Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @BuchananBen
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @BuchananBen
-
Prikvačeni tweet
The first copies of my book The Hacker and the State are hot off the presses! My thanks to
@vgcerf, David Petraeus, Lisa Monaco,@RidT, and Richard Harknett for their kind blurbs. The book is out in February and available for preorder now: https://www.amazon.com/Hacker-State-Attacks-Normal-Geopolitics/dp/0674987551/ref=mp_s_a_1_1?keywords=the+hacker+and+the+state&qid=1579748815&sprefix=the+hacker+and+the+&sr=8-1 …pic.twitter.com/6msFPrsNjY
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ben Buchanan proslijedio/la je Tweet
Since I’m in Washington, today’s *Pitch Fit Friday* message is a special call to the policy, analyst, practitioner community (U.S. & abroad)! Don’t be shy to pitch. Don’t be shy to ask to review. The journal is for *good work* - being an “academic” has never been a criteria.https://twitter.com/morganlkaplan/status/1223233040366948352 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
This is a fascinating piece by
@shashj on the revolution in missile accuracy, as proven by the events of the last few weeks.https://twitter.com/shashj/status/1217739541995573253 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
This is a fun article and a great idea by the inimitable
@Hilary_Hurd on how to use one year’s reading to fertilize the next. Life is too short for bad books.https://darlingmagazine.org/the-yearly-yeast/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Come work with us! At
@CSETGeorgetown, we’re hiring a fellow for our new CyberAI project. If the Venn diagram of cybersecurity, AI, and geopolitics is your happy place and cutting through hype to find facts is your goal, then please apply. https://cset.georgetown.edu/careers/Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ben Buchanan proslijedio/la je Tweet
I'll be discussing the 2019
@indexingai report today - tune-in if you have a fearsome appetite for data on AI, as well as perspectives on intricacies of gathering the data, and also discussions of what the data _doesn't_ or _can't_ tell ushttps://twitter.com/JamesMaguire/status/1214215143904595968 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
My thanks to
@HowellONeill for his kind coverage of my upcoming book, The Hacker and the State. It’s exciting to release the book at a moment when cyber operations seem more poised than ever to shape international affairs—for better or for worse.https://www.technologyreview.com/s/614974/hackers-will-be-the-weapon-of-choice-for-governments-in-2020/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ben Buchanan proslijedio/la je Tweet
I’m very excited that, after more than half a year of work, we just published our new report: “Keeping Top AI Talent in the United States” It asks (1) how many int'l AI grad students stay in the US?, and (2) how can the US increase that number? Here’s what we found. [1/x]pic.twitter.com/ijnHvoZuwX
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ben Buchanan proslijedio/la je Tweet
Artificial intelligence has the potential to “speed up the cat-and-mouse game between offense and defense that has long been the driving dynamic of cyber operations,” says
@BuchananBen. Don’t miss his interview on@FederalNewsNet’s@FederalDrive:http://federalnewsnetwork.com/federal-drive/2019/12/ai-could-enhance-cyber-threats-university-researchers-say/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Important piece from
@RidThttps://twitter.com/RidT/status/1202587936669212672 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
It’s fine to be five years late to a story if you add context and perspective, but to be five years late and dead wrong is just absurd. Attribution is possible—as the Sony case demonstrates—and to cast doubt on that is simply an insult to the facts and to fact-finding.https://twitter.com/THR/status/1198964619815112706 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
This is so true. Today was remarkable. Kudos to
@JohnHultquist and all who organized it.https://twitter.com/jckichen/status/1197718086754811905 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I’m thrilled
@CSETGeorgetown is growing to focus on the intersection of AI, cybersecurity and geopolitics. There’s a ton of hype here, but also a lot of important issues. The $2 million grant from the@Hewlett_Found will enable us to separate fact from fiction. Much more to come!https://twitter.com/CSETGeorgetown/status/1197582211043643392 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
This is a truly remarkable accomplishment. I am so glad to have been a small voice in the series.https://twitter.com/Susan_Hennessey/status/1192792247844126723 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
This is probably the most significant technical trend in AI that’s directly relevant to capability and strategy, and yet receives almost no policy attention. It seems it’s more alluring to focus on “data is the new oil” than on the seismic shifts in compute.https://twitter.com/OpenAI/status/1192481690741903360 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I hope the book reframes how we see hacking. It rebuts too-easy and too-common analogies, like those to nuclear and conventional weapons. It shows how familiar theories like deterrence fail. Instead, it explores the most important hacks and distills what they mean for geopolitics
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The third part of the book focuses on hacks with even broader effects. We synthesize Russia’s election interference. Then we go deep on maybe the most mysterious case of all, the Shadow Brokers, before closing with North Korea’s insidious bank hacking and NotPetya’s sheer power.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
We then move to attack, considering hacks like Stuxnet, Shamoon, Sands, and Sony, as well as looking at the 2015 and 2016 blackouts in Ukraine. Even if you’re familiar with these cases already, there is some new analysis here of their operational execution and strategic effects.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The book is a narrative history of the last two decades of cyber operations, with broader analysis of what they mean for geopolitics. We begin with espionage, with stories of fiber-optic cable taps, secret encryption backdoors, massive database hacks, and counterintelligence.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.