You are here

Tech/Cyber

June 25, 2017
Terrorism, political corruption, and human rights violations in sub-Saharan Africa are like any other business: management identifies and provides a needed product or service to willing buyers, thereby generating profits and reinvesting them.
June 25, 2017
Last February, President Donald Trump issued an Executive Order calling on the Department of Treasury to review the 2010 Dodd-Frank Wall Street Reform and Con
June 25, 2017
With the advent of digital communications, people thousands of miles apart can engage with each other seamlessly, and businesses can operate at a scale previously unknown, thanks to a burgeoning consumer electronics industry. But not all aspects of this industry are positive.
June 21, 2017
Few security challenges muddle the distinction between government and business roles as those emanating from cyberspace. National security issues no longer remain solely under the purview of government agencies, and companies continue to find themselves in the sights of foreign adversaries.
June 21, 2017
Statecraft and business have always been closely linked, but the advent of digital technology has blurred the roles more than ever. Systems crucial to the economic well-being and national security of the United States rest in the hands of private companies.
June 21, 2017
The United Kingdom has revamped the way its intelligence agencies collaborate with private industry by establishing a new National Cyber Security Centre that leans towards more open and meaningful exchanges to help secure the country against malicious cyber attacks.
June 11, 2017
Continuing terror attacks around the world indicate law enforcement and intelligence agencies face difficulty in trying to identify and disrupt the plans of globally disparate and loosely affiliated entities.
June 11, 2017
Discussion of malicious cyber activity has mainly focused on criminal activity and countries’ intelligence efforts.
June 11, 2017
Terrorists’ tactics evolve with the times. Just as we have seen an adaption of terrorist methods for sowing fear and distrust, so, too, we have seen their propaganda machines evolve to inspire audiences globally. Gone are the days of printed manifestos, pamphlets, or fuzzy VHS tapes.
May 21, 2017
When Beijing got the word that the United States was accelerating the deployment of its Terminal High Altitude Area Defense (THAAD) system to South Korea as a response to North Korea’s latest missile tests, senior Communist Party officials went, no pun intended, ballistic.
May 21, 2017
One of the emerging trends in today’s expanding cyber espionage landscape has been China’s emergence as the leading practitioner of economic cyber espionage.
May 15, 2017
Friday’s global attack on computers in some 150 countries was clearly a wake-up call. It took government systems offline, affected corporations of all kinds, took critical infrastructure systems out of service and even changed the agenda of the G7 meeting in Italy.
May 15, 2017
Over the weekend, businesses and critical services like banks, hospitals, telecommunications services and transportation hubs around the world were hit with a cyber attack that locked users out of their own systems using a form of ransomware known as WannaCry.
May 15, 2017
Who’s to blame for the astonishingly successful ransomware attack sweeping the planet?
May 7, 2017
Ever wonder whether the National Security Agency picked up your text message or email because you mentioned ISIS leader Abu Bakr al Baghdadi to a friend? Claims of privacy infringement on Americans by the National Security Agency have been in headlines for years.
May 7, 2017
The National Security Agency recently announced changes to its intelligence collection practices under Section 702 of the Foreign Intelligence Surveillance Act (FISA).
May 7, 2017
The NSA recently said it would stop collecting signals intelligence solely “about” foreign targets by tapping the backbone of the internet resident within the United States.
April 30, 2017
As people’s lives become more attached to the internet, cyber attacks will have more of an impact. One of the most pressing threats is the growth of botnets, or networks of compromised computers that can be leveraged for a variety of nefarious purposes.
April 30, 2017
With the proliferation of smart devices connected to the public internet the population of botnets – networks of compromised devices that can be leveraged for large-scale cyber attacks – has exploded.
April 30, 2017
Imagine an army of computers, acting under the instructions of a criminal syndicate, terrorist group, or foreign government.
April 23, 2017
In 2010, then-Deputy Secretary of Defense William J. Lynn III made a pivotal decision for the future of cyberspace and the U.S. military: He saw to it that the U.S.
April 23, 2017
The two separate worlds of electronic warfare and cybersecurity are beginning to overlap, if not collide.
April 23, 2017
The isolation of cyber as an entirely independent domain of warfare is both inaccurate and dangerous. Today, the Pentagon faces an essential task, to integrate cyber capabilities with warfighting in the physical world.
April 18, 2017
How can a government, or a company, determine who launched a cyber attack? Attribution becomes even more difficult when the attackers disguise themselves as others.
April 18, 2017
False flag operations have been routine ploys in espionage and warfare for centuries. Now they have turned up in cyber operations.
April 18, 2017
