Cyber Security

Can DoD Develop Effective Cyber Deterrents?

While the Pentagon’s 2015 Cyber Strategy emphasizes the importance of effective cyber deterrence, the U.S. has yet to develop a clear deterrent policy that would raise the stakes for adversaries and dissuade them from considering on how it will respond to cyber attacks on critical national infrastructure.

Read More

What’s New

What We’re Reading

Census Announces Test Plans for 2017, 2018

The Census Bureau will forge ahead with its plans to tally and mark addresses in fiscal 2017 and with its 2018 tests to ensure that new technologies and methodologies are ready for the decennial census in 2020.

Laying the Foundation for a More Secure, Modern Government

America’s spirit of ingenuity and entrepreneurship created the world’s most innovative economy and keeps us dominant in today’s digital age. Indeed, in 1985 about 2,000 people used the Internet; today, 3.2 billion people do. What started out as a useful tool for a few is now a necessity for all of us—as essential for connecting people, goods, and services as the airplane or automobile.

The NSA Chief Has A Phone For Top-Secret Messaging. Here’s How It Works

There’s no such thing as a perfectly secure phone, especially if it also connects to the internet. But leaving your phone on the plane every time you visit a hostile foreign country isn’t an option for everyone, and so a handful of top military commanders now have a device that can send and receive Secret and Top Secret messages. No surprise: it doesn’t work quite like the one in your pocket.

Army Releases New Cyber, EW Field Manual

The Army is getting up-to-date on cyber and electromagnetic activity policies, finally releasing the long-anticipated updated field manual for cyber and EW functions. The document, titled FM 3-12 “Cyberspace and Electronic Warfare Operations,” and dated for mid-April, though publicly released within the last week, replaces FM 3-38, which provided the initial guidance back in 2014.