Cyber Round-Up: NSA and cryptography, ICE launches app, England initiates...
First, “Cracked Credibility” is a great article by The Economist explaining the NSA’s (and British counterpart GCHQ’s) cryptographic efforts. The thrust of the article is a discussion on the...
View ArticleJack Goldsmith: “We Need an Invasive NSA” (New Republic)
Writing for New Republic, Jack Goldsmith supports General Keith Alexander’s vision for increased government surveillance to combat cyber threats and believes that, one day, the government and,...
View ArticleCyber Roundup: Route Hijacking Ups Its Game; Advice from a “White Hat...
A recent research study revealed that memory cards being sold on the Internet contained sensitive Australian government data. According to the study, “It is evident that actions must be taken by...
View ArticleThe Argument for a Defense-centric Cyber Strategy
In a recent report, Foreign Policy considers a critical question facing cybersecurity pros. Namely, which strategy is more effective at combatting cyber threats—the offensive or defensive? Comparing...
View ArticleCyber Round Up: Holder says NSA programs legal; Snowden nominated for Nobel;...
In speaking with the Senate Judiciary Committee, Attorney General Eric Holder backed the judicial determination that the National Security Agency’s (NSA) surveillance programs are legal, according to...
View ArticleCyber Roundup: Including More Updates from President Obama’s January 17th Speech
To start, here’s another update from President Obama’s January 17th speech regarding changes to the government’s surveillance activities. The Washington Post reports that, yesterday, the Foreign...
View ArticleCyber Dialogue 2014 (Day 2 of 2)
Following yesterday’s introduction and preparation on day 1 of the Cyber Dialogue 2014, the conference participants started day 2 in their assigned working groups, covering specific challenges to...
View ArticleActual Executive Order Issued to Counter Cyber Threats
President Obama issued an Executive Order (“EO”) to block property belonging to those who engage in malicious cyber-enabled activities. Citing to the threat posed by malicious cyber-enabled activities...
View ArticleActual U.S. DoD Cyber Strategy
We’ll have lots of analysis and commentary over time, no doubt, but we just want to make sure you all have a copy of the actual [U.S.] Department of Defense Cyber Strategy of April 2015 by posting it...
View ArticleThe U.S. Cyber Glass House and Deterrence
“I’d say our [cyber] defense isn’t working” – Former Director of the National Security Agency Keith Alexander. In a keynote address at the American Enterprise Institute, Alexander told the audience...
View ArticleRethinking cybersecurity, retribution, and the role of the private sector:...
Two articles from Stewart Baker, one over at The Volokh Conspiracy, and another from Baker’s Skating on Stilts blog. The first piece from the Skating on Stilts blog covers the role of the private...
View ArticleSteven Chabinsky (Crowdstrike, ex-FBI Cyber Division) talks private sector...
I also had the opportunity to attend the ABA Standing Committee on Law and National Security’s 22nd Annual Review of the Field of National Security Law in Washington, D.C. The conference is just...
View ArticleThe Nuclear Option: Offensive Cybersecurity (InformationWeek)
On 1/21, InformationWeek put out a very interesting newsletter on hackback/counterstriking/private sector active defense/offensive cybersecurity. The newsletter requires you to register (it’s free)....
View ArticleCyber deterrence is working, Hagel tells senators: Foreign Policy
John Reed with some good stuff for Foreign Policy, per usual. Reed wrote on advance testimony from the SecDef-to-be Chuck Hagel pertaining to cyber-deterrence. You can find that testimony (on a lot...
View ArticleHow much Leeway is there in the CFAA and International Law for Offensive...
Continuing Taia Global’s Spooks & Suits conference is a panel discussion I’ve been looking forward to for a while: “How much Leeway is there in the CFAA and International Law for Offensive Actions...
View ArticleA soft counterattack on private counterhacks: Skating on Stilts/WPR/NPR
Herbert Lin wrote a quick primer on private sector active defense for World Politics Review. I want to direct your attention to an excerpt from Mr. Lin’s work: It is not clear that the use of...
View ArticleActive Cyber Defense: A Framework for Policymakers (CNAS)
Hat tip to FCW’s Emily Cole. A few days ago, the Center for a New American Security (CNAS) released a report written by Irving Lachow titled Active Cyber Defense: A Framework for Policymakers. The...
View ArticleHackback Sunday: Skating on Stilts/cyberdialogue
On 3/1, Adam Segal (of CFR fame) wrote a very useful blog post for cyberdialogue covering hackback, signaling, and state-society relations. The article provides a broad overview of the issues with...
View ArticleConfronting Chinese cyberexploitation: DefenseNews/U.S.News
For your enjoyment, two articles further considering how the U.S. should respond to pervasive Chinese cyberexploitation: David Smith wrote for DefenseNews, explaining that Chinese cyberexploitation...
View ArticleObama rejected tough options for countering Chinese cyber attacks, I get...
The Washington Free Beacon’s Bill Gertz (via The Washington Times) wrote a very interesting article on how President Obama “rejected a series of touch actions against China, including counter-cyber...
View Article
More Pages to Explore .....