Latest
Big ideas, bold solutions. Explore the latest research, analysis, and policy insights from our experts.聽聽
Dual Language Learners Reader Post #8: What Do English-Only Laws Mean for DLLs/ELLs?
States’ “English-Only Laws” promised to support DLLs’ linguistic development. Their failure is provoking a response.
Barriers to Sharing Cyber Threat Information Within the Critical Infrastructure Community
The sharing of cyber threat data has garnered national level attention, and improved information sharing has been the objective of several p
Closing the Case on the Reported 2008 Russian Cyber Attack on the BTC Pipeline
An article released today in Sueddeutsche (the largest German national daily newspaper) by Hakan Tanriverdi revealed new information that fu
Cyber Intelligence Part 1: An Introduction to Cyber Intelligence
This is the beginning of a short blog series on the topic of cyber intelligence, its sub-disciplines, and its uses. As an Adjunct Lecturer a
Cyber Intelligence Part 2: Developing Your Cyber Intelligence Analyst Skills
In this edition we will cover more in depth what it means to be a cyber intelligence analyst in terms of understanding intelligence products
Cyber Intelligence Part 3: Cyber Intelligence Collection Operations
The topic of Intelligence Collection Operations sounds inherently military or government based in nature especially with the use of the word
Cyber Intelligence Part 4: Cyber Counterintelligence From Theory to Practices
In the previous article, Cyber Intelligence Collection Operations, the types of collection and the types of data that could be obtained were
Cyber Intelligence Part 5: Cyber Threat Intelligence
In the previous blog posts in this series, we looked at cyber intelligence and some of its different focus areas, including intelligence col
6/26 – OTI Reply Comments Defending Unlicensed Spectrum Against LTE-U Services
FCC Filing