You are here

Tech/Cyber

March 19, 2017
Where will Russian President Vladimir Putin strike next? With the 2018 Russian election around the corner, former Soviet states are nervous. Foreign adventures are the quickest way for a politician to get a bump in the polls.
March 19, 2017
Russian offensive cyber capabilities are as sophisticated as those of other major cyber powers, such as the United States and China, and they likely exceed Baltic states’ ability to defend critical infrastructures.
March 19, 2017
European countries are becoming increasingly wary of foreign disinformation and subversion operations in their own internal politics following Russian interference in last year’s U.S. elections.
March 12, 2017
There as been discussion of a separation between the National Security Agency and U.S. Cyber Command for a while, only for the change in administrations to cause brief hesitation.
March 12, 2017
Despite the many logistical and operational challenges of a transition, many acknowledge that Cyber Command must eventually separate from the National Security Agency.
March 12, 2017
In 2013, former President Barack Obama was close to ending the “dual-hat” leadership of both the National Secur
March 5, 2017
Security researchers and policymakers around the world are struggling with the challenge of securing the digital networks that governments, private companies, and people in general depend on every day.
March 1, 2017
Cyberspace is often portrayed as a new domain of international relations – a Wild West where there are no rules or guiding principles to govern the behavior of states. Such perceptions of anarchism have bred uncertainty over what is or is not acceptable activity among governments.
March 1, 2017
NATO’s Cooperative Cyber Defence Centre of Excellence last month published the Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, a follow-on project to the first, 2013, edition of the manual, which focused on cyber
March 1, 2017
A group of international law experts met in Tallinn, Estonia, after the 2007 onslaught of cyber attacks against sites in the country, to create the Tallinn Manual in order to clarify what constitutes an act of war in cyberspace and how countries could lawfully respond.
February 24, 2017
What if network defenders knew that a cyber operation occurred during Moscow business hours, that it involved a Russian IP address, and that the cyber actors used a Cyrillic keyboard? Would those indicators by themselves be enough for attribution?
February 24, 2017
Understanding the Russian criminal underground is essential when discussing Russian proxies in cyberspace. How do cybercriminal entities interact with each other and what is their relationship with the Russian government?
February 24, 2017
Cyber operations remain at the forefront of confrontations between the West and Moscow as relations continue to deteriorate. Russia asserted itself in 2007 with “patriotic hackers” launching a volley of distributed denial of service (DDoS) attacks on Estonian systems.
February 12, 2017
Remotely controlled aircraft, or drones, have long become common in military settings—possibly most infamously pictured as a U.S. Predator launching Hellfire missiles at suspected terrorists in far corners of the globe. How can they be used for humanitarian purposes, though?
February 12, 2017
While receiving significant publicity from global media, the rise of the humanitarian drone is so far more of a whimper than a bang. This article explores some critical perspectives behind the limited use of drones.
February 12, 2017
Since the first CIA Predator drone strike in October 2001, the United States, among others, has sought to expand the technology to facilitate remote warfare.
February 5, 2017
The cybersecurity industry is currently enamored with concepts of autonomous defense, including elements of machine learning, behavioral analytics, and artificial intelligence—and rightly so.
February 5, 2017
Many view cybersecurity as passively blocking attempts to breach networks, but security experts have long advocated more active measures in defense of sensitive networks.
February 5, 2017
We live in an age where what used to be the figment of science fiction is now a reality, changing the way people go about their daily lives. Advances in artificial intelligence and machine learning are the new frontier, and their inception creates just as many risks as opportunities.
January 29, 2017
Recent years have witnessed a series of increasingly audacious and unprecedented cyber attacks, leading up to the recent accusations of Russian hacking throughout last year’s U.S. presidential election season.
January 29, 2017
Cyber is emerging as Iran’s weapon of choice for dealing with both domestic and foreign opponents.
January 29, 2017
Cybersecurity is often discussed in relation to the major global powers: China’s economic espionage, Russian influence operations, and U.S. dragnet global surveillance to thwart terrorism.
January 22, 2017
U.S. failure to fully develop and implement a comprehensive cyber security strategy created the perfect opportunity for Russia to attack the Democratic National Committee computer network, and enabled them to meddle and interfere with the U.S. presidential election.  
January 22, 2017
In the fall of 2008, a bipartisan group of cybersecurity experts delivered some sage advice to Barack Obama, set to become president in January: “Don’t start over.” That group, organized by the
January 22, 2017
President Donald J. Trump’s Administration has suggested massive overhauls in a number of policy areas, but few have remained as shrouded in uncertainty as Trump’s vision for the future of cybersecurity.
January 15, 2017
Bob Work, the Deputy Secretary of Defense, will tell you the Third Offset is the next generation of warfare. It may take at least ten years but it will showcase the rise of the machine, and the decline of the human in the business of operating weapons systems.
