Reacting to the U.S. Nuclear Posture Review, which now tries to extend nuclear deterrence to cyberspace.
John Arquilla From BLOG@CACM | February 23, 2018 at 03:24 PM
Cyberwar is not simply a lineal descendant of strategic air power; rather, it is the next face of battle.
John Arquilla From BLOG@CACM | September 25, 2017 at 11:43 AM
Policies and strategies that may lead to or initiate acts of cyberwar should be subject to scrutiny.
John Arquilla From BLOG@CACM | June 13, 2017 at 10:28 AM
Some of the prevailing theories of ethics surface in modern high tech. We take a quick and rather superficial look at their tracks on the ground, noting especially...Robin K. Hill From BLOG@CACM | March 16, 2017 at 10:28 AM
Facebook, for the sake of its own business integrity and for the sake of the public, should give up any attempt to guarantee veracity in items posted by users.Robin K. Hill From BLOG@CACM | February 26, 2017 at 10:27 PM
Despite more than two decades of consistent public warnings that have reached the highest levels of government, cybersecurity throughout much of the world is in...John Arquilla From BLOG@CACM | December 19, 2016 at 02:24 PM
As forecasters attempt to understand exactly what happened in the 2016 U.S. presidential election, the data itself may hold vital clues.
Sheldon H. Jacobson, Jason J. Sauppe, and Steven E. Rigdon From BLOG@CACM | December 2, 2016 at 01:21 PM
Researchers should not treat practitioners as mere objects of their studies or simple sources of data, but work towards creating research partnerships with practitioners...Zeljko Obrenovic From BLOG@CACM | November 1, 2016 at 10:56 AM
Cybersecurity is integral in nature in a very connected world; the insecurity of some contributes to the vulnerability of all.John Arquilla From BLOG@CACM | August 2, 2016 at 09:53 AM
Wendy Powley and Gloria Childress Townsend report on the National Center for Women & IT Annual Summit, themed "making the world fair and just." Wendy Powley and Gloria Childress Townsend From BLOG@CACM | May 24, 2016 at 09:46 AM
The vast majority of computer and network security experts agree that there is currently no way to adequately secure an online public election.David Jefferson and Barbara Simons From BLOG@CACM | February 24, 2016 at 09:29 AM
Achieving the President's goal of CS for All requires change at the local level. Here's the current state of the states.Mark Guzdial From BLOG@CACM | February 24, 2016 at 03:41 PM
Efforts to understand how advanced information technologies will affect future conflicts seem to be missing, or are taking place far from the public eye.John Arquilla From BLOG@CACM | January 15, 2016 at 04:00 PM
The potential for a Sino-American cyber arms control agreement is intriguing, despite three very troubling flaws.
John Arquilla From BLOG@CACM | October 2, 2015 at 10:21 AM
In the 70 years since the end of World War II, AI has advanced enormously, and the military has continued to show a steady appetite for acquiring lethal robots....John Arquilla From BLOG@CACM | May 1, 2015 at 03:22 PM
An election in Australia is the latest instance of discovering a security flaw in an online voting system, while it is being used.Duncan A. Buell From BLOG@CACM | April 2, 2015 at 03:34 PM