The Next Big War Will Be Digital—and We’re Not Ready For It
In the 21st century the familiar form of warfare in which physical damage is meted out against the opponent’s military forces and infrastructure has become only one form of attack. Instead, states are increasingly launching non-lethal attacks against an enemy’s information systems – this is the rise of information warfare. Dan Kuehl of the National…
How Banks Use Machine Learning to Know a Crook’s Using Your Credit Card Details
You’re sitting at home minding your own business when you get a call from your credit card’s fraud detection unit asking if you’ve just made a purchase at a department store in your city. It wasn’t you who bought expensive electronics using your credit card – in fact, it’s been in your pocket all afternoon.…
What Police Can Learn From a Terrorist’s Discarded Mobile Phone
The dramatic raid on an apartment in the Paris suburb of Saint Denis that left two dead and eight arrested followed the discovery of a mobile phone by police that was discarded by the terrorists who days earlier had launched their bloody attack. It’s understood that the data police were able to extract from the…
It’s No Secret That the Government Uses Zero Days for “Offense”
Little by little, the government is opening up about its use of computer security vulnerabilities. Last month, the NSA disclosed that it has historically “released more than 91% of vulnerabilities discovered in products that have gone through our internal review process and that are made and used in the United States.” There should probably be…