Triggering the New Forever War, in Cyberspace
The United States is in the midst of the most resounding policy shift on cyber conflict, one with profound implications for national security and the […] More
The United States is in the midst of the most resounding policy shift on cyber conflict, one with profound implications for national security and the […] More
The Trump administration has accused Russia of a coordinated “multi-stage intrusion campaign” to hack into critical U.S. infrastructure networks and conduct “network reconnaissance” while attempting […] More
Bottom Line: Conflict follows humanity wherever it goes, and the world’s population is increasingly living in cities. Waning are the days of the Maoist blueprint […] More
Jason Healey recently posted an interesting piece on The Cipher Brief, US Cyber Command: “When faced with a bully…hit him harder.” Healey writes: “Cyber Command’s new […] More
Bottom Line: A spy’s tradecraft must constantly evolve because of the rapid changes of the digital age – especially the tools and skills required to […] More
Bottom Line: While President Donald Trump’s tweets at times unnerve America’s closest allies, especially those that attack U.S. intelligence and law enforcement, the “Five Eyes” […] More
Bottom Line: Russia’s use of private military contractors in Syria lends the Kremlin deniability that becomes problematic when the U.S. tries to calculate how to […] More
Special Counsel Robert Mueller has released the indictment of 13 Russian nationals and three Russian entities for allegedly interfering in the 2016 presidential election. The […] More
The shooting incident at the entrance to the National Security Agency had nothing to do with targeting the intelligence center, and there were no fatalities, […] More
Bottom Line: While North Korea has put on a friendly face during the Olympic Games taking place along its southern border, the country’s hackers continue […] More
Cipher Brief Cyber Advisory Board members offer their views on threats to the U.S. power grid, as interviewed by Cipher Brief Publisher and CEO Suzanne […] More
Bottom Line: Maturing under Tehran’s tutelage, Hezbollah’s hackers are quickly learning the art of cyber warfare. The formidable militant organization is increasingly turning its attention […] More
Bottom Line: China is aggressively pursuing capabilities such as anti-satellite (ASAT) weapons that could diminish the U.S. military’s reconnaissance, navigation and communications in case of […] More
Bottom Line: Since 2016, the North Korean regime has shown its hand as a state sponsor of cybercrime by targeting international financial institutions, engaging in […] More
Bottom Line: Cyber vigilantes and “hacktivists” increasingly fill the void left by governments in combating terrorist activity online. While such politically motivated non-state hackers are […] More
National Security Agency Director Adm. Mike Rogers has told his staff that he will be stepping down from his post this spring, as reported by […] More
Cybersecurity researchers have discovered two major software vulnerabilities in the Intel microprocessors inside the vast majority of all computers. Dubbed “Meltdown” and “Spectre,” the vulnerabilities […] More
Autonomous vehicles such as those being tested by Google or Tesla will be one of the most important and disruptive technologies for the future of […] More
Search