How Cyber Gray-Ops Became the New Norm in the Middle East
Cyber-enabled information operations in the Gulf, such as the one that seemingly spurred the ongoing feud between Qatar and its neighbors, represent the gray line […] More
Cyber-enabled information operations in the Gulf, such as the one that seemingly spurred the ongoing feud between Qatar and its neighbors, represent the gray line […] More
In one month, the authorities provided under Section 702 of the Foreign Intelligence and Surveillance Act (FISA) are due to expire unless reauthorized by Congress. […] More
Despite all the attention, cyberspace is far from secure. Why this is so reflects flawed technologies and conceptual weaknesses. The result is institutionalized stalemate. Two […] More
For this year’s Thanksgiving Day feature, The Cipher Brief revisits its coverage of the Kremlin’s strategic use of blackmail to silence dissent at home and […] More
The UN’s Convention on Conventional Weapons (CCW) Group of Governmental Experts (GGE) met last week to discuss lethal autonomous weapons systems. But while most member […] More
The Trump Administration’s National Security Council has released an unclassified set of guidelines for determining when the U.S. government will disclose – rather than retain […] More
The Cipher Brief Cyber Advisory Board’s Bob Gourley commented on the Trump administration’s new process for disclosing software vulnerabilities it has detected – the first […] More
The intelligence community has been taking body blows lately – with Friday’s WikiLeaks dump of CIA hacking tools and a report in The New York […] More
Software is the invisible underpinning for much of our digital world. At its core is source code: the lingua franca that allows software-based technology systems […] More
It was 1999, and the Russian Prosecutor General, Yury Skuratov, who was investigating former Russian President Boris Yeltsin’s administration for corruption, found himself in the […] More
The NSA surveillance programs under the authorities laid out in the Foreign Intelligence and Surveillance Act (FISA) Section 702 have been making headlines since former […] More
Top social media companies revealed more details about how Russian operatives made extensive use of their platforms to wage a disinformation and influence campaign targeting […] More
The key question as representatives from Facebook, Twitter and Google testify Tuesday and Wednesday before Congress is not how Russia used social media to interfere […] More
The numbers are staggering, yet only the tip of the iceberg. More than 145 million American citizens are affected by the Equifax data breach disclosed […] More
Urban environments pose special challenges for counterinsurgency efforts as well as for complex operations against criminal gangs and drug trafficking operations. In Brazil, for example, […] More
As ISIS’s hold of its capital of Raqqa disintegrates, and the rubble of a razed Aleppo settles, a trend is beginning to emerge – war […] More
In October 2017 – as Iraqi forces mop up in Mosul, fighting rages round Raqqa and Deir Ezzour in Syria, the United States resumes bombing […] More
Earlier this month, two members of the House of Representatives Tom Graves (R-GA) and Kyrsten Sinema (D-AZ) introduced a bill called Active Cyber Defense Certainty […] More
Search