Top security officials called China one of the greatest global threats to the U.S. economy and national security.
The millions of dots on the map trace highways, side streets and bike trails — each one following the path of an anonymous cellphone user.
One path tracks someone from a home outside Newark to a nearby Planned Parenthood, remaining there for more than an hour. Another represents a person who travels with the mayor of New York during the day and returns to Long Island at night.
Rather than continuing to politicize encryption, instead the lessons learned from the decades-long crypto policy debate should be used to inform the process of developing Exceptional Access
What should a course on cybersecurity law and policy actually cover? I’ve been developing an “open source” syllabus with support from the Hewlett Foundation, and last spring I posted the initial
His specialty is secrecy, yet his warning was blunt.
In his second public speech in more than four years, the head of the British intelligence service said that a fourth industrial revolution is blurring the lines between the physical, digital and biological domains, a change that could present a “potentially existential challenge” to liberal democracies.
Who hacked it? And the ground crew confusion.
In terms of glitchy behavior, we’re not quite at HAL 9000 levels just quite yet—but during the debut demonstration of the International Space Station’s new AI-powered robot, CIMON, the free-floating device displayed some rather questionable behavior.