Skip to content
Search

Latest Stories

The Honors Awards
cipherbrief

Welcome! Log in to stay connected and make the most of your experience.

Input clean

Insider Threat

How China Built AI Dominance on Stolen American Silicon

How China Built AI Dominance on Stolen American Silicon

DEEP DIVE — Federal prosecutors in Texas, in December, unsealed charges and related details exposing a sprawling scheme that quietly siphoned some of [...] More

The Latest

The Taliban’s Devastating Attack in Kandahar

Bottom Line Up FrontOn October 18, the Taliban assassinated General Abdul Raziq, the extremely powerful and controversial police chief of Kandahar [...] More

Talking with Bill Evanina About Threats, Spies and Social Media

Bill Evanina is the Director of the National Counterintelligence and Security Center (NCSC) - a part of the U.S. Intelligence Community that leads [...] More

Securing America's Technological Advantage

Cipher Brief Expert Stephanie Douglas, former Executive Assistant Director (EAD) National Security Branch, FBI weighs in on the practical challenges [...] More

Companies Must Invest in More Robust Insider Threat Programs

The most infamous spies, moles, and saboteurs have come from intelligence and military organizations. However, recent allegations made against an [...] More

What if the Insider Threat Is You?

Sometimes we're the threat, whether to ourselves or others, without even realizing it. Insider threats trace back to humans, thus, it's at our own [...] More

Harvard Admits Manning Hire ‘Mistake’ Amid Intel Community Outrage

Harvard Admits Manning Hire ‘Mistake’ Amid Intel Community Outrage

Michael Morell, former acting and deputy director of the CIA, resigned Thursday from his teaching position at Harvard University in protest of the [...] More

Defusing Leakers Means Knowing What Makes Them Tick

Tackling insider threat — everything from leaking classified information to potential workplace violence — is a key part of the National [...] More

Lack of Sharing, Training Compounds Insider Threat

Lack of Sharing, Training Compounds Insider Threat

Malicious and trusted insiders pose a range of challenges in terms of counterintelligence risks and physical threats, and experts say policy needs to [...] More

A CSO’s Guide to Insider Threats

Each minute of each day federal cybersecurity teams triage an unimaginable number of threats to our national security. While many of those threats [...] More

Changing the “Gotcha” Approach to Insider Threats

With the help of big data analytics, the Department of Defense Insider Threat Management and Analysis Center — better known as the DITMAC — is [...] More

Pompeo Calls WikiLeaks a “Hostile Intelligence Service”

Pompeo Calls WikiLeaks a “Hostile Intelligence Service”

CIA Director Mike Pompeo called WikiLeaks a “non-state, hostile intelligence service” that is “often abetted by state actors like Russia” in his [...] More

It Takes a Team to Stop the Bleeding from Insider Threats

It Takes a Team to Stop the Bleeding from Insider Threats

The top counterintelligence priorities of the United States government are insider threats, protecting critical infrastructure, and supply chain [...] More