The Need for A Federal AI Supervisory Task Force is More Urgent than Ever

A stylized image representing AI. Photo Credit: Flikr/Mike MacKenzie. The US government must establish a special taskforce that tests and sanctions the release of diverse artificial intelligence (AI) products rolled out by Silicon Valley giants to reduce national security or physical security risks of new AI technologies. The potentially damaging effect of AI on society … Continue reading The Need for A Federal AI Supervisory Task Force is More Urgent than Ever

Real Minds Gather to Discuss Artificial Intelligence at the Kalaris Intelligence Conference

Sue Gordon, Former Principal Deputy Director of National Intelligence, speaking at the Kalaris Conference. Photo Credit: GSSR/Hunter Price. Academics, government officials, and private sector members descended upon Gaston Hall on September 25, 2019 for the Georgetown University Center for Security Studies’ (CSS) and Center for Security and Emerging Technology’s (CSET) annual Kalaris Intelligence Conference. Together, … Continue reading Real Minds Gather to Discuss Artificial Intelligence at the Kalaris Intelligence Conference

Estonia’s Digital Embassies and the Concept of Sovereignty

An e-Estonia display. Photo Credit: E-Estonia. INTRODUCTION I have previously covered e-Estonia and the strategic risks Estonia’s e-government platforms pose for Estonian and NATO cybersecurity by presenting a ready center of gravity for adversarial cyber operations.[i] That risk is calculated against the revolutionary benefits that e-governance has brought Estonia, making the country’s administration incredibly flexible, … Continue reading Estonia’s Digital Embassies and the Concept of Sovereignty

The Polyopticon: Data Gathering and State Technopower

A panopticon-inspired prison. Photo Credit: Wikimedia Commons. Introduction The world is on the cusp of a fourth industrial revolution.[i] This revolution is driven by the increased connectivity, reactivity, and converging nature of modern technologies. It is enabled by constant data-streams analyzed through ultramodern techniques, which allow vendors to immediately integrate analysis into product and service … Continue reading The Polyopticon: Data Gathering and State Technopower

An Unpatchable Exploit: The Human Vulnerability in Cybersecurity

Individual holding a flash drive. Photo Credit: Wikimedia Commons. Popular imagination envisions hackers as shadowy figures in dark rooms hunched over computers running thousands of lines of code as they attempt to brute force their way into target networks and systems. But the reality is that hacking is not often about “brute force.” Instead, whether … Continue reading An Unpatchable Exploit: The Human Vulnerability in Cybersecurity

The Russian Edge in Electronic Warfare

A Russian serviceman prepares to launch a drone during a military exercise. Photo Credit: RIA Novosti. By: Madison Creery, Columnist The U.S. has spent nearly two decades dedicated to counterterrorism operations where it enjoyed significant qualitative and quantitative advantages over adversaries. In these conflicts, the U.S. was able to quickly gain local air, sea, and … Continue reading The Russian Edge in Electronic Warfare

Beyond Huawei – 5G and US National Security

Illustrative image of a hacker. Photo Credit: Gettyimages. By: Daniel Zhang, Columnist The US government has launched a concerted campaign both domestically and internationally to block Huawei from building Next-Generation (5G) wireless networks. These efforts are, however, insufficient to address wider network security concerns. Keeping Huawei hardware out of the US 5G network does not … Continue reading Beyond Huawei – 5G and US National Security

Vulnerabilities Equities Process Revisited

Shadowy cyber figure. Photo Credit: Getty Images. By: Daniel Zhang, Columnist Publicly released in 2017 under the Trump administration, the Vulnerabilities Equities Process (VEP) is an interagency framework used to determine whether the United States government should withhold or disclose zero-day vulnerabilities - unpatched software or hardware vulnerabilities often exploited by criminals, militaries, or governments … Continue reading Vulnerabilities Equities Process Revisited

NSCITF Report on Millennial Considerations on Insider Threat

The 2019 edition of the National Security Critical Issues Task Force (NSCITF) Report is now available for download here. The 2019 NSCITF Report on Millennial Considerations on Insider Threat: Are We A Threat Or An Opportunity? As insider threat prevention receives increasing attention, the National Security Critical Issues Task Force examined if Millennials–now the largest segment of … Continue reading NSCITF Report on Millennial Considerations on Insider Threat

A Nuclear (em)Powered Middle East: Why the United States Cannot Afford a Counterterror Only Approach to the Region

The Barakah nuclear power plant in United Arab Emirates is seen in an undated photo released by the state-run WAM news agency. Photo Credit: Arun Girija/Emirates Nuclear Energy Corporation/WAM/AP  By: Taylor Clausen, Columnist  The most recent National Security Strategy and National Defense Strategy heralded the return of great power competition. Before the documents’ release, Elbridge … Continue reading A Nuclear (em)Powered Middle East: Why the United States Cannot Afford a Counterterror Only Approach to the Region