January 15, 2017
Imagine a weapon that strikes on its own, without the slightest hint of human judgment or compassion. It’s a chilling prospect, and not so far in the future unless the world calls a halt to such weapons’ development.
January 15, 2017
War, often rationalized as an extension of policy by violent means, has always been a deeply human experience. It defines much of human history and, unsurprisingly, changes in technology accompany—and are often driven by—adaptations in the conduct of warfare.
January 8, 2017
On November 29, Royal Assent was given to the UK Investigatory Powers Act, after eight months of intensive Parliamentary scrutiny, with hundreds of amendments made, following lengthy pre-legislative debate in three Parliamentary Committees.  The Act draws on the input from three separate, indepen
January 8, 2017
Surveillance law is absolutely necessary because it compels the government to write down, for all to clearly see, the rules that they must abide by as they undertake intrusive powers, often in secret, to investigate criminal activity and protect a country.
January 8, 2017
On January 1st, the United Kingdom began the implementation of the Investigatory Powers Act, widely considered the most comprehensive—and intrusive—surveillance law in the Western world.
December 25, 2016
Editor’s Note: Over the coming days, The Cipher Brief presents some of our most incisive coverage on key issues of 2016 and a look ahead at what is yet to come in 2017.
December 18, 2016
On December 1, Congress authorized sweeping new government hacking and surveillance authorities by allowing changes to Rule 41 of the Federal Rules of Criminal Procedure to take effect.
December 18, 2016
What if the U.S. government could force entry—in other words, hack—into electronic devices around the world, using only one warrant, even if the owners of those devices were not suspected of any criminal activity - and it would be legal?
December 18, 2016
With the growth of cybercrime facilitated by the global nature of the Internet, law enforcement is adapting their toolsets to better tackle the challenges presented by technologies that blur legal jurisdiction.
December 11, 2016
Do Chinese authorities need more laws to surveil people? From the earliest days of the Chinese Communist Party, authorities have kept the closest of eyes on all behavior for signs of dissent.
December 11, 2016
China’s new Cybersecurity Law, which received parliamentary approval in November and will go into effect in June of 2017, is not necessarily novel.
December 11, 2016
Last month, China’s legislature passed the Cybersecurity Law, which is due to take effect next summer. The controversial law has received a number of criticisms from technology companies, Western government officials, and human rights advocates.
December 4, 2016
Is a future where people can be arrested for crimes they have not yet committed dystopian or utopian? While this scenario remains the fodder of science fiction, new tools are rapidly challenging our libertarian conceptions of innocent until proven guilty.
December 4, 2016
The world has seen an enormous surge in the amount of data available, particularly human-generated digital exhaust from our Internet and communications habits. But only a small portion of this data is actually useful for security professionals. The U.S.
December 4, 2016
What if it were possible to predict where a crime took place before it actually occurred – even determining the identity of the culprit in advance? Social scientists have long believed that historical crime trends influence future patterns.
November 27, 2016
Amidst a rash of data breaches where compromised passwords provided the vector of attack – think Target, Anthem, OPM, or more recently, the Democratic National Committee – industry and government are working together to bolster their defenses. 
November 27, 2016
The use of biometrics to authenticate identity has been the subject of great debate for years, with opposing sides arguing its value for security, privacy, and convenience.
November 27, 2016
Cyberspace has grown into a vital domain of everyday life—we work, socialize, play, and conduct financial transactions online. Our lives now have a digital touch, and much like in the physical world, our identities are at the core of our virtual experience.
November 20, 2016
Discussions on artificial intelligence (AI) too often revolve around concerns about the sensationalist threat of “killer robots,” usually featured in science-fiction films or computer games. Killing is depicted as easy and rapid, done by steel-clad monsters with super-human abilities.
November 20, 2016
New technologies are changing the face of future warfare and few will be as impactful as the fusion of artificial intelligence into weapons systems.
November 20, 2016
Should humans delegate the responsibility of decisions over life and death to computer algorithms? The answer is not as simple as it seems—and it is the fundamental question concerning the military application of artificial intelligence in the future.
November 15, 2016
Last month, Kurdish forces in northern Iraq shot down an Islamic State drone booby-trapped with explosives that later killed two Peshmerga soldiers as they inspected it.
November 15, 2016
Drones have traditionally been used by Western militaries as a tool in counterterrorism efforts, but insurgent and terrorist groups are increasingly turning to small hobby drones to bolster their own efforts.
November 15, 2016
There is growing evidence that non-state actors are incorporating drone technology into their unconventional tactics, prompting concerns from militaries on how they can effectively counter this emerging threat.

Pages