What Happens When Personal Information Gets Weaponized

The Government Needs Data to Protect Infrastructure, Without Imperiling Privacy

Michael Greenberger is a professor at the University of Maryland Carey School of Law and the founder and director of the University of Maryland Center for Health and Homeland Security. The following is an edited version of a phone interview with him about data collection in the age of cyberwarfare.

When you’re talking about information that can be used, or useful, in conducting cyberwarfare, that type of data is different from the conventional identification data, which when released is an invasion of a person’s privacy, or could be used in a …

More In: what does war look like in the cyber age?

As Machines Wage War, Human Nature Endures

Fear, Honor, and Self-Interest Are Still the Wellsprings of Conflict

Over the past quarter century, the information technology revolution has transformed relations between people and between states, including in the conduct of warfare.

For the U.S. military, the manifestations of this …

In San Diego, Building a Cybersecurity State Is Good Business

How Cities Can Incubate the Next Generation of Digital Warriors

When I joined the Navy in 1970, the projection of Naval sea power was all about strategies to deploy Marines, ships, submarines, and aircraft above, below, and on the sea. …

Is the Cyber Era the New Cold War?

Both Are Elusive and Shadowy, with No Clear Endgame

So-called cyberwarfare has blurred the boundaries of what war is, raising profound questions about how the U.S. should respond to attacks that occur online and in information networks. This was …

To Understand the Future of Cyber Power, Look to the Past of Air Power

When Technological Fantasy Becomes Reality, Every Civilian Is a Target

Approximately 75 years ago, a new technology was married to warfare on a mass scale, and its impact spilled across continents, shaping the fighting of wars and international politics while raising a new set …