Cyber Warfare

January 10, 2017
Let’s agree on one thing, when it comes to Russia’s recent interference with the U.S. presidential election, no one yet has found a way to deter President Vladimir Putin from doing it again – here in this country or elsewhere.
January 5, 2017
Pundits will pick over the lessons of 2016 for a long time, and as they do, cyber experts are looking at the past year and finding lessons as well, with far-reaching implications for our nation’s security.
December 25, 2016
Editor’s Note: Over the coming days, The Cipher Brief presents some of our most incisive coverage on key issues of 2016 and a look ahead at what is yet to come in 2017.
December 25, 2016
Back in August, The Cipher Brief sat down with Leo Taddeo, Chief Security Officer for Cryptzone, to discuss the cyber threats posed by Russia and China.
December 25, 2016
In July, Rob Dannenberg, the former head of security at Goldman Sachs and a 24-year veteran of the CIA, discussed Russia’s cyber strategy of information warfare and the role of proxies in undermining attribution efforts, consequentially stemming victims' political will to respond to provocati
October 23, 2016
After much hand-wringing, the U.S. publicly admitted that the Russian government is interfering with the Presidential election. This was an open secret for weeks, but pious hopes for the bilateral relationship postponed any confirmation.
October 23, 2016
Most political leaders understand that governments that fail to respond to public provocations by foreign states do so at their own risk. In recent years, the U.S.
October 23, 2016
Now that the Obama administration has publicly attributed the hacking of the Democratic National Committee and other political entities to “Russia’s senior-most officials,”
August 28, 2016
The Cipher Brief spoke with Justin Harvey, CSO of Fidelis Cybersecurity, about the cyber threats posed by both China and Russia. According to Harvey, although last year’s agreement between U.S.
July 21, 2016
Most analysts have been impressed, and increasingly concerned, with the rapid improvement of Iran’s cyber capabilities. Tehran undoubtedly focuses the bulk of its cyber investment in defending itself from cyberattack, as well as being able to better monitor and manage its own people.
July 21, 2016
When it comes to cyber attacks, one of the biggest problems is correctly determining who, exactly, is attacking you. This is called attribution, and it is extremely difficult, since many sophisticated actors are capable of obscuring or destroying evidence as to who they are.
July 2, 2016
Amid the continuing leitmotif of missile tests, nuclear weapons development, and unwavering anti-South Korean and anti-U.S. rhetoric, North Korea’s cyber activities have once again risen in the order of importance among security and political circles.
July 1, 2016
If confirmed, North Korea has perpetrated the first state-sponsored digital bank robbery in history.  It shows that North Korea is getting desperate and therefore that sanctions are working but at the same time that the international community must take additional steps to safeguard commerce and
July 1, 2016
North Korea’s army of 6,000 hackers have been implicated in a multimillion dollar bank heist, the theft of intelligence from finance and defense firms, and the infiltration of infrastructure networks—all in the first six months of 2016.
August 30, 2015
The Cipher Brief spoke with Rob Knake, the former Director for Cyber Security Policy at the National Security Council (2011-2015), about the future of cyber weapons and cyber warfare.
August 30, 2015
The Cipher spoke with Frank Cilluffo, who runs George Washington University’s Center for Cyber and Homeland Security, to discuss the U.S. government’s cyber security posture. Prior to joining GW, Cilluffo served as Special Assistant to the President for Homeland Security.
August 30, 2015
The Cipher Brief spoke with Dr. Paulo Shakarian, the author of Introduction to Cyber-Warfare, about the future of cyber war. Dr.
January 15, 2017
When the Russian intelligence operation designed to influence our 2016 election is used as a case study to train new Russian intelligence officers, it will be considered the most successful covert action operation in the history of Mother Russia.
January 11, 2017
With news of nation-states allegedly attacking companies, political institutions, and world governments, it is important to know how attribution works in cybersecurity.
January 4, 2017
Leaders of three top Senate national security committees are to meet Wednesday to discuss alleged Russian hacking of last month’s elections, and the Senate Foreign Relations committee has set a closed-door briefing on the Obama administration’s response for Thursday, a committee aide told The Cip
December 29, 2016
Russian President Vladimir Putin said in a statement Friday that he will not expel U.S. diplomats in response to U.S.
December 16, 2016
President Barack Obama says the U.S. will respond to the Russia’s interference in the 2016 campaign.
December 16, 2016
When it comes to attribution—especially when foreign intelligence agencies are involved—plausible deniability is easy.
October 17, 2016
The White House is looking to take a “proportional” response to Russia’s alleged hacking of U.S. political party organizations and effort to interfere in the election campaign.
October 10, 2016
As U.S.-Russia tensions escalate, the sharply deteriorating bilateral relationship between the former Cold War foes may be at an inflection point.