Cyber Warfare

March 19, 2017
Where will Russian President Vladimir Putin strike next? With the 2018 Russian election around the corner, former Soviet states are nervous. Foreign adventures are the quickest way for a politician to get a bump in the polls.
March 19, 2017
Russian offensive cyber capabilities are as sophisticated as those of other major cyber powers, such as the United States and China, and they likely exceed Baltic states’ ability to defend critical infrastructures.
March 19, 2017
European countries are becoming increasingly wary of foreign disinformation and subversion operations in their own internal politics following Russian interference in last year’s U.S. elections.
March 12, 2017
There as been discussion of a separation between the National Security Agency and U.S. Cyber Command for a while, only for the change in administrations to cause brief hesitation.
March 12, 2017
Despite the many logistical and operational challenges of a transition, many acknowledge that Cyber Command must eventually separate from the National Security Agency.
March 12, 2017
In 2013, former President Barack Obama was close to ending the “dual-hat” leadership of both the National Secur
March 1, 2017
Cyberspace is often portrayed as a new domain of international relations – a Wild West where there are no rules or guiding principles to govern the behavior of states. Such perceptions of anarchism have bred uncertainty over what is or is not acceptable activity among governments.
March 1, 2017
NATO’s Cooperative Cyber Defence Centre of Excellence last month published the Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, a follow-on project to the first, 2013, edition of the manual, which focused on cyber
March 1, 2017
A group of international law experts met in Tallinn, Estonia, after the 2007 onslaught of cyber attacks against sites in the country, to create the Tallinn Manual in order to clarify what constitutes an act of war in cyberspace and how countries could lawfully respond.
February 24, 2017
What if network defenders knew that a cyber operation occurred during Moscow business hours, that it involved a Russian IP address, and that the cyber actors used a Cyrillic keyboard? Would those indicators by themselves be enough for attribution?
February 24, 2017
Understanding the Russian criminal underground is essential when discussing Russian proxies in cyberspace. How do cybercriminal entities interact with each other and what is their relationship with the Russian government?
February 24, 2017
Cyber operations remain at the forefront of confrontations between the West and Moscow as relations continue to deteriorate. Russia asserted itself in 2007 with “patriotic hackers” launching a volley of distributed denial of service (DDoS) attacks on Estonian systems.
February 5, 2017
We live in an age where what used to be the figment of science fiction is now a reality, changing the way people go about their daily lives. Advances in artificial intelligence and machine learning are the new frontier, and their inception creates just as many risks as opportunities.
February 5, 2017
The cybersecurity industry is currently enamored with concepts of autonomous defense, including elements of machine learning, behavioral analytics, and artificial intelligence—and rightly so.
February 5, 2017
Many view cybersecurity as passively blocking attempts to breach networks, but security experts have long advocated more active measures in defense of sensitive networks.
January 29, 2017
Cyber is emerging as Iran’s weapon of choice for dealing with both domestic and foreign opponents.
January 29, 2017
Cybersecurity is often discussed in relation to the major global powers: China’s economic espionage, Russian influence operations, and U.S. dragnet global surveillance to thwart terrorism.
January 10, 2017
Let’s agree on one thing, when it comes to Russia’s recent interference with the U.S. presidential election, no one yet has found a way to deter President Vladimir Putin from doing it again – here in this country or elsewhere.
January 5, 2017
Pundits will pick over the lessons of 2016 for a long time, and as they do, cyber experts are looking at the past year and finding lessons as well, with far-reaching implications for our nation’s security.
December 25, 2016
Editor’s Note: Over the coming days, The Cipher Brief presents some of our most incisive coverage on key issues of 2016 and a look ahead at what is yet to come in 2017.
December 25, 2016
Back in August, The Cipher Brief sat down with Leo Taddeo, Chief Security Officer for Cryptzone, to discuss the cyber threats posed by Russia and China.
December 25, 2016
In July, Rob Dannenberg, the former head of security at Goldman Sachs and a 24-year veteran of the CIA, discussed Russia’s cyber strategy of information warfare and the role of proxies in undermining attribution efforts, consequentially stemming victims' political will to respond to provocati
October 23, 2016
After much hand-wringing, the U.S. publicly admitted that the Russian government is interfering with the Presidential election. This was an open secret for weeks, but pious hopes for the bilateral relationship postponed any confirmation.
