How Russian Hackers Amplified the Seth Rich Conspiracy Until it Reached Donald Trump and the CIA

A new report claims that Russian hackers altered dates in stolen documents to frame the DNC staffer for the theft.

Source: How Russian Hackers Amplified the Seth Rich Conspiracy Until it Reached Donald Trump and the CIA

Advertisements

Emergent Technology, Military Advantage, and the Character of Future War

Absent a clear understanding of which military problems emergent technologies are required to solve, there is, perhaps, too much confidence in their ability to reshape the character of the next war by enabling decisive battlefield advantage. More troublingly, predictions about machine-dominated warfare risk obscuring the human cost implicit in the use of violence to achieve a political objective.

Source: Emergent Technology, Military Advantage, and the Character of Future War

The Unrealized Value of Open Source Intelligence for Irregular Warfare

Interconnectedness has allowed society to take great leaps forward, social media and the internet remain an ungoverned space for nefarious actors. Violent extremist organizations, criminal groups, and state actors have all taken advantage of the anonymity and access afforded by modern technology to

Source: The Unrealized Value of Open Source Intelligence for Irregular Warfare

How the Five Eyes Can Harness Commercial Innovation

Here are a few concrete ways to get this alliance’s vibrant commercial technology sectors to address common national-security concerns.

Source: How the Five Eyes Can Harness Commercial Innovation

The power of polish, according to the CIA

“A little editing never hurt anyone/no one”

I had no idea the had a “motherhood” document! Estimative is obscure enough “but eyes fasten on this passage”?

“This dreary computerese infects …”

So much literary talent gathering dust in classified warehouses. 

The human experience is complex, language can only do so much to convey its intricacies, and in some situations, just what would and wouldn’t be considered unforgivable can be determined by just one word. Few government entities understood this better than a post-Church Committee Central Intelligence Agency.

Source: The power of polish, according to the CIA

The Myth of the Hacker-Proof Voting Machine

Election officials have insisted that machines can’t be remotely compromised because they’re not “connected to the internet.” But security experts point out crucial ways in which they are.

Source: The Myth of the Hacker-Proof Voting Machine