Pandora’s Bot: How Cyber Weapons Can Wreak Havoc
Bottom Line: U.S. cyber defenders know how to take down botnets – networks of computers that have been hacked to act as one – but […] More
Bottom Line: U.S. cyber defenders know how to take down botnets – networks of computers that have been hacked to act as one – but […] More
For this last week of 2017, we asked our experts to look ahead at key national security issues. NSA veteran Rick Ledgett offers some cybersecurity lessons […] More
Signs are increasing that jihadist groups are looking to capitalize on the rising value of bitcoin, as massive price increases for the cryptocurrency in recent […] More
The Federal Communications Commission (FCC) voted 3-2 on Thursday to dismantle their authorities to enforce net neutrality rules that prohibit internet service providers, such as […] More
The introduction of armed unmanned aerial vehicles (UAVs) permanently altered the modern battlefield. New technological advances in drone technology could do it again: from advanced […] More
Revealing the identities of intelligence officials – a practice known as doxing – could become more common among nation-states, directed in particular at the clandestine […] More
Terrorist groups are expanding their use of the internet beyond mere messaging and disseminating operational know-how, slowly adding a cyber-hacking toolset that could one day […] More
Cyber-enabled information operations in the Gulf, such as the one that seemingly spurred the ongoing feud between Qatar and its neighbors, represent the gray line […] More
In one month, the authorities provided under Section 702 of the Foreign Intelligence and Surveillance Act (FISA) are due to expire unless reauthorized by Congress. […] More
North Korea launched an intercontinental ballistic missile on Tuesday, another step towards its goal of becoming a nuclear power in the world – prompting an […] More
For this year’s Thanksgiving Day feature, The Cipher Brief revisits its coverage of the Kremlin’s strategic use of blackmail to silence dissent at home and […] More
The UN’s Convention on Conventional Weapons (CCW) Group of Governmental Experts (GGE) met last week to discuss lethal autonomous weapons systems. But while most member […] More
The revelation that Donald Trump Jr. was in contact with WikiLeaks throughout the 2016 U.S. presidential campaign is just the latest in a long catalog […] More
The Cipher Brief Cyber Advisory Board’s Bob Gourley commented on the Trump administration’s new process for disclosing software vulnerabilities it has detected – the first […] More
Internet freedom took a nosedive over the last year, with governments doing more than ever to spread disinformation on social media and attacks in the […] More
The intelligence community has been taking body blows lately – with Friday’s WikiLeaks dump of CIA hacking tools and a report in The New York […] More
The Department of Homeland Security announced Thursday an updated version of the National Terrorism Advisory System Bulletin. The move comes in the aftermath of the […] More
While all militaries seek to lead enemies astray, Russia’s military doctrine of deception – known as maskirovka, Russian for “masking” or “camouflage” – is a […] More
Search