Hacking the Human Element of Code
Following a U.S. government-wide ban last month and recent news reports alleging that Kaspersky Lab enabled Russian intelligence to swipe highly classified NSA material from […] More
Following a U.S. government-wide ban last month and recent news reports alleging that Kaspersky Lab enabled Russian intelligence to swipe highly classified NSA material from […] More
After reports that highly classified intelligence material was taken from a NSA contractor’s private computer through the individual’s use of Kaspersky Lab’s antivirus software, all […] More
Russian state-sponsored hackers reportedly stole details in 2015 on how the U.S. spies on foreign intelligence targets through cyber espionage, as well as how it […] More
U.S. immigration authorities will soon start to catalog social media handles from permanent residents and naturalized citizens. The new information requirements expand “categories of records […] More
As more details emerge about Kremlin influence and disinformation operations aimed at sowing discord and exploiting divisions in the United States, congressional investigators are taking […] More
Terrorist groups such as al Qaeda and ISIS have strategically disseminated propaganda that appeals to a wide variety of individuals. Although al Qaeda was the […] More
Since the U.S. declared its War on Terror 16 years ago, it has achieved a number of battlefield successes against its main terrorist adversaries, al […] More
Over the past two decades, jihadi groups, including al Qaeda and ISIS, have fully grasped the opportunities provided by the internet. They have developed their […] More
How governments view powerful tools like the internet often determines how they treat them. In the West, governments have sought to let citizens freely and […] More
It is a problem for the U.S. that many of the core concepts that guide internet policy date to the 1990s. One such concept is […] More
The year was 1648. Europe had just negotiated the Peace of Westphalia, ending the 30 years of war that had ensnared the continent. The series […] More
In the nearly seven years since the U.S. Department of Defense declared cyberspace a “domain” of warfare – alongside land, air, sea, and space – […] More
One of the opening rounds of an information war between the Kremlin and a democratic country came from Melvin Redick, a fake Facebook account designed […] More
The United States has no peer competitors in conventional military power. But its adversaries are increasingly turning to asymmetric methods for engaging in conflict. Cyber-enabled information warfare […] More
Much of the discussion surrounding Russian cyber-enabled information operations against Western societies focuses on technology, such as bots amplifying messages on social media and the […] More
There can be no doubt that over the past ten years, Russia has honed its active measures operations – or covert action in U.S. intelligence […] More
In less than a week, on September 24th, the German public will vote in the country’s general elections – not only to determine who will […] More
Russia has shown it is both willing and capable of using cyber capabilities to interfere in the West’s democratic elections. With the German elections coming […] More
Search