recommended reading

author archives

Results 1-7 of 7

On the Cyber Frontier, Hacking Back is Ethical — and Even Desirable

September 26, 2016 When cyberattacks come from abroad, there’s special panic. We often imagine them to be the opening volleys of a cyberwar that could escalate into a kinetic war. For that reason, hacking back—or cyber-counterattacking—is presumed to be too dangerous to allow. The legal case against hacking back is that the use...

Do Killer Robots Violate Human Rights?

April 20, 2015 As bizarre as it sounds, the United Nations just held an arms-control conference to figure out if killer robots might violate the laws of war. Ten years ago, very few experts were worried about military robots. The technology was just emerging onto the battlefield. Now, several credible groups are waging...

Do Killer Robots Violate Human Rights?

April 20, 2015 As bizarre as it sounds, the United Nations just held an arms-control conference to figure out if killer robots might violate the laws of war. Ten years ago, very few experts were worried about military robots. The technology was just emerging onto the battlefield. Now, several credible groups are waging...

Pain Rays and Robot Swarms: The Radical New War Games DoD Plays

April 16, 2013 In the year 2025, a rogue state--long suspected of developing biological weapons--now seems intent on using them against U.S. allies and interests. Anticipating such an event, we have developed a secret "counter-virus" that could infect and destroy their stockpile of bioweapons. Should we use it? From a legal standpoint, it...

Could human enhancement turn soldiers into weapons that violate international law?

January 7, 2013 Science fiction, or actual U.S. military project? Half a world away from the battlefield, a soldier controls his avatar-robot that does the actual fighting on the ground. Another one wears a sticky fabric that enables her to climb a wall like a gecko or spider would. Returning from a traumatic...

Is it possible to wage a just cyberwar?

June 5, 2012 In the last week or so, cyberwarfare has made front-page news: the United States may have been behind the Stuxnet cyberattack on Iran; Iran may have suffered another digital attack with the Flame virus; and our military and industrial computer chips may or may not be compromised by backdoor switches...

'Stand your cyberground' law: A novel proposal for digital security

May 1, 2012 With the Cyber Intelligence Sharing and Protection Act (CISPA), we're in a political tug-of-war over who should lead the security of our digital borders: should it be a civilian organization such as the Department of Homeland Security (DHS), or a military organization such as the Department of Defense (DoD)? I...

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    Download
  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download

When you download a report, your information may be shared with the underwriters of that document.