Photo Credit: Military Embedded Systems At the beginning of the twenty-first century, camera phones were a new commodity – and their effects on battlefield operations were largely unknown. Two decades later, their rapid development and newfound capabilities pose a litany of security concerns for our deployed servicemembers, such as geotagging that enables kinetic targeting and … Continue reading Smart Devices: A Necessary Evil for Military Operations?
Photo Credit: Seeedstudio.com In our networked world, artificial intelligence (AI) methodologies can be copied and pasted with minimal modification until they become geopolitical forces. On April 8, 2021, the US Office of the Director of National Intelligence (ODNI) released its Global Trends 2040 report, noting more centrally than ever that AI is not only an … Continue reading Does the Future of Artificial Intelligence Favor Authoritarianism?
India's Brahmos missile, which was developed jointly with Russia, on display in 2018. Photo Credit: Politico, Arun Sankar/AFP/Getty Images Nuclear weapons have dominated U.S. security strategy for decades. The overwhelming power of these weapons has captivated the minds of U.S. scholars, strategists, and policymakers alike. However, this fascination with complete annihilation has created an impenetrable bubble around … Continue reading Nuclear Disarmament: Why Reaching for Zero Makes Sense
Photo credit: European Space Agency (ESA) The US National Space Policy (NSP) outlines military, civil, and commercial efforts in space and is the authoritative policy document that guides the space activities of NASA, the intelligence community, and the Departments of Defense, State, Commerce, Energy, Homeland Security, Transportation, and Interior. Therefore, the publication of a new … Continue reading What’s New in the 2020 US National Space Strategy?
North Korea launches a short-range missile, July 26, 2019. Photo Credit: BBC The Islamic Republic of Iran and the Democratic Republic of Korea (DPRK) have established a relationship that serves both of their security strategies. Their cooperation is a functional means to withstand their mutual economic isolation as well as a threatening move against their … Continue reading Arms for Oil: How North Korea and Iran Facilitate Each Other’s Security Strategies
Stylized representation of Joint All Domain Command and Control. Photo Credit: Raytheon Intelligence and Space. In 2018, the Department of Defense (DoD) set up the Joint Artificial Intelligence Center (JAIC) to consolidate the DoD’s artificial intelligence R&D projects under one organization. The JAIC is currently responsible for over 30 projects with broad applications, including battlefield … Continue reading Joint Artificial Intelligence Center: An Opportunity for Transparency
A CDC scientist pipetting specimens in one of the Center for Disease Control's (CDC) Biosafety Level-4 (BSL-4) laboratories, located in Atlanta, GA. Photo Credit: Public Health Image Library. Minimizing the spread of coronavirus has been at the forefront of leaders’ and policymakers’ efforts since the onset of the pandemic. Evidently, the benefits of mass surveillance … Continue reading The Argument for A Democratic Public Health Surveillance Program
Audrey Kurth Cronin. Photo Credit: Audrey Kurth Cronin/Twitter. In March, Audrey Kurth Cronin, professor of international security in the School of International Service at American University, sat down for an interview with Emily Traynor Mayrand and Alistair Somerville from The Europe Desk podcast at Georgetown’s BMW Center for German and European Studies. She is an … Continue reading The Europe Desk Interview: Audrey Kurth Cronin on Counterterrorism and Emerging Technologies
Jeff Bezos and Mohammed bin Salman at a 2016 meeting. Photo Credit: Getty Images. Mohammed Bin Salman (MBS), the Crown Prince and effective ruler of Saudi Arabia, made a strategic error that could limit his nation’s access to cyber capabilities by spying on the richest person in the United States. While hacking political dissidents and … Continue reading Royal Hubris: The Hacking of Jeff Bezos and the Future of Regulating the Cyber Domain
A stylized image of computer code. Photo Credit: Wikimedia Commons. During the 37th Meeting of the INTERPOL Specialists Group on Crimes against Children in France earlier this month, US Department of Justice and Federal Bureau of Investigation (FBI) officials presented a draft resolution calling for “lawful access” to encrypted data “enabled or facilitated by [providers … Continue reading Revisit The Case for Lawful Hacking: A Path to the Going Dark Debate