Quantcast
Channel: deterrence – Crossroads Blog
Browsing all 61 articles
Browse latest View live

Cyber Round-Up: NSA and cryptography, ICE launches app, England initiates...

First, “Cracked Credibility” is a great article by The Economist explaining the NSA’s (and British counterpart GCHQ’s) cryptographic efforts.  The thrust of the article is a discussion on the...

View Article



Jack Goldsmith: “We Need an Invasive NSA” (New Republic)

Writing for New Republic, Jack Goldsmith supports General Keith Alexander’s vision for increased government surveillance to combat cyber threats and believes that, one day, the government and,...

View Article

Cyber Roundup: Route Hijacking Ups Its Game; Advice from a “White Hat...

A recent research study revealed that memory cards being sold on the Internet contained sensitive Australian government data.  According to the study, “It is evident that actions must be taken by...

View Article

The Argument for a Defense-centric Cyber Strategy

In a recent report, Foreign Policy considers a critical question facing cybersecurity pros.  Namely, which strategy is more effective at combatting cyber threats—the offensive or defensive? Comparing...

View Article

Cyber Round Up: Holder says NSA programs legal; Snowden nominated for Nobel;...

In speaking with the Senate Judiciary Committee, Attorney General Eric Holder backed the judicial determination that the National Security Agency’s (NSA) surveillance programs are legal, according to...

View Article


Cyber Roundup: Including More Updates from President Obama’s January 17th Speech

To start, here’s another update from President Obama’s January 17th speech regarding changes to the government’s surveillance activities.  The Washington Post reports that, yesterday, the Foreign...

View Article

Cyber Dialogue 2014 (Day 2 of 2)

Following yesterday’s introduction and preparation on day 1 of the Cyber Dialogue 2014, the conference participants started day 2 in their assigned working groups, covering specific challenges to...

View Article

Actual Executive Order Issued to Counter Cyber Threats

President Obama issued an Executive Order (“EO”) to block property belonging to those who engage in malicious cyber-enabled activities.  Citing to the threat posed by malicious cyber-enabled activities...

View Article


Actual U.S. DoD Cyber Strategy

We’ll have lots of analysis and commentary over time, no doubt, but we just want to make sure you all have a copy of the actual [U.S.] Department of Defense Cyber Strategy of April 2015 by posting it...

View Article


The U.S. Cyber Glass House and Deterrence

“I’d say our [cyber] defense isn’t working” – Former Director of the National Security Agency Keith Alexander. In a keynote address at the American Enterprise Institute, Alexander told the audience...

View Article

Rethinking cybersecurity, retribution, and the role of the private sector:...

Two articles from Stewart Baker, one over at The Volokh Conspiracy, and another from Baker’s Skating on Stilts blog. The first piece from the Skating on Stilts blog covers the role of the private...

View Article

Steven Chabinsky (Crowdstrike, ex-FBI Cyber Division) talks private sector...

I also had the opportunity to attend the ABA Standing Committee on Law and National Security’s 22nd Annual Review of the Field of National Security Law in Washington, D.C.  The conference is just...

View Article

The Nuclear Option: Offensive Cybersecurity (InformationWeek)

On 1/21, InformationWeek put out a very interesting newsletter on hackback/counterstriking/private sector active defense/offensive cybersecurity.  The newsletter requires you to register (it’s free)....

View Article


Cyber deterrence is working, Hagel tells senators: Foreign Policy

John Reed with some good stuff for Foreign Policy, per usual.  Reed wrote on advance testimony from the SecDef-to-be Chuck Hagel pertaining to cyber-deterrence.  You can find that testimony (on a lot...

View Article

How much Leeway is there in the CFAA and International Law for Offensive...

Continuing Taia Global’s Spooks & Suits conference is a panel discussion I’ve been looking forward to for a while: “How much Leeway is there in the CFAA and International Law for Offensive Actions...

View Article


A soft counterattack on private counterhacks: Skating on Stilts/WPR/NPR

Herbert Lin wrote a quick primer on private sector active defense for World Politics Review.  I want to direct your attention to an excerpt from Mr. Lin’s work: It is not clear that the use of...

View Article

Active Cyber Defense: A Framework for Policymakers (CNAS)

Hat tip to FCW’s Emily Cole.  A few days ago, the Center for a New American Security (CNAS) released a report written by Irving Lachow titled Active Cyber Defense: A Framework for Policymakers.  The...

View Article


Hackback Sunday: Skating on Stilts/cyberdialogue

On 3/1, Adam Segal (of CFR fame) wrote a very useful blog post for cyberdialogue covering hackback, signaling, and state-society relations.  The article provides a broad overview of the issues with...

View Article

Confronting Chinese cyberexploitation: DefenseNews/U.S.News

For your enjoyment, two articles further considering how the U.S. should respond to pervasive Chinese cyberexploitation: David Smith wrote for DefenseNews, explaining that Chinese cyberexploitation...

View Article

Obama rejected tough options for countering Chinese cyber attacks, I get...

The Washington Free Beacon’s Bill Gertz (via The Washington Times) wrote a very interesting article on how President Obama “rejected a series of touch actions against China, including counter-cyber...

View Article
Browsing all 61 articles
Browse latest View live




Latest Images