Press
Showing 1081-1100 of 1198 Items
-
Technology & National Security
Why some privacy advocates are skeptical about Obama's new NSA guidelinesSenior Fellow Ben FitzGerald weighs in on the President’s new NSA guidelines...
By Ben FitzGerald
-
Defense / National Security Human Capital Program / Middle East Security / Technology & National Security
White House Wants More Reaper Drones To Fight ISIS20YY Warfare Initiative Director Paul Scharre discusses a need for change in Pentagon priorities. ...
By Paul Scharre
-
Defense / Technology & National Security
The US Military Is Building Gangs of Autonomous Flying War BotsDefense One's Patrick Tucker cites 20YY Warfare Initiative Director Paul Scharre discussing autonomy in the use of force....
By Paul Scharre
-
Defense / Technology & National Security
The A.I. Wars?Slate's Adam Elkus cites a report by 20YY Warfare Initiative Director Paul Scharre while discussing the potential use of artificial intelligence in security and geopolitics....
By Paul Scharre
-
Technology & National Security
Centcom Twitter hack and the rewards of digital vandalism (+video)Senior Fellow Ben FitzGerald weighs in on CENTCOM social media hack....
By Ben FitzGerald
-
Defense / Technology & National Security
Exosuits Could Save Factory Workers from Losing Their Jobs to RobotsVice discusses the report, "Between Iron and and Aqua Man: Exosuit Opportunities in Maritime Operations."...
By Andrew Herr
-
Technology & National Security
Military exosuits have unrecognized potential at sea, report findsThe Washington Post discusses the recent CNAS report "Between Iron Man and Aqua Man: Exosuit Opportunities in Maritime Operations."...
-
Technology & National Security
In Twitter hack, Pentagon learns perils of social media exposureSenior Fellow Ben FitzGerald weighs in on CENTCOM social media hack....
By Ben FitzGerald
-
Technology & National Security
Pentagon: Hacking of CENTCOM Social Media a "Prank"Senior Fellow Ben FitzGerald weighs in on CENTCOM social media hack....
By Ben FitzGerald
-
Technology & National Security
CNAS Press Note: Why the CENTCOM Hack is – and Isn’t – a Big DealIn response to reports that an ISIS affiliated group had taken over CENTCOM’s Twitter and YouTube accounts, Center for a New American Security (CNAS), Technology and National ...
By Ben FitzGerald
-
Defense / Technology & National Security
The Very Real Future of Iron Man Suits for the NavyDefense News' Patrick Tucker examines exosuit development and opportunities and maritimes operations and reviews a new report authored by Lt. Scott Cheney-Peters and Mind Plus...
By Andrew Herr & Lt. Scott Cheney-Peters
-
Defense / Indo-Pacific Security / Technology & National Security
North Korea’s growing hacker army, stout cyberdefenses hinder U.S. response to Sony breachAsia-Pacific Security Director Patrick Cronin discusses North Korea's internally controlled “intranet” used by its military and intelligence community....
By Patrick M. Cronin
-
Defense / Indo-Pacific Security / Technology & National Security
University in Xi’an Opens School of CyberengineeringNorman R. Augustine Research Associate Amy Chang believes the new school will foster greater thought leadership and innovation on an issue that has traditionally been understu...
By Amy Chang
-
Defense / Technology & National Security
Here’s What To Expect in National Security in 201520YY Warfare Initiative Director Paul Scharre discusses UCLASS in a Defense One article looking into 2015....
By Paul Scharre
-
Defense / Technology & National Security
PODCAST: Spitballing Offset StrategyCNAS staff sits down with War on the Rocks to to discuss offset strategies....
By Amy Chang, Ben FitzGerald, Elbridge Colby, Paul Scharre, Shawn Brimley & Van Jackson
-
Defense / Indo-Pacific Security / Technology & National Security
North Korea Emerges as Cyber-Hacker PowerAsia-Pacific Security Director Patrick Cronin discusses exchanges between the United States and North Korea on threats and counter-threats in the aftermath of the hacking of S...
By Patrick M. Cronin
-
Defense / Indo-Pacific Security / Technology & National Security
China and U.S. grapple over red lines for cyberattacksNorman R. Augustine Research Associate Amy Chang weighs in on China's "tangled cybersecurity strategy."...
By Amy Chang
-
Defense / Indo-Pacific Security / Technology & National Security
Why cyber warfare is so attractive to small nationsNorman R. Augustine Research Associate Amy Chang poses potential reasons why cyber warfare would rank higher in priority than conventional weapons for smaller countries....
By Amy Chang
-
Defense / Indo-Pacific Security / Technology & National Security
Audio: Amy Chang on The John Batchelor ShowNorman R. Augustine Research Associate Amy Chang joins Francis Rose on The John Batchelor Show to discuss China's cybersecurity strategy....
By Amy Chang
-
Defense / Technology & National Security
Navy Tests Laser Weapon on Drones, BoatsDefense Strategies and Assessments Director Jerry Hendrix the U.S. Navy's testing of a new laser that will target drones and small boats in the Persian Gulf....
By Jerry Hendrix