Mapping a face is the starting point.
Using computers to identify people's faces can be helpful as well as worrisome. To properly understand the legal and privacy ramifications, we need to know how facial recognition technology works.
The prime minister has linked continued security cooperation with the EU to a successful trade deal. Was that wise?
Even when a response goes to plan, lessons can be learnt.
Armed police outside Westminster as the attack unfolded on March 22.
Stefan Rousseau/PA Wire
In recent years, anti-terrorism defences have become more subtle. That might be about to change.
An Afghan militia vehicle on the outskirts of Kunduz, in October 2016.
Bahsir Khan Safi/AFP
Under the Obama administration, the US army began to recruit, arm, and finance local militias to fight the Taliban. With Trump in the White House, what remains of this strategy?
A North Korean ballistic rocket launching drill, undated photo.
REUTERS/ North Korea's Korean Central News Agency (KCNA)
Tensions in Asia may soon boil over. If U.S. leaders fail to seek pathways to peace, the consequences may be grim, warns former National Security Council member.
Phishing for information and money.
You know it's a serious problem when even Google and Paypal have been targeted.
What do you do if a border official asks for your phone PIN?
Following reports of travellers to the US being forced to unlock their phones for border officials, here are some steps you can take to prevent your personal data from being exposed.
START Global Terrorism Database Terrorist Attacks Concentration Intensity Map.
University of Maryland
President Trump has asserted that media coverage of terrorist attacks under-represents their actual extent. Analysis of 50 years of news coverage answers this question, and raises others.
Foreign Minister Adel al-Jubeir will likely intensify the Washington charm offensive and continue to stress Saudi Arabia’s indispensability to regional security and terrorism matters.
This year will continue to be a period of great uncertainty in Saudi Arabia. After a deterioration of relations with the United States under President Obama, the kingdom will be focused on strengthening…
An insider can bypass many layers of security.
Los Alamos National Laboratory
Basic safeguards are not enough to protect against insider threats. It requires rethinking how to overcome the biases that cause us to dismiss the danger.
It’s not always obvious where a new technology will end up.
NIH Image Gallery
A scientific breakthrough in a vacuum may be free of ethical implications. But many developments can be used for good or evil, or both. There's a fine balance on what to control and to what extent.
Anger at Trump’s immigration controls continues to spread.
Trump has pointed the finger at Obama for creating the list of seven countries in his new travel ban.
Protesters gather on the National Mall for the Women’s March on Washington during the first full day of Donald Trump’s presidency.
John Minchillo/AP Photo
Inaugural weekends are snapshots of the cultural and political zeitgeist. How did this year's compare to those from 2009 and 2005?
On his way to the White House, Jan. 20, 2017.
AP Photo/Andrew Harnik
Is Trump correct in asserting that NATO has outlived its utility? Or that NATO’s members enjoy a 'free ride' on the back of the US? A political scientist examines the evidence.
Private security companies can help in family violence situations, but questions remain.
Initial experience indicates that private security companies can provide a beneficial service to victims of family violence, but there are still concerns that need to be addressed.
Business executives need to pay more attention to the information they are protecting.
Instead of relying on cyber insurance to protect businesses against the damages of attacks, executives should get to know the information they are protecting.
Crime is declining, but people are getting more and more defensive about their homes.
The dark web is often used for illegal activity and because of the way it's structured, it's hard to police.
Open-source code can be a literal lifesaver.
When lives are at stake, there's no time for secrecy. Just publish the code.