Dan Coats, left, then director of national intelligence, told Congress in 2019 about the potential danger of a pandemic.
Office of the Director of National Intelligence
Warnings about major disease outbreaks are supposed to come from national and international medical intelligence and surveillance agencies that most Americans have never heard of.
Members of the military wearing U.S. Army Special Forces insignia block protesters near Lafayette Park and the White House on June 3, 2020.
Drew Angerer/Getty Images
There is a long line of military heroes who had the moral courage not to follow immoral orders. In the days ahead, some may have to consider what exactly their oath to the Constitution requires.
Seven hackers tied to the Iranian government were indicted for attempting to take over a New York dam’s control system.
Alex Wong/Getty Images
The Iranian military operates cyber espionage and sabotage through a network of dozens of contractors, allowing the state to attack foes while denying involvement.
More powerful computers could break today’s most advanced encryption.
Major advances in computing technology could break most modern encryption – but not for at least a few years.
Money is a crucial target for North Korea’s hacking efforts.
North Korea's cyber army is closely controlled by the ruling regime – a key difference from other countries' cyberattack and espionage groups.
The Iranian Cyber Army has taken over many websites.
Iranian cyberthreats come from independent hacker groups and from those suspected of having government ties. Their efforts may be part of a campaign to counterbalance other international powers.
What are Chinese hackers after in U.S. computer systems?
The cyberthreat from China is one more of espionage than destruction. And it's changing – perhaps even lessening.
Who’s inside the hoodie?
The Russian cyberthreat goes back over three decades, extends into the country's educational systems and criminal worlds, and shows no signs of letting up.
Can we reduce the likelihood of digital attacks?
Digital defense via shutterstock.com
For decades, deterrence has effectively countered the threat of nuclear weapons. Can we achieve similar results against cyber weapons?