Every morning, analysts, operators, and policymakers arrive at their desks to read the latest news and intelligence reporting that has come in during the past day. The daily rhythm of “reading the morning traffic” has remained largely unchanged since the 1950s. Professionals in the intelligence community and military spend upwards ...

National Geospatial-Intelligence Agency Deputy Director Susan Gordon on Wednesday called for the government and Intelligence Community to prioritize innovation to better confront the broad array of threats the United States faces today. Adversaries always have access to commonly available things, which means that those in the IC must find ways ...

If there has been one constant in President Donald Trump’s administration, it is the steady stream of leaks of classified information. As investigators dig into questions surrounding Trump, his team and Russian interference in the 2016 election, the tension between whether leaks or Kremlin actions and potential ties to the ...

Stranded during a historic Washington-area blizzard in February 2010, a U.S. soldier embarked on a mission that he had sworn to not fulfill: “...I joined in on an IRC (Internet Relay Chat) conversation and stated that I had information that needed to be shared with the world. I wrote that ...

The interesting thing about the Apple vs. FBI encryption debate is that that there is little disagreement that encryption is a valuable tool for protecting individuals’ privacy and preventing information from falling into the wrong hands.  There is also little disagreement that we want law enforcement and intelligence agencies to ...

Countering cyber-threats can be difficult, and information sharing has come to be seen as a constructive way to attack the problem. Elaine Lammert, a former Deputy General Counsel with the FBI, spoke with the Cipher Brief about the need for a holistic approach to cybersecurity and the importance of trust ...

Threat intelligence sharing has a complex history within the security industry. The premise is simple: cybercriminals will often launch attacks with similar components, using the same tactics, or even re-use the same malware or exploits over and over again. If every organization was sharing intelligence on the attacks being launched ...

Late last year, the text of the Cybersecurity Information Sharing Act (CISA) found its way into a consolidated spending bill and was signed into law by President Barack Obama on December 18, 2015.  CISA is designed to "improve cybersecurity in the United States through enhanced sharing of information about cybersecurity ...

One of the key lessons of 2015 was that cybersecurity is more important than ever – a lesson that Sony and the Office of Personnel Management learned the hard way. In the wake of these hacks, information sharing has become a very popular way for private companies and the government ...

The government is in a bind – it wants to stop criminals and terrorists, but it also wants to support strong encryption. Navigating this quandary has been a problem for a while, and it is entering a new phase. Specifically, the government appears to be shifting its focus from compulsion ...

The private sector perspective on encryption technology is critical to understanding the crux of the debate.  Amid news that Dell had agreed to buy RSA’s parent company, EMC, in the largest deal in the IT industry's history, RSA President Amit Yoran sat down with The Cipher Brief to talk about ...

Michael Chertoff, the former Secretary of the Department of Homeland Security, sat down with The Cipher Brief to explain why he believes a secure communications infrastructure protected by strong encryption is for the greater public good. The Cipher Brief: U.S. law enforcement has publicly expressed its concern that bad actors ...

When the Clinton Administration decontrolled encryption in the late 1990s after a long and acrimonious debate, it did so because it had decided that the benefits of making strong encryption available to internet users, and the benefits to U.S. companies operating in a global market, outweighed the cost to law ...

“Are we so mistrustful of government—and of law enforcement—that we are willing to let bad guys walk away...willing to leave victims in search of justice?”  – FBI Director James Comey, Brookings, October 16, 2014 Strong encryption appears to be safe – for now. In Congressional testimony on Thursday, FBI Director James ...

According to press reports, the White House has considered and rejected four options to address the so-called “going dark” problem where the growing ubiquity of encryption is making it harder for law enforcement agencies to collect evidence and investigate crimes. Options considered include adding an encrypted port to devices, using ...

Mike Rogers is a former Congressman who served as the chairman of the House Permanent Select Committee on Intelligence. In a discussion with The Cipher Brief, Rogers said it is critical for the government and private sector to find a solution to the encryption dilemma that satisfies the needs of ...

Our government should not want a backdoor to encrypted messages. The government says it wants to have a special set of keys to decrypt any encrypted data transmitted across the Internet. The computer industry says it isn’t possible.  The government says it is a matter of national security. The industry ...

Large-scale cyber attacks like those experienced by OPM, Sony, Anthem, and Target have intensified the ongoing criticism that the US government lacks a coherent cybersecurity policy. The Cybersecurity Information Sharing Act (CISA), which is currently awaiting a vote in the Senate, is the latest effort to develop a strategy.  While ...

The Senate is expected to consider the Cybersecurity Information Sharing Act (CISA) (S. 754) soon. Information sharing legislation that would fill gaps in existing law to make it easier for companies to share cyber threat indicators (CTIs) is probably necessary. Unfortunately, CISA is not the answer for many reasons. First, ...

It’s impossible to overstate the threat of cyber attacks to our economy and our national security. McAfee and the Center for Strategic and International Studies last year estimated cyber crime costs our economy more than $400 billion and 200,000 lost jobs. The cybersecurity company Symantec reported that just last year, ...