Some revolutions change humanity for better, some for the worse, but they all share this: You don't know they've started when you're in them. On August 1, 1981, Buggles' "Video Killed the Radio Star" was the debut music video on the new Music Television Network, MTV. It was probably seen by less than 1,000 people that very day, but ask anyone under 50 now about music without video and you'll get a blank stare.
By: Jayson Ahern
Source: The Hill
The United States has worked tirelessly to protect our borders and ensure that another terrorist attack does not occur on U.S. soil. Our nation has committed billions of dollars in increased personnel, technology, and infrastructure for security by land, air, and sea. Yet, a massive gap remains that potentially threatens every citizen.
By: Mark Weatherford
Source: Washington Examiner
It's an unsettling scenario: An attack on the U.S. homeland in the form of an electromagnetic pulse - a massive blast from a high altitude (most likely nuclear) weapon intended to cripple our electrical control system infrastructures and the electronic devices we depend on. In this digital age, where electronic technology is prevalent in nearly all aspects of our daily lives, it's a threat that must be monitored closely - by government and industry leaders alike. As frightening as this doomsday scenario sounds, most experts consider it a low-likelihood event where consequences can vary significantly depending on how such a weapon is delivered.
By: Paul Rosenzweig
Some of the laws governing the process by which the federal government gains access to electronic data are nearly 30 years old. As a result, electronic evidence today is, effectively, accessible to the government by fiat at a time and place of its choosing, often without regard for who is holding the evidence or even where, on the vast globe of a connected Internet, the evidence is being stored.
By: Michael Chertoff
Source: USA Today
Across the world, hundreds of thousands of people are fleeing areas of war and civil unrest, entering European countries at alarming rates. In fact, according to a recent BBC report, since the start of 2015, nearly 340,000 migrants have been discovered crossing Europe’s external border, more than double the number from the same time period in 2014. This influx of immigrants presents not only a strain on European economies and resources, but also a possible security problem given justified concerns regarding the spread of terrorism and return of foreign fighters to recruit and carry out attacks.
By: Michael Chertoff
The singular characteristic that defines the cyber network is its universality. A web search in Germany works under exactly the same protocols as in Gabon. And it generally produces the same result. Information is seamlessly available on a global scale, to the betterment of all.
Source: Real Clear World
By: Michael Chertoff Mike McConnell & William Lynn
Source: Washington Post
More than three years ago, as former national security officials, we penned an op-ed to raise awareness among the public, the business community and Congress of the serious threat to the nation’s well being posed by the massive theft of intellectual property, technology and business information by the Chinese government through cyberexploitation. Today, we write again to raise the level of thinking and debate about ubiquitous encryption to protect information from exploitation.