Artificial Intelligence & Language Preservation
The United Nations Educational Scientific and Cultural Organization (UNESCO) has designated 2022-2032 the International Decade of Indigenous Languages. This initiative comes at a time when endangered language speakers, linguists, and other groups are concerned about language extinction and the rapid spread of artificial intelligence (AI). Some researchers are optimistic that AI can be leveraged to help document, preserve, and revitalize at-risk languages, while others are concerned that the technology will accelerate the homogenization of human language.
Creating and Implementing a Liability Regime for Software Vendors
Insecure software is a national security risk, costs the U.S. billions of dollars annually, and exposes users’ information to malicious actors. Software developers (vendors) who fail to securely develop their products currently face few legal repercussions, even if they engage in industry-agreed bad practices.
Book Review Fight for the Final Frontier: Irregular Warfare in Space
A seasoned scholar, strategist, and expert in space policy and strategy, Dr. John J. Klein is well-versed in applying strategic theory to the space domain. In his new book, Fight for the Final Frontier: Irregular Warfare in Space (2023), Klein argues that irregular warfare, in both its military and nonmilitary forms, is a vital and underutilized concept for understanding malicious activities in space and the nature of space warfare. His argument draws on a diverse list of strategic theorists, historians, and contemporary policy analyses. Klein weaves these sources together persuasively, providing an accessible overview of a technologically demanding subject. Policy generalists and students, along with veteran analysts of space policy, will benefit from his account.
Book Review - Cyber Threats & Nuclear Weapons
As the world’s infrastructure becomes increasingly interconnected, more critical systems are exposed to cyber threats. A cyber threat is a malicious act intended to steal, damage, or disrupt digital data. Cyber threats seek to turn potential security vulnerabilities into attacks on systems and networks.
Small Satellites and International Security
Orbiting satellites perform many tasks: communications, broadcasting, weather forecasting, earth observation, intelligence-gathering, and scientific research. The first satellite, launched in 1957, was a modest metal sphere containing a simple radio transmitter. Since then, satellites have grown in size and complexity. Many are visible to anyone with a reasonably powerful backyard telescope.
New Technology and Nuclear Risk
In 2006, two leading scholars of the nuclear era warned that the age of mutually assured destruction (MAD) was ending. Seventeen years later, the authors are doubling down on these claims, arguing that the outbreak of new conventional conflicts has changed nuclear decision making, increasing the threat of coercive nuclear escalation. In an age of new technology, this warning is more pertinent than ever. The rapid introduction of emerging technologies and their weaponization raises concerns about maintaining strategic stability.