The challenge of technology is that it does not standstill. Security institutions have had to adapt to everything from the moat to the printing press to the machine gun to the tank to the nuclear bomb. While nation-states have yet to initiate declared hostilities through cyberspace, adversaries flourish in the “gray space” below the level of outright conflict and appear undeterred in pursuing their goals. Foreign governments and non-state actors hack electric grid; they spread propaganda; they conduct targeted influence operations to foment mistrust. What new technologies are coming down the line to threaten our security, and how should our security institutions adapt? In this episode Jonathan and DJ talk to two of the world’s leading thinkers on the proliferation of online weapons – Richard Danzig, author, former Secretary of the Navy in the Clinton administration and Senior Fellow at Johns Hopkins Applied Physics Laboratory, and Kara Frederick, writer and Associate Fellow at the Center for a New American Security and a former intelligence professional and Facebook threat analyst.
Listen to the full conversation on Illumio's Beyond the Breach.
More from CNAS
CommentaryThe China Challenge
The United States and China are strategic competitors, and technology is at the center of this competition, critical to economic strength and national security. The United Sta...
By Martijn Rasser, Elizabeth Rosenberg & Paul Scharre
CommentaryBeyond the Trade War
In an essay for Foreign Affairs, Ely Ratner, Elizabeth Rosenberg, and Paul Scharre write that "the United States needs a fundamentally different approach to economic competiti...
By Ely Ratner, Elizabeth Rosenberg & Paul Scharre
ReportsThe American AI Century: A Blueprint for Action
This is a preview of the forthcoming report American AI Century. The full study, which contains in-depth analysis of the issues and details of the corresponding policy recomme...
By Martijn Rasser, Megan Lamberth, Ainikki Riikonen, Chelsea Guo, Michael Horowitz & Paul Scharre
CommentaryUpending the 5G Status Quo with Open Architecture
This article is adapted in part from written testimony the author submitted to the Joint Committee on the National Security Strategy of the Parliament of the United Kingdom. ...
By Martijn Rasser