Cyber

Soldiers from 1st Stryker Brigade, 1st Armored Division operate vehicles equipped with Warfighter Information Tactical Increment 2 at Fort Bliss, Tx. October, 2014 (U.S. Army)

Army Looks To Replace $6 Billion Battlefield Network After Finding It Vulnerable

Hailed as a transformation in battlefield communications, the WIN-T program can’t stand up to foes versed in sophisticated electronic warfare.

On this episode of The E.R., the panel discusses SecureDrop.

So You Want to Be a Leaker?

No method is foolproof, but some are better than others.

China's President Xi Jinping poses after delivering his speech at the UNESCO headquarters in Paris on March 27, 2014. After a day devoted to multi-billion-dollar business deals, Chinese leader Xi Jinping trained his sights on culture and history today on the last day of his lavish visit to France. AFP PHOTO / POOL / Christian Hartmann        (Photo credit should read CHRISTIAN HARTMANN/AFP/Getty Images)

As U.S. Retreats From World Organizations, China Steps in to Fill the Void

Beijing is trying to repurpose abandoned international agencies like UNESCO to serve its strategic interests — such as controlling the internet.

An image of an American flag stylized as a gun in Tehran, Iran.

Abandoning Iranian Nuclear Deal Could Lead to New Wave of Cyberattacks

If Trump walks away from the pact, Tehran could see “retribution against Western targets.”

Fort Meade, UNITED STATES:  A computer workstation bears the National Security Agency (NSA) logo inside the Threat Operations Center inside the Washington suburb of Fort Meade, Maryland, intelligence gathering operation 25 January 2006 after US President George W. Bush delivered a speech behind closed doors and met with employees in advance of Senate hearings on the much-criticized domestic surveillance.   AFP PHOTO/Paul J. RICHARDS  (Photo credit should read PAUL J. RICHARDS/AFP/Getty Images)

Is the NSA Doing More Harm Than Good in Not Disclosing Exploits?

Inside the complicated national security calculus behind disclosing zero-day vulnerabilities.

TO GO WITH AFP STORY BY ASAAD ABBOUD
A Saudi man prepares to login into his Twitter account on his laptop on October 6, 2013 at his office in Riyadh. Despite sitting on the world's largest wealth of oil, Saudis complain their salaries are not enough to make ends meet, and have taken to Twitter demanding better income.    AFP PHOTO/FAYEZ NURELDINE        (Photo credit should read FAYEZ NURELDINE/AFP/Getty Images)

Twitter Suspended Far Fewer Terrorist Accounts in First Half of 2017

The number is declining because policing efforts are improving, company says.

The guided-missile destroyer USS John S. McCain, with a hole on its portside after a collision with an oil tanker, makes its way to Changi naval base in Singapore on August 21, 2017. 
Ten US sailors were missing and five injured after their destroyer collided with a tanker east of Singapore early Monday, the second accident involving an American warship in two months. / AFP PHOTO / Roslan RAHMAN        (Photo credit should read ROSLAN RAHMAN/AFP/Getty Images)

U.S. Navy Investigating if Destroyer Crash Was Caused by Cyberattack

The probe of the USS John S. McCain collision will be a model for future investigations.

WASHINGTON - OCTOBER 02:  Erik Prince, chairman of the Prince Group, LLC and Blackwater USA, holds up a picture showing the affect of a car bomb while testifying during a House Oversight and Government Reform Committee hearing on Capitol Hill October 2, 2007 in Washington DC. The committee is hearing testimony from officials regarding private security contracting in Iraq and Afghanistan.  (Photo by Mark Wilson/Getty Images)

Why Is Erik Prince Backing a Secure Communications Company?

America’s most notorious security contractor is quietly investing in privacy apps.

Load 10 More Articles

You have read 0 of 5 free articles

Global Thinkers 2015 Issue Cover