
Outing Spooks: “Doxing” in the Cyber-Hack Era
Revealing the identities of intelligence officials – a practice known as doxing – could become more common among nation-states, directed in particular at the clandestine […] More
Revealing the identities of intelligence officials – a practice known as doxing – could become more common among nation-states, directed in particular at the clandestine […] More
Terrorist groups are expanding their use of the internet beyond mere messaging and disseminating operational know-how, slowly adding a cyber-hacking toolset that could one day […] More
It was almost a devastatingly effective cyber-heist. Hackers compromised the Kathmandu-based NIC Asia Bank this fall, fraudulently transferring $4.4 million to destinations in at least […] More
Cyber-enabled information operations in the Gulf, such as the one that seemingly spurred the ongoing feud between Qatar and its neighbors, represent the gray line […] More
In one month, the authorities provided under Section 702 of the Foreign Intelligence and Surveillance Act (FISA) are due to expire unless reauthorized by Congress. […] More
Despite all the attention, cyberspace is far from secure. Why this is so reflects flawed technologies and conceptual weaknesses. The result is institutionalized stalemate. Two […] More
For this year’s Thanksgiving Day feature, The Cipher Brief revisits its coverage of the Kremlin’s strategic use of blackmail to silence dissent at home and […] More
The UN’s Convention on Conventional Weapons (CCW) Group of Governmental Experts (GGE) met last week to discuss lethal autonomous weapons systems. But while most member […] More
The Trump Administration’s National Security Council has released an unclassified set of guidelines for determining when the U.S. government will disclose – rather than retain […] More
The Cipher Brief Cyber Advisory Board’s Bob Gourley commented on the Trump administration’s new process for disclosing software vulnerabilities it has detected – the first […] More
The intelligence community has been taking body blows lately – with Friday’s WikiLeaks dump of CIA hacking tools and a report in The New York […] More
Software is the invisible underpinning for much of our digital world. At its core is source code: the lingua franca that allows software-based technology systems […] More
It was 1999, and the Russian Prosecutor General, Yury Skuratov, who was investigating former Russian President Boris Yeltsin’s administration for corruption, found himself in the […] More
The NSA surveillance programs under the authorities laid out in the Foreign Intelligence and Surveillance Act (FISA) Section 702 have been making headlines since former […] More
Top social media companies revealed more details about how Russian operatives made extensive use of their platforms to wage a disinformation and influence campaign targeting […] More
The key question as representatives from Facebook, Twitter and Google testify Tuesday and Wednesday before Congress is not how Russia used social media to interfere […] More
The numbers are staggering, yet only the tip of the iceberg. More than 145 million American citizens are affected by the Equifax data breach disclosed […] More
Urban environments pose special challenges for counterinsurgency efforts as well as for complex operations against criminal gangs and drug trafficking operations. In Brazil, for example, […] More
Search