Society is now in an era in which climate change and cyber insecurity are regular threats to life and property. In tandem, the two have the potential to be especially deadly. “There’s…
Quantum computers, which can solve several complex problems exponentially faster than classical computers, are expected to improve artificial intelligence (AI) applications deployed in devices like autonomous vehicles; however, just like their predecessors,…
Entering a website and accepting cookies is a very common and oft-repeated gesture when navigating the Internet. But this small action, which is often done automatically and without thought, entails security risks:…
The bill provides the government with certain novel surveillance and remote interference authorities. On Dec. 11, 2023 the Israeli Ministry of Justice published a draft bill to amend the Israel Security Agency (ISA) Law,…
The process significantly neglects the role of governments in proliferation of these capabilities. Editor’s Note: One of the authors was invited by the U.K. Foreign, Commonwealth & Development Office to comment on the…
Why the cyberattack is a sobering example of the U.S. health care system’s vulnerability to cybercrime and what it means for hospitals, policymakers, regulators, and insurers. It’s been a rough few weeks…
The FBI’s recent operations against Volt Typhoon and Fancy Bear botnets are a cybersecurity success, but the government’s legal theory has frightening implications. The U.S. government has recently managed to make life…
New warrants for Russian military officials are notable for their recognition of the grave civilian harm caused by the destruction of critical energy infrastructure. Last March, the International Criminal Court (ICC) issued arrest…
What are the potential risks associated with artificial intelligence? Might any of these be catastrophic or even existential? And as momentum builds toward boundless applications of this technology, how might humanity reduce AI risk…
The recent Chinese cyber intrusion highlights the need for a reexamination of U.S. cybersecurity strategy. The Volt Typhoon cyber intrusion into U.S. critical infrastructure is troubling on many levels. The most significant,…