Press
Showing 1041-1060 of 1160 Items
-
National Security Human Capital Program / Technology & National Security
#Disrupt the PentagonSenior Fellow Ben FitzGerald discusses how the Pentagon approaches technology development....
By Ben FitzGerald
-
Defense / Technology & National Security
Who, What, Why: What is a defensive weapon?20YY Warfare Initiative Director weighs in on defensive weaponry. ...
By Paul Scharre
-
Technology & National Security
Why some privacy advocates are skeptical about Obama's new NSA guidelinesSenior Fellow Ben FitzGerald weighs in on the President’s new NSA guidelines...
By Ben FitzGerald
-
Defense / National Security Human Capital Program / Middle East Security / Technology & National Security
White House Wants More Reaper Drones To Fight ISIS20YY Warfare Initiative Director Paul Scharre discusses a need for change in Pentagon priorities. ...
By Paul Scharre
-
Defense / Technology & National Security
The US Military Is Building Gangs of Autonomous Flying War BotsDefense One's Patrick Tucker cites 20YY Warfare Initiative Director Paul Scharre discussing autonomy in the use of force....
By Paul Scharre
-
Defense / Technology & National Security
The A.I. Wars?Slate's Adam Elkus cites a report by 20YY Warfare Initiative Director Paul Scharre while discussing the potential use of artificial intelligence in security and geopolitics....
By Paul Scharre
-
Technology & National Security
Centcom Twitter hack and the rewards of digital vandalism (+video)Senior Fellow Ben FitzGerald weighs in on CENTCOM social media hack....
By Ben FitzGerald
-
Defense / Technology & National Security
Exosuits Could Save Factory Workers from Losing Their Jobs to RobotsVice discusses the report, "Between Iron and and Aqua Man: Exosuit Opportunities in Maritime Operations."...
By Andrew Herr
-
Technology & National Security
Military exosuits have unrecognized potential at sea, report findsThe Washington Post discusses the recent CNAS report "Between Iron Man and Aqua Man: Exosuit Opportunities in Maritime Operations."...
-
Technology & National Security
Pentagon: Hacking of CENTCOM Social Media a "Prank"Senior Fellow Ben FitzGerald weighs in on CENTCOM social media hack....
By Ben FitzGerald
-
Technology & National Security
In Twitter hack, Pentagon learns perils of social media exposureSenior Fellow Ben FitzGerald weighs in on CENTCOM social media hack....
By Ben FitzGerald
-
Defense / Technology & National Security
The Very Real Future of Iron Man Suits for the NavyDefense News' Patrick Tucker examines exosuit development and opportunities and maritimes operations and reviews a new report authored by Lt. Scott Cheney-Peters and Mind Plus...
By Andrew Herr & Lt. Scott Cheney-Peters
-
Technology & National Security
CNAS Press Note: Why the CENTCOM Hack is – and Isn’t – a Big DealIn response to reports that an ISIS affiliated group had taken over CENTCOM’s Twitter and YouTube accounts, Center for a New American Security (CNAS), Technology and National ...
By Ben FitzGerald
-
Defense / Indo-Pacific Security / Technology & National Security
North Korea’s growing hacker army, stout cyberdefenses hinder U.S. response to Sony breachAsia-Pacific Security Director Patrick Cronin discusses North Korea's internally controlled “intranet” used by its military and intelligence community....
By Patrick M. Cronin
-
Defense / Indo-Pacific Security / Technology & National Security
University in Xi’an Opens School of CyberengineeringNorman R. Augustine Research Associate Amy Chang believes the new school will foster greater thought leadership and innovation on an issue that has traditionally been understu...
By Amy Chang
-
Defense / Technology & National Security
Here’s What To Expect in National Security in 201520YY Warfare Initiative Director Paul Scharre discusses UCLASS in a Defense One article looking into 2015....
By Paul Scharre
-
Defense / Technology & National Security
PODCAST: Spitballing Offset StrategyCNAS staff sits down with War on the Rocks to to discuss offset strategies....
By Amy Chang, Ben FitzGerald, Elbridge Colby, Paul Scharre, Shawn Brimley & Van Jackson
-
Defense / Indo-Pacific Security / Technology & National Security
North Korea Emerges as Cyber-Hacker PowerAsia-Pacific Security Director Patrick Cronin discusses exchanges between the United States and North Korea on threats and counter-threats in the aftermath of the hacking of S...
By Patrick M. Cronin
-
Defense / Indo-Pacific Security / Technology & National Security
China and U.S. grapple over red lines for cyberattacksNorman R. Augustine Research Associate Amy Chang weighs in on China's "tangled cybersecurity strategy."...
By Amy Chang
-
Defense / Indo-Pacific Security / Technology & National Security
Why cyber warfare is so attractive to small nationsNorman R. Augustine Research Associate Amy Chang poses potential reasons why cyber warfare would rank higher in priority than conventional weapons for smaller countries....
By Amy Chang