It’s not just about putting on a fake mustache. Disguise is about changing the way you carry yourself.
Top security officials called China one of the greatest global threats to the U.S. economy and national security.
Rather than continuing to politicize encryption, instead the lessons learned from the decades-long crypto policy debate should be used to inform the process of developing Exceptional Access
Mike Judge’s 1999 satire Office Space parodies turn-of-the-century white-collar office work at a fictional software company called Initech. In an iconic scene, corporate management consultants referred to as “the Bobs” interview Initech personnel in a search for “efficiencies.” When they sit down with Tom, a middle-aged employee who works in customer management, the meeting quickly devolves into absurdity.
Simply admitting that existing operational planning methodology and doctrine are not applicable for complex strategic problem sets is a crucial first step. Once we break this paradigm, military strategists will be empowered to design new and better paradigms, yielding novel methods to more appropriately meet our nation’s strategic needs.
Who hacked it? And the ground crew confusion.
In terms of glitchy behavior, we’re not quite at HAL 9000 levels just quite yet—but during the debut demonstration of the International Space Station’s new AI-powered robot, CIMON, the free-floating device displayed some rather questionable behavior.
The security community should its time and talents making the digital world safer rather than demolishing what trust and security still remain in our technology, our devices, and our infrastructure.
Announcing the latest edition of the Aegis Paper Series from the Hoover Institution