The Trump administration has accused Russia of a coordinated “multi-stage intrusion campaign” to hack into critical U.S. infrastructure networks and conduct “network reconnaissance” while attempting to delete evidence of their intrusions.
Petrochemical companies were hit by a series of cyberassaults last year. The worst of them, against a widely used safety system, could have set off an explosion.
This picture is much better than Anglteon and that whole week of bad photos.
Cyber events of the past two years—perpetrated by state actors in several notable cases, according to public statements by the U.S. and British governments— have demonstrated the potential for damaging impact to national security, critical infrastructures, and the global economy. Electric power distribution, healthcare services, pharmaceutical manufacturing and global shipping have all suffered significant disruptions, … Continue reading “The ‘Greek Tragedy’ of Cyber Security: We Know How This Ends”
A few years ago, shortly after stepping down as Assistant Attorney General for National Security, I published a long article called Law Enforcement as a Counterterrorism Tool. As its title suggests, the article’s central thesis was that law enforcement methods are useful in combating international terrorism. I did not try to make the case that law enforcement is the only, or even necessarily the best, way of combating terrorism.
What are the real world effects of the unusual U.S. view of the scope of any nation’s right to use military force in self-defense.
Two Democratic senators on Wednesday asked major vendors of U.S. voting equipment whether they have allowed Russian entities to scrutinize their software, saying the practice could allow Moscow to hack into American elections infrastructure.
Lockheed Martin unveiled its pitch for Cyber Command’s unified platform.
On Feb. 13, our colleague Robert Chesney flagged the upcoming Cyber Command legal conference titled “Cyberspace Operations in the Gray Zone.” The conference—which begins Monday morning and involves heavy interagency and private sector and academia participation—is set to address a number of key international and domestic law issues surrounding cyberspace operations, such as the exploiting of social media in the gray zone, the characterizing of information warfare in cyberspace, the protecting of domestic information systems, the countering of gray zone cyber threats, technology and warfare, and privacy implications of military cyberspace operations.
Determining the origins of cyberattacks is already difficult, but cyber actors can further muddy attribution through false flag attacks.
My take away from the U.S. Cyber Command symposium was somewhat different from Jason Healey’s, recently published in The Cipher Brief.