recommended reading

author archives

Results 1-10 of 827

Ukraine Police Say This is the Source of Tuesday’s Massive Cyber Attack

4:50 PM ET A vulnerability within an obscure piece of Ukrainian accounting software is the root cause of the massive cyber attack that swept the globe Tuesday, according to the Ukrainian law enforcement. The attack hit Ukrainian utilities and airline services, U.S. based pharmaceutical company Merck, Russian oil giant Rosneft and even forced...

How Not to Win an AI Arms Race With China

June 23, 2017 The idea of a Chinese-U.S. arms race for artificial intelligence conjures up images of an army of swarmbots defeating self-driving tanks on a smoldering, depopulated hellscape. It’s an idea so captivating, Sen. John Cornyn, R-Texas, wants to make it harder for the Chinese to invest in U.S. technology development, including...

from govexec

How Not to Win an AI Arms Race With China

June 23, 2017 The idea of a Chinese-U.S. arms race for artificial intelligence conjures up images of an army of swarmbots defeating self-driving tanks on a smoldering, depopulated hellscape. It’s an idea so captivating that Sen. John Cornyn, R-Texas, wants to make it harder for the Chinese to invest in U.S. technology development,...

What's the 'Risk' in China's Investments in US Artificial Intelligence? New Bill Aims to Find Out

June 22, 2017 The idea of a Chinese-U.S. arms race for artificial intelligence conjures up images of an army of swarmbots defeating self-driving tanks on a smoldering, depopulated hellscape. It’s an idea so captivating that Sen. John Cornyn, R-Texas, wants to make it harder for the Chinese to invest in U.S. technology development,...

Detecting Secret Military Exercises With Micro Satellites, a How-To

June 21, 2017 Detecting an adversary's unscheduled naval exercise used to require a massive operation perhaps involving multiple agencies. In March 2017, a small team of analysts with a firm called 3GIMBALS, working with U.S. Southern Command, used imagery from a constellation of inexpensive microsatellites to pick up an unscheduled military exercise in...

from govexec

Inside the West Wing Tug-of-War Over Russia and Ukraine

June 21, 2017 Vice President Mike Pence and other national-security leaders are dragging President Donald Trump along in a growing effort to hold Russia accountable for illegal actions in Ukraine. For evidence of that just look at how two very different people interpreted Tuesday’s meeting in the Oval Office. As Trump sat for...

Inside the West Wing Tug-of-War Over Russia and Ukraine

June 21, 2017 Vice President Mike Pence and other national-security leaders are dragging President Donald Trump along in a growing effort to hold Russia accountable for illegal actions in Ukraine. For evidence of that just look at how two very different people interpreted Tuesday’s meeting in the Oval Office. As Trump sat for...

The Future of Military IT: Gait Biometrics, Software Nets, and Photon Communicators

June 16, 2017 Tomorrow’s soldiers will wield encrypted devices that unlock to their voices, or even their particular way of walking, and communicate via ad-hoc, software-defined networks that use not radio waves but light according to Lt. Gen. Alan Lynn, who leads the Defense Information Systems Agency, the U.S. military’s IT provider. On...

The Future of Military IT: Gait Biometrics, Software Nets, and Photon Communicators

June 15, 2017 Tomorrow’s soldiers will wield encrypted devices that unlock to their voices, or even their particular way of walking, and communicate via ad-hoc, software-defined networks that use not radio waves but light according to Lt. Gen. Alan Lynn, who leads the Defense Information Systems Agency, the U.S. military’s IT provider. On...

from govexec

After A Shooting, What Do Security Pros Do Behind Closed Doors?

June 14, 2017 Even as a high-profile shooting like Wednesday’s attack at a congressional baseball practice flashes onto cable news networks, it triggers deeper, behind-the-scenes evaluations among security personnel, local police, and federal investigators, all of whom will look at their policies and asset deployments using data from the incident. “There’s a trickle-down...