Ben Buchanan

@BuchananBen

Faculty at and Senior Fellow at . Author of THE HACKER AND THE STATE and THE CYBERSECURITY DILEMMA:

Vrijeme pridruživanja: listopad 2010.

Tweetovi

Blokirali ste korisnika/cu @BuchananBen

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @BuchananBen

  1. Prikvačeni tweet
    23. sij

    The first copies of my book The Hacker and the State are hot off the presses! My thanks to , David Petraeus, Lisa Monaco, , and Richard Harknett for their kind blurbs. The book is out in February and available for preorder now:

    Poništi
  2. proslijedio/la je Tweet
    31. sij

    Since I’m in Washington, today’s *Pitch Fit Friday* message is a special call to the policy, analyst, practitioner community (U.S. & abroad)! Don’t be shy to pitch. Don’t be shy to ask to review. The journal is for *good work* - being an “academic” has never been a criteria.

    Poništi
  3. 16. sij

    This is a fascinating piece by on the revolution in missile accuracy, as proven by the events of the last few weeks.

    Poništi
  4. 14. sij

    This is a fun article and a great idea by the inimitable ⁦⁩ on how to use one year’s reading to fertilize the next. Life is too short for bad books.

    Poništi
  5. 7. sij

    Come work with us! At ⁦⁩, we’re hiring a fellow for our new CyberAI project. If the Venn diagram of cybersecurity, AI, and geopolitics is your happy place and cutting through hype to find facts is your goal, then please apply.

    Poništi
  6. proslijedio/la je Tweet
    6. sij

    I'll be discussing the 2019 report today - tune-in if you have a fearsome appetite for data on AI, as well as perspectives on intricacies of gathering the data, and also discussions of what the data _doesn't_ or _can't_ tell us

    Prikaži ovu nit
    Poništi
  7. 3. sij

    My thanks to ⁦⁩ for his kind coverage of my upcoming book, The Hacker and the State. It’s exciting to release the book at a moment when cyber operations seem more poised than ever to shape international affairs—for better or for worse.

    Poništi
  8. proslijedio/la je Tweet
    17. pro 2019.

    I’m very excited that, after more than half a year of work, we just published our new report: “Keeping Top AI Talent in the United States” It asks (1) how many int'l AI grad students stay in the US?, and (2) how can the US increase that number? Here’s what we found. [1/x]

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet

    Artificial intelligence has the potential to “speed up the cat-and-mouse game between offense and defense that has long been the driving dynamic of cyber operations,” says . Don’t miss his interview on ’s :

    Poništi
  10. 5. pro 2019.
    Poništi
  11. 25. stu 2019.

    It’s fine to be five years late to a story if you add context and perspective, but to be five years late and dead wrong is just absurd. Attribution is possible—as the Sony case demonstrates—and to cast doubt on that is simply an insult to the facts and to fact-finding.

    Poništi
  12. 21. stu 2019.

    This is so true. Today was remarkable. Kudos to and all who organized it.

    Poništi
  13. 21. stu 2019.

    I’m thrilled is growing to focus on the intersection of AI, cybersecurity and geopolitics. There’s a ton of hype here, but also a lot of important issues. The $2 million grant from the will enable us to separate fact from fiction. Much more to come!

    Poništi
  14. 8. stu 2019.

    This is a truly remarkable accomplishment. I am so glad to have been a small voice in the series.

    Poništi
  15. 7. stu 2019.
    Poništi
  16. 7. stu 2019.

    This is probably the most significant technical trend in AI that’s directly relevant to capability and strategy, and yet receives almost no policy attention. It seems it’s more alluring to focus on “data is the new oil” than on the seismic shifts in compute.

    Poništi
  17. 2. stu 2019.

    I hope the book reframes how we see hacking. It rebuts too-easy and too-common analogies, like those to nuclear and conventional weapons. It shows how familiar theories like deterrence fail. Instead, it explores the most important hacks and distills what they mean for geopolitics

    Prikaži ovu nit
    Poništi
  18. 2. stu 2019.

    The third part of the book focuses on hacks with even broader effects. We synthesize Russia’s election interference. Then we go deep on maybe the most mysterious case of all, the Shadow Brokers, before closing with North Korea’s insidious bank hacking and NotPetya’s sheer power.

    Prikaži ovu nit
    Poništi
  19. 2. stu 2019.

    We then move to attack, considering hacks like Stuxnet, Shamoon, Sands, and Sony, as well as looking at the 2015 and 2016 blackouts in Ukraine. Even if you’re familiar with these cases already, there is some new analysis here of their operational execution and strategic effects.

    Prikaži ovu nit
    Poništi
  20. 2. stu 2019.

    The book is a narrative history of the last two decades of cyber operations, with broader analysis of what they mean for geopolitics. We begin with espionage, with stories of fiber-optic cable taps, secret encryption backdoors, massive database hacks, and counterintelligence.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·