISIS but it would also be wise to recruit civilian volunteers.
Apr 1, 2016 Project Syndicate
Some notorious cyberattacks have been carried out by computer-savvy teens. They don't all have criminal intentions, they just have a particular aptitude for writing code and operating in cyberspace. The U.S. military should consider embracing and cultivating this pool of talent.
Mar 10, 2016 U.S. News & World Report
Millions of people leave behind online footprints each day, giving law enforcement and intelligence experts the chance to construct a profile of who is more likely to commit violence in the name of a murderous ideology.
Dec 28, 2015 Newsweek
While the U.S. Cyber Command is preparing the nation's defenses for the coming ramp-up in cyberwarfare-like attacks, the messages spread instantly by hordes of attackers through social media may not be receiving the attention they deserve.
Jul 23, 2015 U.S. News & World Report
What remains vitally needed is legislation that would grant at least one capable government organization the authority to track cyber-intruders and -criminals with the same freedom and speed of maneuver that these adversaries enjoy, while protecting the civil liberties and freedoms that allowed the establishment of the Internet.
Jan 22, 2015 U.S. News & World Report
Security protections on vehicles have not kept pace with systems that control safety features, navigation capabilities, and wireless communication functions. Onboard computer networks will likely become much more attractive to hackers, whether their aim is to steal a car, eavesdrop on a conversation, stalk a potential victim, or cause a devastating traffic accident.
Jun 30, 2014 The San Francisco Chronicle
Despite the value of intelligence, surveillance, and reconnaissance (ISR) systems, the amount of data they generate has become overwhelming. If the Navy does not change the way it processes information, it will reach an ISR “tipping point”—as soon as 2016.
Jun 23, 2014 Future Force
The failure to find the missing aircraft demonstrates anew the serious gaps in data coordination and challenges public assumptions about the thoroughness and simplicity of searching the world’s data for answers.
May 1, 2014 U.S. News & World Report
For American audiences and policymakers alike, cyber activities in Crimea provide a chilling reminder that cyberspace is emerging as a 21st-century global battlefield.
Apr 7, 2014 U.S. News & World Report
Reports earlier this year that the U.S. Department of Defense leased a Chinese satellite to support military operations in Africa sparked concern that the arrangement could compromise control over U.S. military communications, or, worse, allow Chinese intelligence gatherers access to privileged military data.
Nov 8, 2013 U.S. News & World Report
The Army's Distributed Common Ground System (DCGS) program has been getting much attention from Congress, and its future was the subject of a heated exchange between the Army's Chief of Staff General Raymond Odierno and Representative Duncan Hunter in May.
Aug 21, 2013 The RAND Blog
A truly monumental attack that could cripple key U.S. computer systems — something akin to the Stuxnet worms attack on Iran's nuclear infrastructure, for example — would take many months of planning, significant expertise, and a great deal of money to pull off, writes Isaac Porche.
May 6, 2011 RAND.org and GlobalSecurity.org
The highly sophisticated Stuxnet computer worm suspected of sending Iran's nuclear centrifuges into self-destruction mode forces a difficult debate on whether longstanding firewalls in our country's democracy should be breached for the sake of national security, writes Isaac Porche.
Dec 9, 2010 Bulletin of the Atomic Scientists