
Cyber Insecurity: Navigating the Perils of the Next Information Age
Growing dependence on cyberspace for commerce, communication, governance, and military operations has left society vulnerable to a multitude of security threats.
Growing dependence on cyberspace for commerce, communication, governance, and military operations has left society vulnerable to a multitude of security threats.
The problem with high technology is that it can be difficult to understand, leading to what are often confused policy prescriptions. A perfect example is the proposed upcoming transition of the internet-naming function from U.S. to private control - an event that's scheduled to take place just a few days from now, on Sept. 30. While the transition itself isn't necessarily a bad idea, the Obama administration's current plan has definite flaws.
Three years ago this summer, Egyptians took to the streets en masse to vent their frustration at the government of then president Mohamed Morsi. The source of their discontent was the widespread economic stagnation and ideologically driven policies that came to punctuate Morsi's Muslim Brotherhood-dominated government. The result was nothing short of a counterrevolution, as Morsi was ousted by the country's powerful military in an almost-coup led by his then minister of defense, Gen. Abdel Fattah el-Sisi.
The wages of economic crisis;
Moscow, Ankara make nice
Moscow, Ankara move closer;
Putin muzzles public opinion