WELCOME!

WELCOME!
Technology is shaping how borders are protected, wars are fought, crooks are caught, and individual rights are defined. Starting today, Defense Tech will track these developments, rounding up the day's news, linking to sources of information, and providing analysis on what's ahead.
From Predator drones to biowar defense, computer security to nuclear threats, the site aims to examine the intersection of technology and defense from every angle, covering the exploits of soldiers and hackers, madmen and geniuses, inventors and dictators.
Let me know what you think of the site: send your comments, suggestions, tips, and questions to defense@defensetech.org". And be sure to come back often -- the site will be updated several times throughout the day.

WELCOME!
Technology is shaping how borders are protected, wars are fought, crooks are caught, and individual rights are defined. Starting today, Defense Tech will track these developments, rounding up the day's news, linking to sources of information, and providing analysis on what's ahead.
From Predator drones to biowar defense, computer security to nuclear threats, the site aims to examine the intersection of technology and defense from every angle, covering the exploits of soldiers and hackers, madmen and geniuses, inventors and dictators.
Let me know what you think of the site: send your comments, suggestions, tips, and questions to defense@defensetech.org". And be sure to come back often -- the site will be updated several times throughout the day.