A false flag operation – pretending to be someone else while conducting spycraft or warfare – is an age-old tactic. With the advent of cyber espionage and digital warfare, those maneuvering in the virtual domain can use false flags.
April 12, 2017
Wikileaks’ “Vault7” disclosure last month of apparent CIA hacking tools marked the third recent incident in which an inadvertent public release of alleged government hacking techniques has sent the private sector scrambling to protect users.
April 12, 2017
With the seemingly constant barrage of leaks revealing the U.S.
April 12, 2017
Few topics lend themselves to more polemics than government collection and exploitation of zero-day vulnerabilities, or security flaws in commercial software and hardware not yet disclosed to the vendors, to facilitate intelligence gathering efforts.
April 2, 2017
In September 2015, Chinese President Xi Jinping and President Barack Obama reached an agreement that neither nation would “conduct or knowingly support cyber-e
April 2, 2017
China is a burgeoning great power. It is continually figuring out the various dimensions of power – not least of which is power in cyberspace – and putting them to use.
April 2, 2017
China continues to deploy military equipment to contested islands in the South China Sea, raising concerns among regional players and U.S. forces stationed in the Pacific.   
March 26, 2017
An air gap – meaning, a computer without direct network access of any kind – seems like the perfect solution to the gossamer threads of connectivity. You can’t hack something you can’t connect to. But air gapped systems aren’t unhackable.
March 26, 2017
Connectivity continues to enmesh businesses, governments, societies and people – a trend that will only accelerate with the growth of public cloud services and devices linked together in the Internet of Things.
March 26, 2017
In the world of network security, the term air gap refers to a situation in which the computer network is physically separated from other networks, particularly, less secure and public networks such as the internet.
March 19, 2017
Where will Russian President Vladimir Putin strike next? With the 2018 Russian election around the corner, former Soviet states are nervous. Foreign adventures are the quickest way for a politician to get a bump in the polls.
March 19, 2017
Russian offensive cyber capabilities are as sophisticated as those of other major cyber powers, such as the United States and China, and they likely exceed Baltic states’ ability to defend critical infrastructures.
March 19, 2017
European countries are becoming increasingly wary of foreign disinformation and subversion operations in their own internal politics following Russian interference in last year’s U.S. elections.
March 12, 2017
There as been discussion of a separation between the National Security Agency and U.S. Cyber Command for a while, only for the change in administrations to cause brief hesitation.
March 12, 2017
Despite the many logistical and operational challenges of a transition, many acknowledge that Cyber Command must eventually separate from the National Security Agency.
March 12, 2017
In 2013, former President Barack Obama was close to ending the “dual-hat” leadership of both the National Secur
March 5, 2017
Security researchers and policymakers around the world are struggling with the challenge of securing the digital networks that governments, private companies, and people in general depend on every day.
March 1, 2017
Cyberspace is often portrayed as a new domain of international relations – a Wild West where there are no rules or guiding principles to govern the behavior of states. Such perceptions of anarchism have bred uncertainty over what is or is not acceptable activity among governments.
March 1, 2017
NATO’s Cooperative Cyber Defence Centre of Excellence last month published the Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, a follow-on project to the first, 2013, edition of the manual, which focused on cyber
March 1, 2017
A group of international law experts met in Tallinn, Estonia, after the 2007 onslaught of cyber attacks against sites in the country, to create the Tallinn Manual in order to clarify what constitutes an act of war in cyberspace and how countries could lawfully respond.
February 24, 2017
What if network defenders knew that a cyber operation occurred during Moscow business hours, that it involved a Russian IP address, and that the cyber actors used a Cyrillic keyboard? Would those indicators by themselves be enough for attribution?
February 24, 2017
Understanding the Russian criminal underground is essential when discussing Russian proxies in cyberspace. How do cybercriminal entities interact with each other and what is their relationship with the Russian government?
February 24, 2017
Cyber operations remain at the forefront of confrontations between the West and Moscow as relations continue to deteriorate. Russia asserted itself in 2007 with “patriotic hackers” launching a volley of distributed denial of service (DDoS) attacks on Estonian systems.
February 12, 2017
While receiving significant publicity from global media, the rise of the humanitarian drone is so far more of a whimper than a bang. This article explores some critical perspectives behind the limited use of drones.
February 12, 2017
Since the first CIA Predator drone strike in October 2001, the United States, among others, has sought to expand the technology to facilitate remote warfare.

Pages