The Cybercom 2.0 initiative to improve cyber force generation does not preclude establishing a Cyber Force—it can lay the groundwork for one. In recent remarks, Rep. Pat Fallon (R-Texas) reflected on the dire…
The Cybercom 2.0 initiative to improve cyber force generation does not preclude establishing a Cyber Force—it can lay the groundwork for one. In recent remarks, Rep. Pat Fallon (R-Texas) reflected on the dire…
On a Saturday morning, you head to the hardware store. Your neighbors’ Ring cameras film your walk to the car. Your car’s sensors, cameras and microphones record your speed, how you drive,…
Imposing a duty on AI firms to protect or warn users could bring valuable clarity to today’s uncertain AI liability landscape. OpenAI recently disclosed that it was aware of concerning behavior by one…
The U.S. Department of War’s rapid integration of artificial intelligence (AI) must account for how AI is reshaping the chemical, biological, radiological, and nuclear (CBRN) risk landscape to strengthen decision advantage, enhance…
New verification tools could make AI governance credible without requiring states or firms to expose their secrets. Whether you’re checking that a child has brushed their teeth or that your nuclear-armed foe…
The U.S. Restricted Data Transfers Abroad. Cast as an Assertion of Sovereignty, the New Posture Signals Weakness in Great-Power Competition. For most of the internet era, the United States has preached the…
Technology companies cite security risks to push back against antitrust regulation. Are these real risks or just efforts to evade regulation? The recent introduction of the Digital Markets Act in the European Union kicked…
A cable endorsing a social media platform by name as a tool of U.S. diplomacy and military psychological operations would have been unthinkable—until recently. Secretary of State Marco Rubio signed a cable this week…
Privatized cyberwar will complicate oversight, create counterintelligence risks, fuel arms races and insecurity, and put civilians at risk. On March 6, the Trump administration published its long-awaited cyberstrategy. Among its themes is a conspicuously…