The auditor that oversees reconstruction in Afghanistan expressed concern about the capability and long-term sustainability of the Afghan National Defense and Security Forces, which the United States has spent $62.5 billion to build over the last 13 years.
The Defense Department acquisition process has become burdensome, leaving the Army behind in technology development, said Heidi Shyu, assistant secretary of the army for acquisition, logistics and technology at an April 21 Center for Strategic and International Studies event.
The ACLU has called for rules that limit law enforcement agencies' use of drones when collecting evidence of wrongdoing, for emergencies or other uses where there's no reason to think it would invade privacy.
In response to the increase in cyber threats' frequency and complexity, a new report makes 11 recommendations for shoring up security while protecting privacy through information sharing.
While a reported cyber attack on a German industrial plant last year may not have risen to the level that the damaging Stuxnet computer worm could have inflicted, a well-regarded Washington, D.C., cybersecurity expert said it was pretty close.
The massive, monolithic technology platforms upon which U.S. defense systems rely are inflexible, increasingly difficult to manage and hostile to advances in technology, said the director of the Defense Advanced Research Projects Agency. They're also vulnerable to malicious actors, said DARPA Director Arati Prabhakar during a Nov. 12 event hosted by the Center for Strategic and International Studies.
More than 98 percent of mobile cyber threats target Android mobile device users, with about 175,000 new unique malicious programs detected in the first half of 2014 alone, according to a new joint Kaspersky Lab and Interpol report released Oct. 6.
Representatives from 175 countries will discuss topics such as Internet governance, online security and privacy, and the Internet of Things, as the United Nations' International Telecommunications Union, or ITU, kicked off three weeks of meetings Oct. 20 in Busan, South Korea.
Homeland Security Secretary Jeh Johnson said he's worried about foreign fighters, who go overseas to join terrorist groups, learn how to fight and return to carry out potential attacks, as well as the domestic-based "lone wolf" attacks inspired by such groups.
Federal regulatory agencies are taking on a greater advisory role in helping critical infrastructure and financial services companies apply the National Institute of Standards and Technology's cybersecurity framework and reduce their cyber risks, several experts recently said.