Skip to content

Georgetown Security Studies Review

A Publication of the Georgetown University Center for Security Studies

home
  • About Us
    • Editorial Board
    • Staff
    • Advisory Board
    • Contact
  • Regions
    • Africa
    • Arctic
    • Europe
    • East Asia
    • Latin America & The Caribbean
    • Middle East
    • Russia
    • South and Central Asia
    • United States
  • Topics
    • Climate Change & Energy Security
    • Intelligence
    • Military & Defense
    • Nuclear & Unconventional Weapons
    • Technology & Cyber Security
    • Terrorism
  • Archive
  • The Review
  • Contribute

Category: Technology & Cyber Security

Military & Defense, Technology & Cyber Security

Joint Artificial Intelligence Center: An Opportunity for Transparency

Posted onNovember 21, 2020

Stylized representation of Joint All Domain Command and Control. Photo Credit: Raytheon Intelligence and Space. In 2018, the Department of Defense (DoD) set up the …

ShareTweetPin itShare
Technology & Cyber Security

The Argument for A Democratic Public Health Surveillance Program

Posted onApril 27, 2020

A CDC scientist pipetting specimens in one of the Center for Disease Control’s (CDC) Biosafety Level-4 (BSL-4) laboratories, located in Atlanta, GA. Photo Credit: Public …

ShareTweetPin itShare
Georgetown & CSS News, Technology & Cyber Security, Terrorism

The Europe Desk Interview: Audrey Kurth Cronin on Counterterrorism and Emerging Technologies

Posted onApril 13, 2020April 13, 2020

Audrey Kurth Cronin. Photo Credit: Audrey Kurth Cronin/Twitter. In March, Audrey Kurth Cronin, professor of international security in the School of International Service at American …

ShareTweetPin itShare
Technology & Cyber Security

Royal Hubris: The Hacking of Jeff Bezos and the Future of Regulating the Cyber Domain

Posted onApril 2, 2020April 3, 2020

Jeff Bezos and Mohammed bin Salman at a 2016 meeting. Photo Credit: Getty Images. Mohammed Bin Salman (MBS), the Crown Prince and effective ruler of …

ShareTweetPin itShare
Technology & Cyber Security

Revisit The Case for Lawful Hacking: A Path to the Going Dark Debate

Posted onDecember 13, 2019December 10, 2019

A stylized image of computer code. Photo Credit: Wikimedia Commons. During the 37th Meeting of the INTERPOL Specialists Group on Crimes against Children in France …

ShareTweetPin itShare
Arctic, Technology & Cyber Security

Space-Based Solutions for Closing the Arctic Digital Divide

Posted onNovember 27, 2019

The ISS flies over the Earth at night. Photo Credit: Wikimedia Commons. The Arctic is rapidly becoming more accessible due to climate change, bringing with …

ShareTweetPin itShare
Technology & Cyber Security

The Need for A Federal AI Supervisory Task Force is More Urgent than Ever

Posted onOctober 22, 2019

A stylized image representing AI. Photo Credit: Flikr/Mike MacKenzie. The US government must establish a special taskforce that tests and sanctions the release of diverse …

ShareTweetPin itShare
Georgetown & CSS News, Technology & Cyber Security

Real Minds Gather to Discuss Artificial Intelligence at the Kalaris Intelligence Conference

Posted onOctober 17, 2019

Sue Gordon, Former Principal Deputy Director of National Intelligence, speaking at the Kalaris Conference. Photo Credit: GSSR/Hunter Price. Academics, government officials, and private sector members …

ShareTweetPin itShare
Europe, Technology & Cyber Security

Estonia’s Digital Embassies and the Concept of Sovereignty

Posted onOctober 10, 2019October 10, 2019

An e-Estonia display. Photo Credit: E-Estonia. INTRODUCTION I have previously covered e-Estonia and the strategic risks Estonia’s e-government platforms pose for Estonian and NATO cybersecurity …

ShareTweetPin itShare
Intelligence, Technology & Cyber Security

The Polyopticon: Data Gathering and State Technopower

Posted onAugust 28, 2019August 28, 2019

A panopticon-inspired prison. Photo Credit: Wikimedia Commons. Introduction The world is on the cusp of a fourth industrial revolution.[i] This revolution is driven by the …

ShareTweetPin itShare

Posts navigation

1 2 3 … 8 ‹
© 2021 Georgetown Security Studies Review Privacy Policy
keyboard_arrow_up
Georgetown Security Studies Review
Privacy Policy / Proudly powered by WordPress Theme: Short News Pro.