A new report claims that Russian hackers altered dates in stolen documents to frame the DNC staffer for the theft.
Absent a clear understanding of which military problems emergent technologies are required to solve, there is, perhaps, too much confidence in their ability to reshape the character of the next war by enabling decisive battlefield advantage. More troublingly, predictions about machine-dominated warfare risk obscuring the human cost implicit in the use of violence to achieve a political objective.
Interconnectedness has allowed society to take great leaps forward, social media and the internet remain an ungoverned space for nefarious actors. Violent extremist organizations, criminal groups, and state actors have all taken advantage of the anonymity and access afforded by modern technology to
Piecemeal attempts to isolate, assess and address information sharing efforts could have unintended repercussions on the web of trusted communication of threats at work today.
Here are a few concrete ways to get this alliance’s vibrant commercial technology sectors to address common national-security concerns.
Some of the tech giants have partnered up to allow easier information sharing between their platforms.
Zimbabwe is signing up for China’s surveillance state, but its citizens will pay the price.
False news spreads online faster, farther, and deeper than truth does — but it can be contained. Here’s how.
Source: Truth, Disrupted
“A little editing never hurt anyone/no one”
I had no idea the had a “motherhood” document! Estimative is obscure enough “but eyes fasten on this passage”?
“This dreary computerese infects …”
So much literary talent gathering dust in classified warehouses.
The human experience is complex, language can only do so much to convey its intricacies, and in some situations, just what would and wouldn’t be considered unforgivable can be determined by just one word. Few government entities understood this better than a post-Church Committee Central Intelligence Agency.
Election officials have insisted that machines can’t be remotely compromised because they’re not “connected to the internet.” But security experts point out crucial ways in which they are.