Prosecuting Wikileaks, Protecting Press Freedoms: Drawing the Line at Knowing Collaboration with a Foreign Intelligence Agency

Top law professor who was witness for defense of Chelsea Manning, explains why Assange’s actions in 2016 may be very different.

Source: Prosecuting Wikileaks, Protecting Press Freedoms: Drawing the Line at Knowing Collaboration with a Foreign Intelligence Agency

Advertisements

Securing Our Elections: How States Can Mitigate the Potential Damage of Hacked Voter Registration Rolls

What would happen if a cyberattack against our election systems compromised states’ registration databases and millions of voters were forced to cast a provisional ballot?

Source: Securing Our Elections: How States Can Mitigate the Potential Damage of Hacked Voter Registration Rolls

Cyber Security Derailed? Recommendations for Smarter Investments in Infrastructure

A state-owned Chinese company receives a contract to build and maintain the next generation of railcars that service Metro stations at the Pentagon, near the White House and Capitol Hill, and throughout the Washington, D.C., metro area. What could possibly go wrong?

Source: Cyber Security Derailed? Recommendations for Smarter Investments in Infrastructure

Hackers impersonating journalists targeted Saudi critic in DC: report

Hackers impersonating journalists including slain Washington Post columnist Jamal Khashoggi reportedly attempted to deliver malicious software to a prominent Saudi dissident living in Washington D.C.

Source: Hackers impersonating journalists targeted Saudi critic in DC: report

Russia and Spain strike agreement for joint cybersecurity group: report

Jee if we had only thought about that in 2016 …

Russia and Spain have agreed to set up a joint cybersecurity group that aims to stop the spread of damaging disinformation campaigns that have begun to strain their relations, The Associated Press

Source: Russia and Spain strike agreement for joint cybersecurity group: report

The Death of Cyber Utopia

Back in the mid-1990s senior leaders in the U.S. Air Force were deeply enmeshed in a debate—one that, as General (Ret.) Michael Hayden describes it, was almost Jesuitical in its seeming abstruseness. The Air Force, on the cutting edge of new computer-enabled capabilities, was trying to decide whether this new domain of activity was one of “cyber” operations or one of “information” operations.

Source: The Death of Cyber Utopia

Why the First Amendment Does Not Protect Trump Campaign Collusion with Wikileaks and Russia

Can Trump campaign claim freedom of the press allowed them to conspire with Wikileaks?

Source: Why the First Amendment Does Not Protect Trump Campaign Collusion with Wikileaks and Russia

Pentagon official: Cyber Command and NSA may split infrastructure

Most of the infrastructure is common and will be unnecessary and redundant to duplicate. Intrusion is intrusion and payload is payload whether disruptive, destructive or persistent ISR.

The split stems from the different missions of the two agencies, according to Capt. Ed Devinney, director of corporate partnerships and technology outreach at Cyber Command.

Source: Pentagon official: Cyber Command and NSA may split infrastructure

TV report: Israel silent as Iran hit by computer virus more violent than Stuxnet

Tehran strategic networks attacked, Hadashot TV says, hours after Israel revealed it tipped off Denmark about Iran murder plot, and days after Rouhani’s phone was found bugged

Source: TV report: Israel silent as Iran hit by computer virus more violent than Stuxnet