False Flags in Cyberspace: Targeting Public Opinion and Political Will
This is Cipher Brief Level I Member Only content. It can be accessed via login or by signing up to become a Cipher Brief Member. […] More
This is Cipher Brief Level I Member Only content. It can be accessed via login or by signing up to become a Cipher Brief Member. […] More
Mr. President, as you know the United States has faced cyber attacks of increasing frequency and viciousness from our adversaries. Your NSC is about to […] More
The Cipher Brief hosted its second annual threat conference at beautiful Cloister Resort on Sea Island, Ga., this month. While there, Dmitri Alperovitch and I […] More
This is Cipher Brief Level I Member Only content. It can be accessed via login or by signing up to become a Cipher Brief Member. […] More
History suggests that applying the wrong operational framework to an emerging strategic environment is a recipe for failure. During the World War I, both sides […] More
This is Cipher Brief Level I Member Only content. It can be accessed via login or by signing up to become a Cipher Brief Member. […] More
This is Cipher Brief Level I Member Only content. It can be accessed via login or by signing up to become a Cipher Brief Member. […] More
In Washington, there may be division and confusion about how to deal with Russian cyber-based interference. But 25 miles north, at Fort Meade, home of […] More
During times when the country expresses passionate opinions over the politics of the day, I wonder what U.S. adversaries focus on. One thing always in […] More
This is Cipher Brief Level I Member Only content. It can be accessed via login or by signing up to become a Cipher Brief Member. […] More
The range of ferocious offensive cyber attacks by revisionist and rogue powers in recent years makes clear that the U.S. and its allies are fully […] More
This is Cipher Brief Level I Member Only content. It can be accessed via login or by signing up to become a Cipher Brief Member. […] More
This is Cipher Brief Level I Member Only content. It can be accessed via login or by signing up to become a Cipher Brief Member. […] More
This is Cipher Brief Level I Member Only content. It can be accessed via login or by signing up to become a Cipher Brief Member. […] More
Earlier this month, two members of the House of Representatives Tom Graves (R-GA) and Kyrsten Sinema (D-AZ) introduced a bill called Active Cyber Defense Certainty […] More
Deterrence is based on the elements of denial (denying an adversary’s attempt to attack our interests) and punishment (inflicting unacceptable costs to the attacker in […] More
The Cipher Brief Cyber Advisory Board convenes meetings with some of the most innovative thinkers across government and the private sector, tackling a range of […] More
This is Cipher Brief Level I Member Only content. It can be accessed via login or by signing up to become a Cipher Brief Member. […] More
This is Cipher Brief Level I Member Only content. It can be accessed via login or by signing up to become a Cipher Brief Member. […] More
This is Cipher Brief Level I Member Only content. It can be accessed via login or by signing up to become a Cipher Brief Member. […] More
This is Cipher Brief Level I Member Only content. It can be accessed via login or by signing up to become a Cipher Brief Member. […] More
This is Cipher Brief Level I Member Only content. It can be accessed via login or by signing up to become a Cipher Brief Member. […] More
This is Cipher Brief Level I Member Only content. It can be accessed via login or by signing up to become a Cipher Brief Member. […] More
This is Cipher Brief Level I Member Only content. It can be accessed via login or by signing up to become a Cipher Brief Member. […] More