Military Technologies

During the mid-1930s, a best-selling exposé of the international arms trade, combined with a U.S. Congressional investigation
Remembering Equifax, Uber and all the other data breaches of the last year.
The move contradicts the military’s own assessments going back to 1990.
Amazon Web Services Secret Region expands after some troubling cloud security screwups.
In recent weeks, Saudi Arabia has become more assertive. It first imposed a total blockade on Yemen, despite claims that
Diplomatic proposals succeed only when they satisfy the vital interests of each party to a conflict.
President Trump has given Iranian hardliners incentive to restart and weaponize their nuclear program.
Human survival depends on our ability to develop non-violent means of conflict resolution that do not involve war.
How it might actually be fought.
It is the pinnacle of hubris for the world to continue to treat North Korea as if it were an ill child that simply needed
Militarizing homeland security in the climate-change era.
Out everywhere and winning nowhere.