The notion of nefarious scientists re-engineering the genetics of living organisms to then weaponize their new specimens has some researchers jostling for the upper hand, including those at the U.S. Defense Department’s main research agency.
Experts today trumpet the very same warnings voiced two years ago, when then Vice President Dick Cheney’s heart implant drew public attention and fervor to the mounting warnings of lax cybersecurity on wireless medical devices, some worn and some implanted inside the body.
It will not be long before adversaries narrow the superiority gap the United States holds over others in satellite technology. Rivals are unencumbered by bureaucratic stagnation and can rapidly leverage commercial technology for military use, according to one panelist speaking at the Satellite 2015 symposium in Washington D.C.
Look out social media aficionados—the FBI could be watching your every post. Well, maybe not every one, and maybe not of everyone. But as social media has become a recruitment tool for terrorists, the popular public platforms have become a new hub for law enforcement as they ramp use of automation technology to scour for actionable intelligence.
Cybersecurity is one of the critical homeland security priorities, along with the threats posed in the varying domains of aviation, border security and maritime, said the deputy secretary of the Department of Homeland Security.
Recruiting for a qualified military and civilian workforce for the U.S. Defense Department's cybersecurity mission has proven successful so far, but retaining the force remains to be seen, cyber commanders told Congress during a hearing.
The European Union faces the same formidable increase in cyber attacks as the United States—but comes up against issues compounded by disparate national laws and cybersecurity expertise, experts say. While technology might lead to some of the security lapses, humans certainly contribute to the problem.
Rapidly evolving commercial solutions are having a large effect on how the intelligence community collects, processes and analyzes data to gain improved strategic agility. Enhanced reactive and predictive awareness will allow the United States to engage with global partners successfully while out-maneuvering adversaries at home and abroad. But for this to work, the U.S. government must challenge the status quo, stop accepting incremental change and push a cultural shift in policy.
As cybersecurity defenses improve, so do the breaching tactics and methods by adversaries driven to hack into commercial and government networks. And they are doing so at alarming speeds, outpacing defense efforts.