What Happens When Personal Information Gets Weaponized

The Government Needs Data to Protect Infrastructure, Without Imperiling Privacy

Michael Greenberger is a professor at the University of Maryland Carey School of Law and the founder and director of the University of Maryland Center for Health and Homeland Security. The following is an edited version of a phone interview with him about data collection in the age of cyberwarfare.

When you’re talking about information that can be used, or useful, in conducting cyberwarfare, that type of data is different from the conventional identification data, which when released is an invasion of a person’s privacy, or could be used in a …

More In: Cybersecurity

As Machines Wage War, Human Nature Endures

Fear, Honor, and Self-Interest Are Still the Wellsprings of Conflict

Over the past quarter century, the information technology revolution has transformed relations between people and between states, including in the conduct of warfare.

For the U.S. military, the manifestations of this …

In San Diego, Building a Cybersecurity State Is Good Business

How Cities Can Incubate the Next Generation of Digital Warriors

When I joined the Navy in 1970, the projection of Naval sea power was all about strategies to deploy Marines, ships, submarines, and aircraft above, below, and on the sea. …

To Understand the Future of Cyber Power, Look to the Past of Air Power

When Technological Fantasy Becomes Reality, Every Civilian Is a Target

Approximately 75 years ago, a new technology was married to warfare on a mass scale, and its impact spilled across continents, shaping the fighting of wars and international politics while raising a new set …

Why It’s So Hard to Stop a Cyberattack—and Even Harder to Fight Back

Evasive Culprits and Unclear Intentions Risk Escalation and Retaliation

Imagine that the United States is hit by a cyberattack that takes down much of the U.S. financial infrastructure for several days. Internet sites of major banks are malfunctioning. ATMs …

Just Because the RNC Says It Wasn’t Hacked Doesn’t Change Reality

When a Party Leader Implausibly Denies a Data Breach, We All Lose

Cybersecurity professionals are fond of saying that there are two kinds of companies: those that have been hacked and those that don’t yet know they’ve been hacked. Right now, the …