October 23, 2016
Most political leaders understand that governments that fail to respond to public provocations by foreign states do so at their own risk. In recent years, the U.S.
October 23, 2016
Now that the Obama administration has publicly attributed the hacking of the Democratic National Committee and other political entities to “Russia’s senior-most officials,”
August 28, 2016
The Cipher Brief spoke with Justin Harvey, CSO of Fidelis Cybersecurity, about the cyber threats posed by both China and Russia. According to Harvey, although last year’s agreement between U.S.
July 21, 2016
Most analysts have been impressed, and increasingly concerned, with the rapid improvement of Iran’s cyber capabilities. Tehran undoubtedly focuses the bulk of its cyber investment in defending itself from cyberattack, as well as being able to better monitor and manage its own people.
July 21, 2016
When it comes to cyber attacks, one of the biggest problems is correctly determining who, exactly, is attacking you. This is called attribution, and it is extremely difficult, since many sophisticated actors are capable of obscuring or destroying evidence as to who they are.
July 2, 2016
Amid the continuing leitmotif of missile tests, nuclear weapons development, and unwavering anti-South Korean and anti-U.S. rhetoric, North Korea’s cyber activities have once again risen in the order of importance among security and political circles.
July 1, 2016
If confirmed, North Korea has perpetrated the first state-sponsored digital bank robbery in history.  It shows that North Korea is getting desperate and therefore that sanctions are working but at the same time that the international community must take additional steps to safeguard commerce and
July 1, 2016
North Korea’s army of 6,000 hackers have been implicated in a multimillion dollar bank heist, the theft of intelligence from finance and defense firms, and the infiltration of infrastructure networks—all in the first six months of 2016.
August 30, 2015
The Cipher Brief spoke with Rob Knake, the former Director for Cyber Security Policy at the National Security Council (2011-2015), about the future of cyber weapons and cyber warfare.
August 30, 2015
The Cipher spoke with Frank Cilluffo, who runs George Washington University’s Center for Cyber and Homeland Security, to discuss the U.S. government’s cyber security posture. Prior to joining GW, Cilluffo served as Special Assistant to the President for Homeland Security.
August 30, 2015
The Cipher Brief spoke with Dr. Paulo Shakarian, the author of Introduction to Cyber-Warfare, about the future of cyber war. Dr.
February 20, 2017
For many, cybersecurity is a technical problem and therefore requires technical solutions.
February 15, 2017
If you missed our previous dispatch, I am attending the annual RSA Conference in San Francisco, a global event where private and public sectors come together to hash out the mos
February 14, 2017
This week I’m attending the annual RSA Conference in San Francisco, where government and industry leaders have come together to discuss the looming challenges and newest tools in cybersecurity.
January 15, 2017
When the Russian intelligence operation designed to influence our 2016 election is used as a case study to train new Russian intelligence officers, it will be considered the most successful covert action operation in the history of Mother Russia.
January 11, 2017
With news of nation-states allegedly attacking companies, political institutions, and world governments, it is important to know how attribution works in cybersecurity.
January 4, 2017
Leaders of three top Senate national security committees are to meet Wednesday to discuss alleged Russian hacking of last month’s elections, and the Senate Foreign Relations committee has set a closed-door briefing on the Obama administration’s response for Thursday, a committee aide told The Cip
December 29, 2016
Russian President Vladimir Putin said in a statement Friday that he will not expel U.S. diplomats in response to U.S.
December 16, 2016
President Barack Obama says the U.S. will respond to the Russia’s interference in the 2016 campaign.
December 16, 2016
When it comes to attribution—especially when foreign intelligence agencies are involved—plausible deniability is easy.
October 17, 2016
The White House is looking to take a “proportional” response to Russia’s alleged hacking of U.S. political party organizations and effort to interfere in the election campaign.
October 10, 2016
As U.S.-Russia tensions escalate, the sharply deteriorating bilateral relationship between the former Cold War foes may be at an inflection point.