Skip to content

Georgetown Security Studies Review

A Publication of the Georgetown University Center for Security Studies

home
  • About Us
    • Editorial Board
    • Staff
    • Advisory Board
    • Contact
  • Regions
    • Africa
    • Arctic
    • Europe
    • East Asia
    • Latin America & The Caribbean
    • Middle East
    • Russia
    • South and Central Asia
    • United States
  • Topics
    • Climate Change & Energy Security
    • Intelligence
    • Military & Defense
    • Nuclear & Unconventional Weapons
    • Technology & Cyber Security
    • Terrorism
  • Archive
  • The Review
  • Contribute

Category: Technology & Cyber Security

Arctic, Technology & Cyber Security

Space-Based Solutions for Closing the Arctic Digital Divide

Posted onNovember 27, 2019

The ISS flies over the Earth at night. Photo Credit: Wikimedia Commons. The Arctic is rapidly becoming more accessible due to climate change, bringing with …

ShareTweetPin itShare
Technology & Cyber Security

The Need for A Federal AI Supervisory Task Force is More Urgent than Ever

Posted onOctober 22, 2019

A stylized image representing AI. Photo Credit: Flikr/Mike MacKenzie. The US government must establish a special taskforce that tests and sanctions the release of diverse …

ShareTweetPin itShare
Georgetown & CSS News, Technology & Cyber Security

Real Minds Gather to Discuss Artificial Intelligence at the Kalaris Intelligence Conference

Posted onOctober 17, 2019

Sue Gordon, Former Principal Deputy Director of National Intelligence, speaking at the Kalaris Conference. Photo Credit: GSSR/Hunter Price. Academics, government officials, and private sector members …

ShareTweetPin itShare
Europe, Technology & Cyber Security

Estonia’s Digital Embassies and the Concept of Sovereignty

Posted onOctober 10, 2019October 10, 2019

An e-Estonia display. Photo Credit: E-Estonia. INTRODUCTION I have previously covered e-Estonia and the strategic risks Estonia’s e-government platforms pose for Estonian and NATO cybersecurity …

ShareTweetPin itShare
Intelligence, Technology & Cyber Security

The Polyopticon: Data Gathering and State Technopower

Posted onAugust 28, 2019August 28, 2019

A panopticon-inspired prison. Photo Credit: Wikimedia Commons. Introduction The world is on the cusp of a fourth industrial revolution.[i] This revolution is driven by the …

ShareTweetPin itShare
Technology & Cyber Security

An Unpatchable Exploit: The Human Vulnerability in Cybersecurity

Posted onAugust 23, 2019

Individual holding a flash drive. Photo Credit: Wikimedia Commons. Popular imagination envisions hackers as shadowy figures in dark rooms hunched over computers running thousands of …

ShareTweetPin itShare
Military & Defense, Russia, Technology & Cyber Security, United States

The Russian Edge in Electronic Warfare

Posted onJune 26, 2019August 6, 2019

A Russian serviceman prepares to launch a drone during a military exercise. Photo Credit: RIA Novosti. By: Madison Creery, Columnist The U.S. has spent nearly …

ShareTweetPin itShare
Technology & Cyber Security, United States

Beyond Huawei – 5G and US National Security

Posted onJune 7, 2019July 29, 2019

Illustrative image of a hacker. Photo Credit: Gettyimages. By: Daniel Zhang, Columnist The US government has launched a concerted campaign both domestically and internationally to …

ShareTweetPin itShare
Intelligence, Technology & Cyber Security

Vulnerabilities Equities Process Revisited

Posted onMay 28, 2019July 29, 2019

Shadowy cyber figure. Photo Credit: Getty Images. By: Daniel Zhang, Columnist Publicly released in 2017 under the Trump administration, the Vulnerabilities Equities Process (VEP) is …

ShareTweetPin itShare
Special Issues, Technology & Cyber Security, United States

NSCITF Report on Millennial Considerations on Insider Threat

Posted onMay 24, 2019July 18, 2019

The 2019 edition of the National Security Critical Issues Task Force (NSCITF) Report is now available for download here. The 2019 NSCITF Report on Millennial Considerations …

ShareTweetPin itShare

Posts navigation

1 2 3 … 8 ‹
© 2019 Georgetown Security Studies Review Privacy Policy
keyboard_arrow_up
Georgetown Security Studies Review
Privacy Policy / Proudly powered by WordPress Theme: Short News Pro.