Peter W. Singer

Peter W. Singer is a strategist and senior fellow at New America, consultant for the U.S. military and Defense Intelligence Agency, author of multiple bestselling books including Corporate Warriors, Children at War; Wired for War; Cybersecurity and Cyberwar: What Everyone Needs to Know and the forthcoming Ghost Fleet: A Novel of the Next World War.
Results 1-10 of 10

War Goes Viral

October 15, 2016 Like most every­thing today, the campaign was launched with a hashtag. But instead of promoting a new album or a movie release, #AllEyesOnISIS announced the 2014 invasion of northern Iraq—a bloody takeover that still haunts global politics two years later. Revealing a military operation via Twitter would seem a strange...

What the 2016 Presidential Candidates Get Wrong About the Future of War

March 7, 2016 “The President shall be Commander in Chief…” This clause that leads Article Two, Section II of the U.S. Constitution is without a doubt the most important of the executive powers granted to the president by the Founding Fathers. But as today’s crop of presidential candidates seek that job, do they...

2016 Predictions: A Look Ahead at the Future of War

December 21, 2015 Imagine you had a time machine that could take you back to compare what people thought would happen in 2015 with what actually did occur. Some of the events of the last year, like the Syrian rebel training programs falling apart, were utterly predictable. Others were deeply surprising; the scale...

Here’s the Defining National Security Question of Our Time

July 7, 2015 “The world war is a form of war that the whole world should face up to.” This is what a professor at the PLA National Defense University argued in China’s regime newspaper, and it captures well the dilemma of our times. Such blunt discussions of great power war is either...

Ask Your 2016 Candidate These Questions on Drone Warfare

May 18, 2015 In a little over 600 days from now, an important job will open up in the national security community. From Hillary Clinton and Jeb Bush to Bernie Sanders and Ted Cruz, the presidential contenders are vying for the chance not just to be commander in chief, but also “decider” of...

What the ISIS Campaign Teaches Us About the Future of War

April 16, 2015 It has now been over 250 days since U.S. forces began air strikes on the Islamic State, or ISIS,. U.S. warplanes have conducted 2,893 air strikes that have hit 5,314 targets ranging from 1,425 buildings to 58 boats, according to the most recent U.S. Central Command figures for Operation Inherent...

What Is the Future of War?

February 23, 2015 Whether it has been fought with sticks and stones or improved explosive devices and drones, war has been a seemingly permanent and unchanging part of human history for the last several millennia. It remains a tragedy caused by our human failings, violence and politics crossed to awful consequences. And yet,...

About Those Chinese Aircraft Carrier Pics: What We Know and What We Can Guess

August 5, 2013 Back in the Cold War, we had to wait for May Day parades and top-secret spy satellite photos for hints as to what new weapons the great powers were working on. Today, all we need is Google. On August 1, 2013, pictures of a large ship under construction appeared on...

Loose Lips Sink Ships, But What About Cybersecurity Leaks?

July 17, 2013 The national security establishment is outraged about a spate of intelligence leaks and the impact they are viewed as having on our national security. When Edward Snowden, a Booz Allen contractor at the National Security Agency, leaked details of programs to collect telephone metadata and (under a program called PRISM)...

Baby steps: The drone industry's code of conduct skips over key questions

July 20, 2012 FROM NEXTGOV arrow The last several months were supposed to be good times for the makers of unmanned aerial systems, popularly known as "drones." Business is booming and theirs is one of the few parts of the aerospace industry not shaking in its boots at impending defense budget cuts. And the $2.3 million...

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.