Hiding in Plain Sight: Maintaining A Spy’s Cover in the Internet Era
Tradecraft. A term popularized in the novels of John le Carré, but practiced by spies throughout history. Tradecraft includes a number of methodologies, ranging from […] More
Tradecraft. A term popularized in the novels of John le Carré, but practiced by spies throughout history. Tradecraft includes a number of methodologies, ranging from […] More
Intelligence officers must often use a false identity — a legend or cover. How has social media and digital technology changed how they create and […] More
Intelligence officers’ tradecraft is highly guarded for good reason. One of its most important aspects is establishing a cover identity so foreign governments and hostile […] More
The main loss from the departure of Chris Painter, America’s top cyber diplomat, will not be the loss of one of the top U.S. civil […] More
Despite the many logistical and operational challenges of a transition, many acknowledge that U.S. Cyber Command must eventually separate from the National Security Agency. According […] More
Defense Secretary James Mattis on June 14 gave Congress an update on the 2017 Nuclear Posture Review, saying, “We’re looking at each leg of the […] More
Among the three legs of the triad, the U.S. Navy’s ballistic missile submarines are the most survivable and the hardest to detect. Their advanced nuclear […] More
The only remaining U.S. ICBM, the Minuteman III, entered service in 1970. While upgrades have extended the life of the Minuteman III program, the missiles […] More
Reports of intrusions into industrial control systems (ICS) broke late last week – this time in several U.S. power plants, including the Wolf Creek nuclear […] More
Relations between the United States and North Korea hit a new low following Pyongyang’s test of an ICBM July 4. With a range of up […] More
In May, the U.S. Ground-based Midcourse Defense system – the GMD – successfully intercepted a mock ICBM in a critical test of the U.S. missile […] More
The Pentagon’s missile defense review is now underway, incorporating mandates from both the White House and Congress. One of its considerations, at presidential direction, is […] More
As the dust settles on last Tuesday’s NotPetya malware outbreak, it is increasingly evident that this was not a ransomware, money-making attack at all; rather […] More
For this year’s Fourth of July feature, The Cipher Brief revisits its coverage examining the concept of an electromagnetic railgun. Capable of firing projectiles at […] More
For this year’s Fourth of July feature, The Cipher Brief revisits its coverage on electromagnetic railguns. Capable of firing projectiles at speeds of Mach 7 […] More
For this year’s Fourth of July feature, The Cipher Brief revisits its coverage on electromagnetic railguns. Capable of firing projectiles at speeds of Mach 7 […] More
In the early days of the internet, criminals quickly saw the new technology as an avenue for data theft, extortion, and uninhibited global reach. These […] More
Search